An information security changes required in the environment

Assignment Help Computer Network Security
Reference no: EM13307784

Question 1.

The management of your employer wants to find out about desktop virtualisation and how it works. They think that there may be some advantage to the organisation from adopting some of these desktop virtualisation technologies.

You have been tasked to provide a two (2) page report that describes the differences between the different desktop virtualisation technologies that are now available.

Your report should briefly outline how each virtualisation technology works and indicate the circumstances where the use of each type of technology would be appropriate.

Your report should be supported by references to academic and/or practitioner literature in APA 6th edition format.

Question 2.

An affiliated company of your employer has approximately 2000 users who work on Windows XP workstations. Management wishes to upgrade the operating system to Windows 8 without refreshing and updating its desktop fleet.

Describe which virtualisation technology would be the better choice for virtualising this fleet of workstations. Your report should not exceed two (2) pages and it should include the following information:

Describe your reasons for choosing this virtualisation technology

What advantages does this virtualisation technology give you in this scenario?

What are the disadvantages of using this technology?

Which vendor would you recommend for this and why would you recommend their implementation of this technology?

Your report should be supported by references to academic and/or practitioner literature in APA 6th edition format.

Assignment 2

Regional Gardens Ltd is a company that runs a number of related gardening enterprises. It has a large display garden that it opens for public inspection a number of times a year. The company also ownsthe Regional Gardens Nursery which sells plants and garden supplies to the public. The company also owns Regional Garden Planners, which is a small company that provides garden advice, design and consultancy services.

Regional Gardens Ltd has a small data centre at its main site in Bathurst where the company's servers and data storage is located. The company has the following server infrastructure:

2 x Active Directory domain controllers on Windows Server 2012, (2 x Xeon 3.6GHZ, 8GB RAM, 140GB HDD);

3 x SQL Server 2012 database servers on Windows Server 2012 (2 x Xeon 2.8GHZ, 12GB RAM, 250GB RAID-5 array);

1 x MS Exchange Server 2013 email server on Windows Server 2012 (2 x Xeon 3.6GHZ, 8GB RAM, 250GB RAID-1 array);

4 x Windows Server 2012 File and Print servers (2 x Xeon 2.8GHZ, 4GB RAM, 250GB RAID-1 array);

2 x Red Hat Enterprise 6 Linux servers running Apache and TomCat (2 x Xeon 2.8GHZ, 16GB RAM, 140GB HDD).

The company has some 150 staff, who include management, administrative staff, nursery and Regional Garden Planners staff. The company has a range of different types of relatively old personal computers, which run Windows XP, to connect to the company data centre. These computers will need to be updated in the near future.

The directors of Regional Gardens Ltd are concerned about the increasing costs of power and cooling to operate their data centre and they are investigating whether they should employ a virtualization technology in their data centre. They are also considering whether they should use virtualisation to provide an updated desktop environment to their staff.

You are to consider how to implement a virtual infrastructure for the company and prepare a report for the directors of Regional Gardens Ltd. Your report should include:

A one (1) page Executive Summary that describes the main points of your report

A description of the proposed virtual infrastructure for the data centre, including which virtualisation technology is recommended and the reasons for that recommendation

A description of how virtual applications or desktops (or both) will be delivered to the user's desktops

A description of how you will provide disaster recovery in this infrastructure

A discussion of the information security changes required in this environment and the steps taken to monitor and control these changes

Your argument must be supported by references to academic and/or practitioner literature. All references must be in APA 6th edition format.

Reference no: EM13307784

Questions Cloud

What is the mathematical expression for the magnetic field : A plane electromagnetic wave propagates in a vacuum in the z-direction. What is the mathematical expression for the magnetic field
Write program that prompts user to pick either seat or price : Write a program that prompts users to pick either a seat or a price. Mark sold seats by changing the price to 0. When a user specifies a seat, make sure it is available.
Use ray tracing to determine the height of the image : A near-sighted person might correct his vision by wearing diverging lenses with focal length f = -60cm.  use ray tracing to determine the height of the image
Determine the tsp emission rate of the power plant : On a clear summer afternoon with a wind speed of 3.20 m/s measured at 100 m elevation, the TSP (total suspended solids) concentration was found to be 1520 ug / m3 at a point 2 km downwind
An information security changes required in the environment : A description of how you will provide disaster recovery in this infrastructure. A discussion of the information security changes required in this environment and the steps taken to monitor and control these changes
Competitor evaluation benchmark : Your company has decided to provide you with a new tablet of your choice. However, you must bring your procurement manager a proposal for your selection with benchmark of selected product capabilities and costs. Using MS Excel, build a Competitor Eva..
Write a program that asks user to input grade of student : Write a program that asks the user to input the grade of the student. If the grade is equal or greater than 60, the program prints the word "pass", otherwise it prints the word "fail".
Find the height to which the block rises : Type your question hereA bullet (m = 0.0210 kg) is fired with a speed of 92.00 m/s and hits a block (M = 2.60 kg) supported by two light strings as shown, Find the height to which the block rises
Find the first four terms of recursively defined sequence : Find the first four terms of the recursively defined sequence bk = 2k - bk - 1, for all integers k greater than or equal to 2, where b1 = 4

Reviews

Write a Review

Computer Network Security Questions & Answers

  Federal government regulates labels

The federal government regulates labels, warranties, and consumer products. Without government regulation, what abuses are likely to occur?

  What are the security issues of this

The majority of Australian SMEs are not taking advantage of cloud computing services, though uptake is strengthening among individuals, according to new research.

  What is the value of shared secret key

You have secretly picked the value SA = 17. You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 291. What is the value of your shared secret key?

  Type of security problems computer services encounter

Students would enter the room, pick up their jobs, and leave. What kinds of security problems might computer services encounter with a system such as this?

  What percentage of the modules exceed the structure

Examine the product quality from the point of view of the customer and what percentage of the modules exceed the structure / architecture guidelines?

  Calculate an rsa signature on a long message

Would it be reasonable to compute an RSA signature on a long message by ?rst computing what the message equals mod n, for some ?xed n and then signing this computed value only. Why or why not?

  Cluster architecture for the servers and databases

What type of OS to use along with the file system and why is this architecture is better than others? Will you use the same OS for servers and Desktops? Will your file system of choice provide security?

  Define ethics for the information age

Define ethics for the information age; cite your sources. You may use any original works but may not discuss your answers with fellow classmates.

  Compute the entry in the rijndaels-box

Compute the entry in the RijndaelS-box

  Targets of security breaches can be larger-smaller companies

Study three recent information security breaches. Do the key targets appear to be larger or smaller companies? Is there particular industry which appears predominately targeted?

  Implement encryption and decryption of the vigenere cipher

Implement both encryption AND decryption of the Vigenere cipher with 26 English letters and 1 space character

  A virus is a program that attaches itself to other programs

A virus is a program that attaches itself to other programs. An infected user must take some sort of action to spread a virus to others. A worm functions as an independent program

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd