Design a network security

Assignment Help Basic Computer Science
Reference no: EM13902165

Design a network, network security, and WAN connectivity for the following situation 

Organization of 100 computer users in three locations:

Location one: 2 buildings, 25 computer users in each building. 50 Total

Location two: 1 building, 15 computers 

Location three: 1 building 35 computer users 

Document your design as follows: 

  1. Introduction to the design Explanation of equipment and software used. MS WORD
  2. Diagram of the entire network. PPT
  3. Diagrams for each location. PPT
  4. Explanation of security procedures. MS WORD
  5. Explanation of WAN connection. MS WORD

 Include with your documentation a PowerPoint presentation of 10 slides illustrating the key points you would convey to management and users.

YOU WILL submit TO ME:  the 2 FILES BELOW

1. A MS WORD DOCUMENT

2. A POWERPOINT PRESENTATION

 

Reference no: EM13902165

Questions Cloud

Identify costs to construct facility that should capitalized : Assume that a company needs to acquire a large special-purpose materials handling facility. Identify the costs to construct this facility that should be capitalized as assets.
Determine the distance to the fault : By multiplying the rhs brackets and collecting terms, show the effect of the leads is given by: Rx = (Rf-Ri/Rf) Rc-(RiRi/Rf). Determine the distance to the fault by modifying the expression in (b) and using Rx/Rc = x/L
Prepare a table with the following column headings : In January 2013, ProTech Co. pays $1,550,000 for a tract of land with two buildings.
What are the mission, values, goals and objectives : What are the (mission, values, goals and objectives) of the organization?
Design a network security : Design a network, network security, and WAN connectivity for the following situation  Organization of 100 computer users in three locations: Location one: 2 buildings, 25 computer users in each building. 50 Total
Represent the greatest advancement : 1. Which do you consider to represent the greatest advancement: Quantum mechanics or discovering the shape of the DNA molecule--- and why?
Evaluate the user dialog strategies used by a menu-driven : Write a four to five (4-5) page paper in which you:Evaluate the user dialog strategies used by a menu-driven interface.Determine why menu-driven interfaces continue to be popular in the modern computing age.
Identify a possible technology : What kind of questions might you ask in-order to identify a possible technology? Is there any other information you can identify and provide that would be useful in solving this problem?
Dispose of the pumped groundwater : If groundwater from a contaminated plume is pumped out using strategically placed wells to contain the contamination. What options do you have to dispose of the pumped groundwater?

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  The values of the sysuptime in the system group

An SNMP manager sends a request for the values of the sysUpTime in the System group. Write the PDU with the fields filled in for the get-request PDU

  Clearly label and list the geometrical design variables

Provide a hand-drawn sketch of a representative table (four-legged with rectangular table top) and clearly label and list the geometrical design variables. Be as comprehensive as possible.

  Program should display a menu

The program should display a menu allowing the user to enter pointer values by selecting option 1, then perform shallow or deep copy by selecting options 2 or 3. After whcich, your program needs to display the new results after the copy is performed.

  Principles of logical design

Explain the principles of logical design. Discuss the strengths and weaknesses of various network designs. Demonstrate an understanding of network design by presenting their own designs and share and promote own design by means of written communic..

  Write a program that generates a sequence of 20 random value

write a program that generates a sequence of 20 random values between 0 and 99, prints the sequence, sorts it, and prints the sorted sequence. use the sort function form the standard C++ library.

  The organizational strategy

Where would database processing systems and spreadsheets fit into the organizational strategy

  Executing critical section in mutual exclusion protocol

In Lamport's mutual exclusion protocol, if process i is implementing critical section.

  Write a while loop to print 1 through 6 in square brackets

Write a while loop to print 1 through 6 in square brackets

  What could be your priority in babas case

What are the structural design considerations that Air Force Computer Forensics Laboratory must have considered and Design a chain of custody form and fill in appropriately dummy information

  Explaining it acquisition issued request for proposal

A federal agency that does not use IT acquisition best practices issued a request for proposal that requires the contractor selected to use such practices, including certification at CMMI Level 3 or above.

  Project team affect the modeling requirements

How does the size of the project team affect the modeling requirements?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd