Reference no: EM13753590
You have been assigned as the cybersecurity architect in charge of implementing the security procedures for a network used in an upcoming project. The project is highly classified due to market competition. You have the full array of tools and capabilities at your disposal and expense is no object. Utilizing the security mechanisms you have learned design the security plan for the network according to the project manager's requirements.
The project manager provided you the following requirements and criteria:
a. Only the project team of 25 employees is allowed to access the network and the information residing on it.
b. The 25 employees are divided into four separate groups consisting of six members each plus the project manager: Product Development (Group A); Marketing (Group B); Sales (Group C); and Production (Group D).
c. Each group requires their own data storage with restricted access only to that group and the project manager.
d. Each group has deliverables that require data storage accessible by each member of the project team.
e. The project team requires access to the Internet for research and communication both internally and with external partners.
f. The project team will only be working between the hours of 0600-1800, Mon-Fri.
g. The project is expected to last for six months.
The disadvantages of allowing unlimited access
: Employers can use a number of products to monitor their employees' use of the Internet. These products report an employee's access of non-business related Web sites. Advocates insist that these products conserve network resources, make workers mor..
|
Write an essay on citizenship and nationalism
: Write an essay on citizenship and nationalism. Analyze primary sources between 1970-2011 to demonstrate understanding of American Identity in relation to citizenship or nationalism using a post-modern approach.
|
Determine the key strategic differences that have impacted
: Determine the key strategic differences that have impacted the relative success of both Amazon.com and Yahoo.com. Provide two (2) specific examples of such strategic differences to support the response.
|
Find the modified internal rate of return
: Find the Modified Internal Rate of Return (MIRR) for the following annual series of cash flows, given a discount rate of 10.50%: Year 0: -$75,000; Year 1: $15,000; Year 2: $16,000; Year 3: $17,000; Year 4: $17,500; and, Year 5: $18,000.
|
Security plan for the network
: Utilizing the security mechanisms you have learned design the security plan for the network according to the project manager's requirements
|
Technology have changed the way managers perform tasks
: The four management tasks (planning, organizing, directing, evaluating) existed long before computers. Discuss how the use of computers and technology have changed the way managers perform these tasks.
|
Appropriate cost of capital tools
: Operational leverage should discuss the appropriate cost of capital tools including weighted average cost of capital and the capital asset pricing model.
|
Calculate the value of the project
: Use the WACC method to calculate the value of the project. Assume that both the comparison firm and out firm have risk-free debt and risk-free tax shields.
|
Explain the importance of communication protocols
: Explain the importance of communication protocols and Define the overall network architecture
|