Design a logical and topographical layout of planned network

Assignment Help Computer Network Security
Reference no: EM131142533

Project Deliverable: Network Infrastructure and Security

This assignment consists of two sections: an infrastructure document and a revised Gantt chart or project plan.

The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one floor to three floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. Additionally, the security of the network should be in the forefront of your design because protecting your data is a primary consideration.

Section 1: Infrastructure Document

1. Write a four to six page infrastructure document in which you:

? Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.
? Present the rationale for the logical and physical topographical layout of the planned network.
? Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
? Illustrate the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Note: Facility limitations, workstations, databases, printers, routers, switches, bridges, and access points should be considered in the illustration.
? Create and describe a comprehensive security policy for this data-collection and analysis company that will:

• Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity, and availability of information.

• Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Section 2: Revised Project Plan

Use Microsoft Project to:

2. Update the project plan from Project Deliverable 4: Analytics, Interfaces, and Cloud Technology, with three to five (3-5) new project tasks each consisting of five to ten (5-10) sub-tasks.

Reference no: EM131142533

Questions Cloud

Discuss auto backup for android applications : What are the different data types supported as preference-setting values? What is the directory on the Android file system that stores application Preference XML files? Discuss Auto Backup for Android Applications.
Write a paper by answering following question : How has the history of decolonialism and post-colonialism, and global inequality contributed to the developing threat of terrorism?
Find the critical temperature for thermal damage : Do you expect that to be lower or higher than a constant temperature case of the same exposure duration?
How does socioeconomics effect what is in the report : What is a pre-sentencing investigation report and how does the use of that report affect an offender's eligibility for bail (pretrial release vs pretrial detention), a pretrial diversion program, and sentencing and/or probation? How does socioecon..
Design a logical and topographical layout of planned network : Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia.
Discuss the issue of attorney obligations : Discuss here the issue of attorney's obligations under the rule of Confidentiality and the filing of permits for emissions, discharge or waste disposal at facilities
Is this a reasonable value from a physiologic point of view : Is this a reasonable value from a physiologic point of view? Would the patient be considered normal or diabetic?
Write an essay geared towards synthesizing your ideas : write an essay geared towards synthesizing your ideas. Use complete sentences and adhere to standard rules of English grammar, punctuation, mechanics, and spelling.
Who actually formed these ideas : Discuss the following: Who actually formed these ideas? Expand upon the ideas of the 5 general principles. Why do you think they were implemented

Reviews

Write a Review

Computer Network Security Questions & Answers

  Network security and access control

Network Security and Access Control-You are a senior network security professional at your company. Your company has 150 employees

  Identify the key elements in certificate

Identify the key elements in this certificate, including the owners name and public key, its validity dates, the name of the CA that signed it, and the type and value of signature.

  Identify a recently announced security vulnerability

Your task is to identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack and the mitigation strategies.

  What should be minimum key size increase to meet objective

Considering the continuous increase in computer speed, the company decided to increase the size of the encryption key so that the time to break the encryption become more than 250 hours. What should be the minimum key size increase to meet this ob..

  Explain simple issue specific security policy in school

Rrules and regulations you have been provided with in your institution.does your school have a similar policy?does it contain all the elements listed in the text?

  Relationship between infrastructure and security

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company. Present the rationale for the logical and physical topographical layout of the planned network

  How does it affect performance and security

Sector level hard disk encryption is one of the most interesting problems of all. Assume that AES-128 is used to encrypt your local hard disk. What mode will you use? CBC or ECB?

  Termination of a project

As a assignment manager, you are asked to facilitate a lessons learned session as part of the assignment termination process.

  The 2 main types of communications media used for network

the 2 main types of communications media used for network connections are wired connections and wireless connections.

  Develop a security plan and recommendation memo to the cio

Develop a Security Plan and Recommendation Memo to the CIO

  Evaluate ability of different cloud computing architectures

Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind etal, and the ASD Cloud Computing Security Considerations as your primary references.

  Describe the issues you might face when maintaining security

Write a 3-to 4-page paper describing the some of the issues you might face when maintaining security in a company that has offices in multiple countries.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd