Submit a network drawing listing the networks topology

Assignment Help Management Information Sys
Reference no: EM131945045

Telecommunications : Network Security Plan Project Assignment

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government.

Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed.

As a security professional, you have been employed todesign a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:

1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

2. Each facility has three floors. The buildings are rectangular with each floor being 350'x350'.

3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

4. The primary data center will be located at the Atlanta location.

5. There will be a failover data center at the Cincinnati location.

6. Each location should be protected from intrusions that are not limited to state change attacks.

7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

8. There will be database servers located at the Cincinnati site.

9. The servers must have redundancy.

10. The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

1. You should submit a network drawing listing the network's topology including any necessary hardware.

2. You should list any recommended cable.

3. You can recommend wiring closets wherever you need them.

4. You should recommend ways to assure that you are not getting attacked.

5. You should build traps to stop attackers.

6. You should recommend any WAN or wireless technologies.

7. You should recommend any technology needed in the data center for high availability.

8. Justify your recommendations.

Paper formatting requirements:

Your paper must be submitted as a Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins.

You should have at least 10 pages, not including Title and Reference pages. Please include appropriate diagrams and images for your network security plan.

All academic sources must be cited using the latest APA guidelines. Section and Sub-section headings should be used throughout the paper.

• For in-text citations, the citation needs to go inside the end of the sentence. For example: This is my sentence on APA formatting (APA, 2016).

• For references, this list should start on a new page at the end of your document with a hanging indent (the title of the page should be References). You do not need to include the retrieved date. Here are some examples:

Smyth, A. M., Parker, A. L., & Pease, D. L. (2002).A study of enjoyment of peas.Journal of Abnormal Eating, 8(3), 120-125.

Bernstein, M. (2002).10 tips on writing the living Web.A List Apart: For People Who Make Websites, 149.

De Huff, E. W. (n.d.). Taytay's tales: Traditional Pueblo Indian tales. University of Pennsylvania.

• Start your paragraph with an indent (tab).

• Use section and sub-section headings

Reference no: EM131945045

Questions Cloud

List functional requirements and non-functional requirements : List two functional requirements (FRs). List two non-functional requirements (NFRs). List the actors of the WebApp. Draw a use case diagram for the
Methods used by banks to model and manage credit risk : Discuss the methods used by banks to model and manage credit risk.
Describe the steps used to create a sequence diagram : How is the object approach different from the data and process approaches to systems development?
Discussing a specific species of plant : initial blog post discussing a specific species of plant and the benefit you chose. Be sure to describe what type of plant it is. Where is it found
Submit a network drawing listing the networks topology : You should submit a network drawing listing the network's topology including any necessary hardware.
The loan balance should be repaid in increments : The loan balance should be repaid in increments of $5,000 whenever there is surplus cash. How much will the company have to borrow at the end of July?
Different legal forms of business organization : What are the advantages and disadvantages of different legal forms of business organization?
Company performance to present at upcoming board : Brief analysis of the company’s performance to present at the upcoming board of directors meeting.
Explore how different type of glass affect building security : Explore how does the different types of glass affect building security and how would you implement the different types of glass into the facility.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd