What is a firewall

Assignment Help Computer Network Security
Reference no: EM13785907

Project 1

You are the senior network architect for a large corporation. The company has offices in L.A., New York, and Miami. The company has been experiencing tremendous growth over the last year, and as a result, management has decided to hire temporary workers to fulfill the customer service duties. You must ensure that a logical design is in place that relegates access to other areas of the network and improves performance. You planned on using VLANs and firewalls to accomplish this deployment requirement. Your boss wants to see a report of your planned approach so that she can make that presentation to upper management.

In a 2-3 page document, explain the following to your boss:

•What is a VLAN?

•What is a firewall?

•How does a VLAN and firewall combination assist you in achieving the desired goal?

•What additional benefits can be achieved from implementing VLANs?

Use a diagram as an aid in explaining the deployment of the combined technologies.

2-3 page report and a diagram

Project 2

You work for a University that has over 3500 students on campus. The you supports about 600 staff and faculty that are also supported on the same network. The university presently uses an analog phone system and the administration is looking to deploy voice over IP solution. Before they move forward, they want to ensure that the environment can support the technology. Your manager has assigned you and two other engineers to do some do an assessment of the network and based on the assessment results. Recommend an appropriate solution to support VoIP in the network.

Create a 2-3 page report that includes the following:

•Switch assessment and requirement

•QoS requirement if needed and why

•POE requirements and support

•Appropriate network subnet design

Description how traffic will be handled based on your design proposal

Project 3

You are the network manager for a local university. Every year, you are audited to ensure that you are meeting with SOX compliance. In the environment, you support more than 5,000 user accounts in the network over 100 servers and more than 1,000 workstations. The environment supports e-mail servers, database services, and many Web-based applications.

Based on the services that are running in your environment, create a report of 2 -3 pages that includes the following:

•Research and discuss steps than can be taken to complete an assessment ahead of your SOX audit.

•Research and identify a solution that could be leveraged to automate the audit process of one or more applications.

Based on your report, create 4-6 PowerPoint slides that summarize the following:

•Your audit utility solution

Also, submit a 2-3 page report

Reference no: EM13785907

Questions Cloud

Issue managment life cycle process model : Apply the issue managment life cycle process model to this case. Which stages of the process can you identify in this case?
How can you make clear the advantage hiring : Explain one way in which you could make your superior information literacy skills evident in job interview. What examples could you use? How can you make clear the advantage hiring you would provide the employer?
What federal or state laws protect owners of intellectual : What federal or state laws protect owners of intellectual property? How do they apply here? Explain. What damages, if any, has Mathis suffered because of Normandale's conduct? Explain
Estimate the value of abc : Estimate the value of ABC Co using the price/earnings ratio method and discuss the usefulness of the variables that you have used.
What is a firewall : What is a firewall. How does a VLAN and firewall combination assist you in achieving the desired goal
What range of output would the new equipment be purchased : C&A currently has fixed costs of $200 per month and variable cost of $40 per unit for its production operations. They are considering the purchase of a new equipment that will raise the fixed costs to $500 per month but reduce the variable cost to $3..
Prepare a presentation on united postal services : Prepare a presentation on united postal services on social cost and benefits.
About the fixed costs-variable costs : Process A has fixed costs of $2000 and variable costs of $40 per unit. Process B has fixed costs of $5000 and variable costs of $30 per unit. Which of the following statements is true?
Calculate total project cost for mixed-use development : Calculate the total project cost for this mixed-use development from the information provided. If lenders are willing to provide 60% of the project cost in the form of debt, calculate the dollar amount of debt and equity that Frank Douglas must rais..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd