Design and provide the ip scheme for the network

Assignment Help Computer Network Security
Reference no: EM131310632

CASE PROJECT:  LAW FIRM

Company:  Law Firm: Lincoln Partners, Esq.

A law firm has hired you as a Network Security Consultant to help its operations by providing a secure network to support its growth.  The Law firm currently has offices in Philadelphia, Cherry Hill, Wilmington, Harrisburg and Princeton.  Its corporate office out of Philadelphia will provide all of its IT support.

Philadelphia Office is the main corporate office and consists of the following groups

Legal Group

Partners:  There are 3 Attorneys that are the principals of the firm.

Associates:  There are 10 Associates, attorneys, who work for the firm but do not share in the company profits, and therefore are not partners.

Paralegals: There are 15 Paralegals, who work on a part time basis to support the law firm

Office Manager:  One manager who is responsible to support the office and she is responsible to ensure that everything runs smoothly, such as telephone, Fax, Copy, Supplies, Utilities, IT, etc. Also Manages the Cherry Hill Location.

IT Admin:  He is responsible for maintaining all of the IT equipment: Internet Services, Telephone Services, Desktops, Servers, Routers and Switches, and Website. Also supports the Cherry Hill location.

Other Offices:

Associates:  There are three associates, who help get new clients from other offices and their respective areas.

Paralegal: There is one paralegal to support the associates

IT Background Information

 

Philadelphia

Other Offices

Servers (Windows )

1

1

Desktops

20

4

Network Printers / Copier / Fax

1

0

Desktop Printers

5 - (Partners, Office Manager, IT Admin)

4

Laptops

4

0

Routers

1

1

Switches

1 Main 2 Distributions

1

Website - Outsourced

Outsourced

 

Email -

Outsourced

 

Security Issues:  What concerns the partners at this firm

1) Associates and paralegals taking clients / stealing business

2) Not having the ability to monitor business in remote locations

3) Reduce Costs in IT by consolidating

4) Privacy for their clients information

Task 1: Design a Secure Network using either Visio, Paint, Word, etc showing the All locations.

Task 2: Design and provide the IP Scheme for the network

Task 3: Establish a VPN between the All offices and allow the ability to work from home.

Task 4: Allow all employees the ability to access servers at the other locations

Task 5: Show and/or document all necessary security controls and its configuration. And allocate rules (format for rules should be same as attached file 2 )

Task 6: Update the firewalls to ensure security policy is enforced

Task 7: Show the DMZ on the diagram and placement of servers and Eliminate Outsourcing

Additionally, a new database (DB) system has been implemented in the Philadelphia office that is accessible by all locations.  The DB holds client data that is confidential, and needs to be properly protected.  The DB system also tracks attorney hours and allows the attorneys to charge the right customers.  Many attorneys have been issued laptops and now have the ability to VPN from home.

Reference no: EM131310632

Questions Cloud

What circumstances should the state increase restrictions : Should the United States adopt information-control regulations similar to Britain's Official Secrets Act?What are the policy implications of permitting journalists to have the same degree of access to information as occurred during the Vietnam War?
Important contributor to incident management process : Penetration testing is a particularly important contributor to the incident management process. Explain why that is the case, and provide examples of how penetration test results can be used to improve the incident response process.
How long can the air freshener provide fragrance : What is the initial rate of aroma delivery to the surrounding in grams/hour?- How long can the air freshener provide fragrance?
How should i handle the given situation : When confronted, Sarah admitted to the breach of confidentiality. She hasn't made any other mistakes, though, and I really depend on her. How should I handle this situation?
Design and provide the ip scheme for the network : Design a Secure Network using either Visio, Paint, Word, etc showing the All locations. Design and provide the IP Scheme for the network. Establish a VPN between the All offices and allow the ability to work from home
Exception error and explain potential implications : Select a Java program that contains an exception error. The exception error can be one that you have encountered yourself or one you located using the Internet. Describe your chosen exception error and explain potential implications.
Design an autoassociator for these patterns : What response does the network give to the test input pattern, p, shown to the left?
How common is the problem : introduce this topic (i.e., introduce the topic to a casual reader), being sure to present evidence (from the literature) that supports your conclusion that the problem is worthy of concern (How serious is the problem? How common is the problem? ..
Identify various threats to the validity of a proposed topic : In this assignment, you will identify the various threats to the validity of a proposed research topic. The different types of threats to validity and a brief explanation of the threats that are appropriate for your research design.

Reviews

Write a Review

Computer Network Security Questions & Answers

  New technologies using sophisticated anti-copying measures

Which is more probably to be effective in protecting intellectual property in digital media like CDs and DVDs: tougher copyright laws or new technologies incorporating more sophisticated anti-copying measures?

  Calculate cost of goods sold

How would you calculate cost of goods sold? What items make up cost of goods sold? How does beginning and ending inventory affect cost of goods sold?

  Assignment on cryptographic systems

The Week 10 Critical Thinking assignment continues with the scenario set up for the Critical Thinking assignment in Week 8. You have been hired as the chief officer of information technology at a retail store in Medina City. The store has 5000 cus..

  Describe the prevailing view that experts hold

Describe the prevailing view that experts hold about the likely future of the concept in question. Include the views of at least three experts to support your response.

  Formulate plans for how to approach the immediate issue

formulate plans for how to approach the immediate issue with Stella, and to continue business in the future, assuming that they want to continue using only RSA. Assume that the directors do not know what RSA is and/or how it works.

  Summarize two key information security practices

Summarize two key information security practices you recommend the company implement. Provide supporting examples/research/justification for your two recommended information security practices. Use appropriate terminology learned from the informa..

  How does a syn attack deny service

How long is the data portion of each packet? Why?Why is the sequence number zero (seq=0) in every packet?Why do the port numbers change in every packet?

  Calculates the hash value

Alice is able to intercept the message, and generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's or..

  Limits of information privacy

Question 1: Does the governments have the right to go our information privacy? Question 2: What is the limits of information privacy?

  Case study on research genetics

ABC Institute of Research has sensitive information that needs to be protected from its rivals. The Institute has collaborated with XYZ Inc. to research genetics. The information must be kept top secret at any cost.

  Article on wireless hacking

Research via the internet and find an article in the news regarding wireless hacking, hardware hacking, or other security breach. As security and IT change so rapidly, your article should be no older than 2007.

  Discuss a situation where you received security education

You have probably received some form of information security education, either in your workplace, school, or other settings. Discuss a situation where you received security education. How was it delivered?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd