Security plan for the network

Assignment Help Computer Network Security
Reference no: EM13753590

You have been assigned as the cybersecurity architect in charge of implementing the security procedures for a network used in an upcoming project. The project is highly classified due to market competition. You have the full array of tools and capabilities at your disposal and expense is no object. Utilizing the security mechanisms you have learned design the security plan for the network according to the project manager's requirements.

The project manager provided you the following requirements and criteria:

a. Only the project team of 25 employees is allowed to access the network and the information residing on it.

b. The 25 employees are divided into four separate groups consisting of six members each plus the project manager: Product Development (Group A); Marketing (Group B); Sales (Group C); and Production (Group D).

c. Each group requires their own data storage with restricted access only to that group and the project manager.

d. Each group has deliverables that require data storage accessible by each member of the project team.

e. The project team requires access to the Internet for research and communication both internally and with external partners.

f. The project team will only be working between the hours of 0600-1800, Mon-Fri.

g. The project is expected to last for six months.

Reference no: EM13753590

Questions Cloud

The disadvantages of allowing unlimited access : Employers can use a number of products to monitor their employees' use of the Internet. These products report an employee's access of non-business related Web sites. Advocates insist that these products conserve network resources, make workers mor..
Write an essay on citizenship and nationalism : Write an essay on citizenship and nationalism. Analyze primary sources between 1970-2011 to demonstrate understanding of American Identity in relation to citizenship or nationalism using a post-modern approach.
Determine the key strategic differences that have impacted : Determine the key strategic differences that have impacted the relative success of both Amazon.com and Yahoo.com. Provide two (2) specific examples of such strategic differences to support the response.
Find the modified internal rate of return : Find the Modified Internal Rate of Return (MIRR) for the following annual series of cash flows, given a discount rate of 10.50%: Year 0: -$75,000; Year 1: $15,000; Year 2: $16,000; Year 3: $17,000; Year 4: $17,500; and, Year 5: $18,000.
Security plan for the network : Utilizing the security mechanisms you have learned design the security plan for the network according to the project manager's requirements
Technology have changed the way managers perform tasks : The four management tasks (planning, organizing, directing, evaluating) existed long before computers. Discuss how the use of computers and technology have changed the way managers perform these tasks.
Appropriate cost of capital tools : Operational leverage should discuss the appropriate cost of capital tools including weighted average cost of capital and the capital asset pricing model.
Calculate the value of the project : Use the WACC method to calculate the value of the project. Assume that both the comparison firm and out firm have risk-free debt and risk-free tax shields.
Explain the importance of communication protocols : Explain the importance of communication protocols and Define the overall network architecture

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd