Secure access to the internet for employees

Assignment Help Computer Engineering
Reference no: EM131721237

Grumheed Corporation

Dallas/Fort Worth Facility

Grumheed Corporation (GC), a world leader in advanced tactical drones, plans to open a facility in the Dallas-Fort Worth metroplex. While having not settled on an exact location, ideally the facility will be within two miles of the Dallas-Fort Worth International Airport via major highway. While maintaining our original facility in Boston, the new campus will become the primary location for research and demonstration of equipment and sales. Since our company produces state-of-the-art military equipment, this new complex must have all possible security measures. Visitors, potential customers, current customers, support staff, design engineers and demonstration staff will all be housed in this 100,000 square foot facility. For BC/DR purposes the data warehouse will be duplicated to the Boston facility nightly.

This is a list of requirements facility:

· Controlled access to the building for everyone.

· A lobby, conference area, and sales area that needs controlled access

· A highly secure area for system designers

· An extremely secure area to house the data center.

· Secure transfer of archival data between Dallas and Boston

· Secure access to the Internet for employees

Please present a detailed proposal of your recommendations for physical, technical and administrative security measures for our new facility. In your proposal please recommend categories of countermeasures and the associated risks that the countermeasures mitigate. You are not expected to recommend a specific brand/model of a countermeasure. Please include a section detailing additional risks that have not been mitigated by your proposal. Your proposal should be properly site all references.

Reference no: EM131721237

Questions Cloud

Violate economic efficiency : Calculate: (a) the number of boats that would not violate economic efficiency and (b) the actual number of boats under open access.
Do you want to download your consciousness into a pc : Do you want to download your consciousness into a computer for eternity? SHOULD you want to?
What is a trade secret : What is a trade secret? Provide an example of a trade secret. How might the trade secret you identified help a firm establish a competitive advantage.
Improvement in cashew harvesting technology : An improvement in cashew harvesting technology lowers the per unit cost of cashew production by $3 / pound. As a result, the market price and quantity become:
Secure access to the internet for employees : Secure transfer of archival data between Dallas and Boston
Meaningless without a positive visionary leader : Why would activities become “meaningless” without a positive, visionary leader?
Ethics of exporting used batteries : Lead is a highly toxic metal, and lead in this case relates to exporting used batteries to Mexico.
Select a developing country : Select a developing country (ARGENTINA) (1) Argentina corruption issue in the economic development?
Describe social stratification and mobility in the us : Describe social stratification and mobility in the United States.Describe global stratification and inequality around the world.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd