What is a firewall

Assignment Help Computer Network Security
Reference no: EM13785907

Project 1

You are the senior network architect for a large corporation. The company has offices in L.A., New York, and Miami. The company has been experiencing tremendous growth over the last year, and as a result, management has decided to hire temporary workers to fulfill the customer service duties. You must ensure that a logical design is in place that relegates access to other areas of the network and improves performance. You planned on using VLANs and firewalls to accomplish this deployment requirement. Your boss wants to see a report of your planned approach so that she can make that presentation to upper management.

In a 2-3 page document, explain the following to your boss:

•What is a VLAN?

•What is a firewall?

•How does a VLAN and firewall combination assist you in achieving the desired goal?

•What additional benefits can be achieved from implementing VLANs?

Use a diagram as an aid in explaining the deployment of the combined technologies.

2-3 page report and a diagram

Project 2

You work for a University that has over 3500 students on campus. The you supports about 600 staff and faculty that are also supported on the same network. The university presently uses an analog phone system and the administration is looking to deploy voice over IP solution. Before they move forward, they want to ensure that the environment can support the technology. Your manager has assigned you and two other engineers to do some do an assessment of the network and based on the assessment results. Recommend an appropriate solution to support VoIP in the network.

Create a 2-3 page report that includes the following:

•Switch assessment and requirement

•QoS requirement if needed and why

•POE requirements and support

•Appropriate network subnet design

Description how traffic will be handled based on your design proposal

Project 3

You are the network manager for a local university. Every year, you are audited to ensure that you are meeting with SOX compliance. In the environment, you support more than 5,000 user accounts in the network over 100 servers and more than 1,000 workstations. The environment supports e-mail servers, database services, and many Web-based applications.

Based on the services that are running in your environment, create a report of 2 -3 pages that includes the following:

•Research and discuss steps than can be taken to complete an assessment ahead of your SOX audit.

•Research and identify a solution that could be leveraged to automate the audit process of one or more applications.

Based on your report, create 4-6 PowerPoint slides that summarize the following:

•Your audit utility solution

Also, submit a 2-3 page report

Reference no: EM13785907

Questions Cloud

Issue managment life cycle process model : Apply the issue managment life cycle process model to this case. Which stages of the process can you identify in this case?
How can you make clear the advantage hiring : Explain one way in which you could make your superior information literacy skills evident in job interview. What examples could you use? How can you make clear the advantage hiring you would provide the employer?
What federal or state laws protect owners of intellectual : What federal or state laws protect owners of intellectual property? How do they apply here? Explain. What damages, if any, has Mathis suffered because of Normandale's conduct? Explain
Estimate the value of abc : Estimate the value of ABC Co using the price/earnings ratio method and discuss the usefulness of the variables that you have used.
What is a firewall : What is a firewall. How does a VLAN and firewall combination assist you in achieving the desired goal
What range of output would the new equipment be purchased : C&A currently has fixed costs of $200 per month and variable cost of $40 per unit for its production operations. They are considering the purchase of a new equipment that will raise the fixed costs to $500 per month but reduce the variable cost to $3..
Prepare a presentation on united postal services : Prepare a presentation on united postal services on social cost and benefits.
About the fixed costs-variable costs : Process A has fixed costs of $2000 and variable costs of $40 per unit. Process B has fixed costs of $5000 and variable costs of $30 per unit. Which of the following statements is true?
Calculate total project cost for mixed-use development : Calculate the total project cost for this mixed-use development from the information provided. If lenders are willing to provide 60% of the project cost in the form of debt, calculate the dollar amount of debt and equity that Frank Douglas must rais..

Reviews

Write a Review

Computer Network Security Questions & Answers

  List three key things employees remember on data privacy

List at three key things employees should remember on data privacy, security practices, and the legal implications of data privacy. The document should be something which draws someone to look at it while still maintaining professional appearan..

  Define the repository usernames and passwords

Install the distributed revision control system subversion from the Debian package of the same name. After installation you will need to configure subversion to be usable.

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  Create an overloaded constructor

Create the statements to make an overloaded constructor for the class named Car. The constructors should support 0, 1, or 2 arguments. The 1st argument will denote engine size and contain an Integer.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Select a research topic from the list below after selecting

cybersecurity research paperselect a research topic from the list below. after selecting your topic research the

  Packet filtering firewall and stateful inspection firewall

What is the difference between a packet filtering firewall and a stateful inspection firewall? 12.6 What is an application-level gateway?

  What security features given by running special software

What security features could be given without changing mail delivery infrastructure, i.e., by only running special software at source and destination?

  Several convicted cases of cyberstalking

There are several convicted cases of cyberstalking and Internet fraud/abuse. Misha Glenny, a United Kingdom-based journalist, recently wrote a book on the subject matter appropriately titled Dark Markets

  What are the security issues of this

The majority of Australian SMEs are not taking advantage of cloud computing services, though uptake is strengthening among individuals, according to new research.

  Why change the default administrator login and password

what are some of the important measures you can take to ensure that your home wireless network is safe and secure. Change the default administrator login and password. Use something only you will remember.

  Effects of security controls

The three effects of security controls are prevention, detection, and recovery. Briefly explain how these effects are related to the known good state

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd