Network security and wan connectivity

Assignment Help Computer Network Security
Reference no: EM13921069

The project is to design a network, network security and WAN connectivity for the following situation:

Organization of 100 computer users in three locations.

Location one: two buildings, 25 computer users in each building.
Location two: one building, 15 computer users.
Location three: one building 35 computer users.

Document your design as follows: 

  1. Introduction to the design Explanation of equipment and software used. MS WORD
  2. Diagram of the entire network. PPT
  3. Diagrams for each location. PPT
  4. Explanation of security procedures. MS WORD
  5. Explanation of WAN connection. MS WORD

 Include with your documentation a PowerPoint presentation of 10 slides illustrating the key points you would convey to management and users.

YOU WILL submit TO ME:  the 2 FILES BELOW

1. A MS WORD DOCUMENT

2. A POWERPOINT PRESENTATION

Reference no: EM13921069

Questions Cloud

Begin by constructing a time line : A project has an initial cost of $40,000, expected net cash inflows of $9,000 per year for 7 years, and a cost of capital of 11%. What is the project's NPV? (Hint: Begin by constructing a time line)
Comparing two different capital structures : Kyle Corporation is comparing two different capital structures, an all-equity plan (Plan I) and a levered plan (Plan II). Under Plan I, Kyle would have 790,000 shares of stock outstanding. Under Plan II, there would be 540,000 shares of stock outstan..
What is the portfolios expected return : A portfolio is invested 24 percent in Stock G, 39 percent in Stock J, and 37 percent in Stock K. The expected returns on these stocks are 10.5 percent, 13 percent, and 18.4 percent, respectively. What is the portfolio’s expected return?
Expected return-what must the risk-free rate be : A stock has an expected return of 12.9 percent and a beta of 1.15, and the expected return on the market is 11.9 percent. What must the risk-free rate be?
Network security and wan connectivity : The project is to design a network, network security and WAN connectivity for the following situation:
Perform a mann-whitney u test : Based on eight universities in each of two different regions, is there a difference between university rankings based on their regional locations? Perform a Mann-Whitney U test, being sure to follow the directions under the table.
Discuss why a firm might want to adopt reviews : Discuss why a firm might want to adopt 360-degree reviews. What are the likely problems with this type of performance evaluation?
What is the sunk cost for new deluxe truck camper project : Hoosier Camper, Inc. is a manufacturer of truck campers. Its current line of truck campers are selling excellently. However, in order to cope with the foreseeable competition with other similar truck campers, HC spent $950,000 to develop a new line o..
Is your absenteeism related to work-related health issues : What can we do as a team to help support in weeks and months to come? Is your absenteeism related to work -related health issues? Is your absenteeism related to your current shift designation

Reviews

Write a Review

Computer Network Security Questions & Answers

  What other ways can you track and measure the performance

what other ways can you track amp measure performance of a project other than earned value measurement evm? are some

  Interorganizational cybersecurity relationships

Interorganizational Cybersecurity Relationships

  Users in your organization are concerned about performance

users in your organization are concerned about performance and network security. after a meeting with your

  Piece of code that allows a buffer

Give an example of piece of code that allows a buffer over run to occur. Assuming a program contains absolutely no buffer over runs. What other control flow-related problems may it have.

  Identify and discuss vulnerabilities and threats

Identify and discuss vulnerabilities and threats - develop a prioritized strategy to deal with the 3 or 4 most serious threats and vulnerabilities

  The discussion board is part of the core of online

the discussion board is part of the core of online learning. classroom discussion in an online environment requires

  Examine network security of kundler networks

The next person will have to examine network security of Kundler networks to include routers and firewalls

  Describe common security concerns inherent to wired

Describe common security concerns inherent to wired, wireless, and mobile networking.

  Key generation of the simplified des algorithm

What is the history of DES and describe the key generation of the Simplified DES algorithm

  How their software is in fact not high assurance software

How would you explain to this company how their software is in fact not high assurance" software?

  Symmetric encryption algorithms

block cipher and a stream cipher, Caesar cipher, cryptanalytic attacks, mono alphabetic cipher and a poly alphabetic cipher, Mix Columns, Add Round key, PGP services, traffic padding, contrast link and end-to-end encryption

  Traffic padding what is traffic padding and what is its

what is traffic padding and what is its purpose? plz give this que of answer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd