Network infrastructure and security

Assignment Help Computer Networking
Reference no: EM13764133

Network Infrastructure and Security

This assignment consists of two (2) sections: an infrastructure document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

With the parameters set forth at the onset of the project, present the infrastructure and security policy that will support the expected development and growth of the organization. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. Since the company will be merging with a multinational company, virtualization and cloud technology should be taken into consideration. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy.

Section 1: Infrastructure Document
1. Write a five to ten (5-10) page infrastructure document in which you:

a. Thoroughly identify possible network infrastructure vulnerabilities.Thoroughly address network vulnerabilities with the appropriate security measures. Thoroughly ensure that consideration is given to virtualization and cloud technology.

b. Thoroughlydesign a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Thoroughlyexplain the rationale for the logical and physical topographical layout of the planned network.

c. Thoroughlyillustrate the possible placement of servers, including access paths to the Internet and firewalls. Illustrate the possible placement of servers, including access paths to the Internet and firewalls. Note: facility limitations, workstations, printers, routers, switches, bridges, and access points should be considered in the illustration.

d. Thoroughly create and describe a comprehensive security policy for the company that will:

i. Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.

ii. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

 

Reference no: EM13764133

Questions Cloud

Numerical based on compression : Estimate the A-weighted sound pressure level in the 250Hz band at the receiver.
Identify the constitutional law issues : Identify the constitutional law issues in the following hypothetical fact pattern, applying or distinguishing relevant dispositive cases to resolve each relevant issue
Prepare a balance sheet in good form : Prepare a balance sheet in good form (stockholders' equity details can be omitted)
How does this knowledge affect the way you interact : How does this knowledge affect the way you interact in groups? What will you do differently in future groups as a result of this exercise
Network infrastructure and security : This assignment consists of two (2) sections: an infrastructure document and a revised project plan. You must submit both sections as separate files for the completion of this assignment.
Impact on criminal procedure by the courts : Write a 1,400- to 1,750-word paper in which you describe the key elements of the rights guaranteed by the Fourth, Fifth and Sixth Amendments and their impact on criminal procedure by the courts and police officers
Explain to teacher how the classroom equipment supports : Explain to your collaborating teacher how the classroom equipment supports not only your students who have sensory deficits, but may also assist others in the classroom.
Prepare a multiple-step income statement : Prepare a multiple-step income statement. Calculate the Profit Margin, and Gross profit rate for the company. Be sure to provide the formula you are using, show your calculations, and discuss your findings/results.
The advantages of solving disputes at the project level : Assignment: Safety Management Plan, A commercial contractor is seeking legal consultation related to their everyday activities and business operations as a whole

Reviews

Write a Review

Computer Networking Questions & Answers

  Create both a firewall architecture and acls

A firm has the following firewall policy: Employee access to Internet servers should be unrestricted and external clients should only be able to access the firm's public webserver.

  Open systems interconnection protocol model

Identify the advantages and disadvantages of circuit switching and packet switching-X.25, Frame Relay, Asynchronous Transfer Mode2, and Transmission Control Protocol/Internet Protocol (TCP/IP)-regarding performance, speed and throughput potential,..

  Part-11 generalize the basic approaches we used for making

part-11 generalize the basic approaches we used for making the best out of best effort service for real-time

  Determine number of samples are included in each packet

Assume that sender sends silence suppressed RTP stream of G.711 audio to receiver. During talk spurt 20 msecs chunks of quantized audio samples are encapsulated. Determine number of samples are included in each packet?

  Design entire cabling system for medical instrument

You have been asked to design the entire cabling system for a medical instrument manufacturer's new central warehouse. The company already has three buildings within two city blocks.

  How the polling mechanism will work to distribute

Explain what does it mean by "maximum weighting matching on U"? Show with an example. Construct a hypothetical matrix U and perform the Hungarian algorithm steps to show the process. You can take 4 by 4 matrix for example with entries f your own c..

  In the early years of web authoring websites commonly

in the early years of web authoring websites commonly posted operating system browser and even resolution

  Describes how the application layer manages distributed

select one of the following topics wireless network managementvideo teleconferencingvoip securitywrite a 2- to 3-page

  Analyze the benefits of bpm mashups in terms of composition

a web service is a set of technologies used for exchanging data between applications. web services allow businesses to

  Define the protocol and what it is primarily used for

Select a protocol of your choice. Research the standards and definitions of your selected protocol. Define the protocol and what it is primarily used for.

  Identify and describe the processes involved in the

identify and describe the processes involved in the management of the services disk quotas and security of both windows

  Setting up the new network

How could you interconnect the two areas? Assuring that the network has immunity from the interference; re-evaluate your choice explaining the best medium(s) to utilize.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd