How to create a security policy, Computer Network Security

Assignment Help:

Five years ago, Calgary Kids' Cloth Ltd was just a small retail store in downtown Calgary. The company started their own factory in SE Calgary to produce outdoor clothes for kids. Two years later, the product became popular and the company decided to expand their business a cross Canada by opening more retail stores on Toronto, Montreal, Vancouver and second store in Calgary. The company also expanded its factory in Calgary to a new product line. Each retail store manages the inventory and accounting information by themselves and faxes the data back to the Company Head office in Calgary daily, for sales and monthly for inventory. Some stores use their own software for accounting and inventory some just use paper to keep track of all information. The Head office in Calgary was using in-house software to manage the accounting, inventory, sales and marketing information and also using leased line connections to the factory.

Up to this year, the company had 70 retail stores across Canada and another factory in southern Ontario to supply the product in eastern Canada. All retail stores are using computers to keep their accounting, inventory and sales information and use modems to transfer data to the head office.

The Company Head office has an Access Server with five telephone lines to receive the dialup connection from the 70 retail stores everyday. Each telephone line is used for 14 stores, with each store dialing to the head office half an hour apart, starting from midnight.

Some stores have their own Internet connection to the computer that is used for the store management program and some stores have another separate computer to connect to the Internet and some don't have an Internet connection at all.

The president of the company want to open 10 more locations in Canada and start to export the product to the USA and Europe and also interested in opening an online store on the Internet.

1.      Detail a network design for the Local Area Network for the new stores

2.      Create an IT and Security Policy for all the retail stores, factories and head office.

  • Include network diagrams for the final design
  • Do costing of the design, and list all product usage.
  • It is important that your design be justified using your own conclusions.

Related Discussions:- How to create a security policy

Perimeter Network Security System coursework, what is the guaranteed qualit...

what is the guaranteed quality of this coursework? how many days it take for 10-12 pages? how much will be? thanks

Wfabilling project in java, WFABilling project in Java:  Project Title...

WFABilling project in Java:  Project Title: WFABilling   Role                      : Developer Domain                 : Tele-Com Environment          : Java, J2EE, S

Explain in des data encryption standard, Explain in DES Data Encryption Sta...

Explain in DES Data Encryption Standard : DES stands for Data Encryption Standard and is explained as follows: DES is at present the most widely used key cryptographic systems

Provide the network configuration, QUESTION: a) Below is a capture of a...

QUESTION: a) Below is a capture of an Ethernet II frame which has an IPv4 packet and a segment. Provide the source MAC address in hexadecimal; the source IP address, the length

Explain possible attacks on rsa encryption, Problem (a) Describe RSA a...

Problem (a) Describe RSA algorithm with an example. (b) Answer the following RSA encryption, given the values of the primes are: p = 17, q = 11 and choosing e = 7. (c)

Carrier sense multiple access (csma), CARRIER  SENSE MULTIPLE ACCESS (CSMA...

CARRIER  SENSE MULTIPLE ACCESS (CSMA) There is no central access management when computers transfer on Ethernet. For this solution the Ethernet employs CSMA to coordinate tran

Determine the round trip time, a) determine the RTT (round trip time) betwe...

a) determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Assume a one-way propagati

Example of a public key algorithm, Question : (a) There are two approa...

Question : (a) There are two approaches for providing confidentiality for packets in a network using symmetric encryption: End-to-End Encryption and Link Encryption. State wh

Explain the random key distribution, Q. Explain the random key distribution...

Q. Explain the random key distribution? The triple key management mechanisms ensure a better and complete security solution using the random key distribution mechanism. In this

Define network, A Network is described as a system for connecting compu...

A Network is described as a system for connecting computers using a single transmission technology. The computers can interact with each other in a network. They can receive an

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd