Sale their new phone to public called Acmephone

Assignment Help Basic Computer Science
Reference no: EM132600307

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed. As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:

There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

Each facility has three floors. The buildings are rectangular with each floor being 350'x350'.

There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

The primary data center will be located at the Atlanta location.

There will be a failover data center at the Cincinnati location.

Each location should be protected from intrusions that are not limited to state change attacks.

The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

There will be database servers located at the Cincinnati site.

The servers must have redundancy.

The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

You should submit a network drawing listing the network's topology including any necessary hardware.

You should list any recommended cable.

You can recommend wiring closets wherever you need them.

You should recommend ways to assure that you are not getting attacked.

You should build traps to stop attackers.

You should recommend any WAN or wireless technologies.

You should recommend any technology needed in the data center for high availability.

Reference no: EM132600307

Questions Cloud

Sender retransmitted the unacknowledged TCP segment : The sender retransmitted the unacknowledged TCP segment, therefore causing the receiving transport process to receive the same segment twice?
Calculate ABC Company return on investment : The margin in year 2 was three times larger than the margin in year 1. Calculate ABC Company's return on investment (ROI) For year 1
Prepare the necessary entries for the current year : Current Expenditures by Capital project fund amounted to $ 5,000 paid in cash. Prepare the necessary entries for the current year
How many common shares waterway corporation will report : Stock split on the common stock. On its December 31, 2021 financial statements, Waterway Corporation will report how many common shares issued?
Sale their new phone to public called Acmephone : The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone,
Question - Equity Transaction and Statement Preparation : Question - Equity Transaction and Statement Preparation. Prepare the stockholders' equity section of NILE Corporation's balance sheet as of December 31, 2003
Should the coffee packaging project be accepted : Do you believe that there was sufficient financial information to make a solid decision on what to do? Discuss risk methodologies used in capital budgeting.
Journalize the transactions in the books : Question - Journalize the following transactions in the books of Mr. Maqsood & Sons, post them to the ledgers, and prepare trial balance
What are some methods to assimilate new generations : What are some methods to assimilate new generations into the workforce to think about competitive advantage?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Problem regarding the digital transmission

Compare and contrast the data communication technologies of guided media and unguided media. This should include transmission media, data link control protocols, and multiplexing.

  Intrusion-detection systems

There are two basic ways to tell if a network or system is under attack. These are with intrusion-detection systems (IDSs) and intrusion-protection systems.

  Ensure that the program does not have a memory leak

Ensure that the program does not have a memory leak.

  Proposal on the best way to dispose of the computers

Your company is replacing all 500 of its computers with newer machines, and your supervisor has put you in charge of removing the outdated computers.

  Clarify goals necessary to complete the project

Describe the project requirements. Clarify goals necessary to complete the project. Identify the stakeholders involved in the project.

  What is the big-o run-time of the remove operation

What is the big-O run-time of the Remove operation for an array-based list? Do your empirical results agree with this? Why or why not. What are the big-O run-times of the Get and Set operations for a linked-list? Do your empirical results agree wi..

  Important to understand early childhood education

Why is it important to understand early childhood education foundation theories and how do they impact the field. Need in one hour.

  About the global warming

Some people argue that global warming is not real, or that we are simply in between ice ages. How would you respond to such individuals?

  What is the binary representation of the decimal number

What is the binary representation of the decimal number 4.875 assuming the IEE 754 single precision format?

  Establishment of federal-state and local government laws

What are the issues and root causes that necessitates the enactment and/or establishment of Federal, state and local government laws,

  Design a linear-time algorithm

A matching in a graph is a set of disjoint edges-i.e., edges that do not share any vertices in common. Give a linear-time algorithm to find a maximum matching in a tree.

  Create data model and Create ER Diagram

The hospital not only admits patients but also has an out-patient department (OPD). Create a data model. Create an ER Diagram.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd