How to create one overall network

Assignment Help Computer Network Security
Reference no: EM13864588

Pasternak and Pym, a local bookstore, has contacted you as they have heard good things about your network design skills. They currently have a wireless network set up for the business, but would like to allow customers to browse the web while they sip a beverage in the coffee shop. Be sure to cite your sources.

P&P has requested that you send them your ideas and recommendations in memo form on how to create one overall network that incorporates the two wireless networks (the protected bookstore network and the unprotected public network). They would like to see a diagram of the entire network, costs, and how long it would take to implement.

Using either a Microsoft Word Memo template or another example, create a memo outlining the request, answering all P&P's questions, including a diagram. You can use any drawing software (Visio, PowerPoint, Word, etc.) to create the diagram.

Due to the fast pace of technological change in information systems, IT professionals must constantly update their knowledge. This can be accomplished by many means including continuing formal classroom education, on-the-job training, short courses offered by software and hardware vendors, and continual assimilation of new information from books, periodicals, and other sources. In many cases, knowledge must be gained in topics for which the professional has little or no formal training or education.

The purpose of this research assignment is to prepare you for self-directed learning and research activities and then apply the results of your research to pending business decisions. In this class, the research will take place in four phases:

• First, the student will select a topic that is directly related to this course of study.

• Second, the student will create an abstract.

• Third, the student will assemble a set of information sources on the problem. These sources will provide enough background information so the major aspects of the topic can be discussed. A tentative outline of the paper, and a tentative list of sources.

• Fourth, the student will present a draft of the paper to www.TurnItIn.com and then to the group of fellow students for discussion. Students will read each others' papers and offer comments and suggestions on the style, ideas, concepts, and conclusions of the papers.

• Fifth and finally, the student will submit the final version of the research paper to the instructor.

To successfully complete this research project, you must do several things:

• gain sufficient background knowledge to provide a basis for understanding the topic.

• find sources of information on the topic.

• assimilate the information to a high degree of expertise.

• effectively communicate the information in written form.

You are expected to become knowledgeable about the topic. This implies that you must be able to understand all of the relevant technical information. It also implies an ability to critically evaluate the topic.

You are expected to have gained proficiency in written communication. This assignment will require that you demonstrate that proficiency with respect to a technical topic. Your research paper should clearly communicate the technical details and critical analysis of your topic in an organized and concise manner.

Verified Expert

Reference no: EM13864588

What is web security were mentioned in the last six months

Write a research paper/presentation on what is application/web security and recent attacks that were mentioned in the last 6 months. Present your views and experts' views,

Analyze the significance of hacking

Analyze the significance of hacking in organizations and modern society. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do n

What will be public values transmit for commuication

Alice and Bob choose the numbers 6 and 10 privately. What will be the public values they transmit and what would be the final secret computed?

What is the real vulnerability associated with open network

CSIS 343- Although the thought of a wireless network attack can be terrifying, what is the real vulnerability associated with an open wireless network? Are users of an open

Use the diffie-hellman public-key algorithm

You are Alice. You have agreed with your friend Bob that you will use the Diffie-Hellman public-key algorithm to exchange secret keys. You and Bob have agreed to use the pub

Evaluate an organization''s security policies

Evaluate an organization's security policies and risk management procedures, and its ability to provide security countermeasures. Analyze the methods of managing, controlling

Owasp top 10 web application security risks

Reflected XSS and Stored XSS attack, threat Modeling methodologies, Extended Stack Pointer (ESP) and the Extended Base Pointer (EBP), Canary-based defense to buffer overflow

Research and devise a plan to thwart malicious code

Research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Troj

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd