Network security design proposal for small office

Assignment Help Basic Computer Science
Reference no: EM133102945

Network Security Design Proposal for Small Office

Project Scope

A network security proposal has to be designed for a small office with security as utmost priority. The organization has about 100 users. There is a web server on the network, which is accessible from the internet. The employees should also have wireless access to the network. All the users should have access to the internet.

1. Identify hardware like switches and access points with appropriate security features for LAN security

2. Identify router for broadband internet sharing.

3. Identify appliance to protect the web server from attackers and malicious content the internet.

4. IP network design with table for the organization.

5. Wireless security with appropriate security features should be made available

6. Wireless network integration of access points (5 nos) with LAN with appropriate security.

7. The user computers and the web server should be protected with appropriate antivirus solution.

8. Network Topology diagram.

Reference no: EM133102945

Questions Cloud

How fair electronics are creating convenience for customer : Fair Electronics Bangladesh, authorized manufacturer of Samsung Electronics and Samsung Mobile, are using multi channel approach to distribute their product in
What ways would a reduction in inventory help the company : The executive is recommending the company reduce the number of units in year-end inventory to 1,000. What ways would a reduction in inventory help the company
Most crucial topic for maintaining your business : The lessons on incident response and mitigation may be the most crucial topic for maintaining your business.
Azure services : Describe what a secure score is for in a company using Azure services. How is the score obtained?
Network security design proposal for small office : Identify hardware like switches and access points with appropriate security features for LAN security. Identify router for broadband internet sharing.
Transparent management of personal information : You need to provide a little more detail for each APP: For example:APP 1-Open and transparent management of personal information.
Strategic Compensation and Labour Relations Case Analysis : Strategic Compensation and Labour Relations Case Analysis: U.S. women's soccer team's wage discrimination lawsuit - Total Compensation and Labour relations
Analyze the business environment and potential market : Company X in Dubai intends to enter the insurance market in Japan. Please analyze the business environment and potential market when expanding the insurance bus
Why we use constraints in a database. : Explain why we use constraints in a database. Describe two constraints and how those constraints affect data that goes into a table.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Description of the role of event handlers

As part of your discussion include a description of the role of event handlers.

  Classes of wireless data networking

What are the three classes of wireless data networking? List the main features of 3G systems and how these compare to 4G systems. Define IPWireless technology.

  Horse half the original price

Will it be a good decision for a person who has money and is looking to invest in horse racing business to buy a horse from another person

  The basic sociological fact in buddhism

1. The basic sociological fact in Buddhism is _______. a. Karma b. Samgha

  Identify security weaknesses in network

Discuss a type of penetration testing and the different methods utilized to recognize vulnerabilities in your network.

  Write the following queries in relational algebra

For each department, find the maximum salary of instructors in that department. You may assume that every department has at least one instructor.

  Develop comprehensive policy

You assume as role of project manager of project to develop comprehensive policy for managing pedestrian traffic flow in popular downtown metropolitan district.

  Full range leadership development behaviors

Respond to the question in 300 words. How can you use Full Range leadership development behaviors to engage customers in design, product testing, enhancement ideas, using the company's internet website?

  Python is still one of the most used languages

As a developer, it is important that you find the right language to master. Python is still one of the most used languages,

  Compelling reason to migrate information to cloud

What do you believe to be the most compelling reason to migrate information to the cloud? What is your biggest security concern about doing so?

  Can you replicate some of these studies in your work

Most empirical studies mentioned above typically compare one QA alternative to another (for example, inspection vs. testing), or compare different techniques within a general category (for example, different inspection processes or techniques). Ca..

  Different levels in the testing process

There are several different levels in the testing process (unit or component testing, integration testing, system testing, and acceptance testing) that a software product must go through before release. The question is why we need to go through th..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd