Validate and support the relationship between

Assignment Help Computer Engineering
Reference no: EM13478145

The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one (1) floor to three (3) floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. Additionally, the security of the network should be in the forefront of your design because protecting your data is a primary consideration.

Section 1: Infrastructure Document

1. Write an infrastructure document in which you:

a. Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.

b. Present the rationale for the logical and physical topographical layout of the planned network.

c. Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

d. Illustrate the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Note: Facility limitations, workstations, databases, printers, routers, switches, bridges, and access points should be considered in the illustration.

e. Create and describe a comprehensive security policy for this data-collection and analysis company that will:

i. Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.

ii. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Reference no: EM13478145

Questions Cloud

How does use of internet intranets and extranets by : why do big companies still fail in their use of information technology? what should they be doing differently? discuss
Distinguish physical security from logical security and : question 1 imagine a local financial company just expanded its operations into five branches connected over a broadband
Eplain with example role of information system in modern : the success of mis function in any organization will depend upon the relative position of the chief of the mis function
Provide an example where a t-test would be useful in health : 1. you have the following data.groupc0000011111intelligencec10090110120130 8590958090run a t-test for this data.
Validate and support the relationship between : the infrastructure which encompasses the network solution and security considerations is a major consideration for your
Evaluate from a management perspective the different kinds : assess from a management perspective the different types of security models and their implications to protect the
As a software engineer youve been asked to write a paper : as a software engineer you have been asked to write a paper that describes the use of current technologies with regard
One of the main functions of any business is to be able to : one of the main functions of any business is to be able to use data to leverage a strategic competitive advantage. this
Estimate megatrend of demographics in it field give opinion : evaluate the megatrend of demographics in the it field. give your opinion as to why it managers must understand this

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd