How you will set up the servers to have redundancy

Assignment Help Management Information Sys
Reference no: EM131166559

Case Study

Your company, Patrician LLC, develops wireless transmission technology. Upper management has decided to move the headquarters and primary operations to Tucson, Arizona and create a disaster recovery site in a newly purchased building in Cheyenne, Wyoming.

Patrician, LLC, while most of its technology is for the civilian market, has one Research and Development unit that is developing a secure microburst technology for use in the military market. This unit is made up of many people that do not currently live in either Cheyenne or Tucson and the company has no plans to force their relocation to Tucson.

Both buildings are 3 floors in height and have approximately 150,000 square feet. As the senior CISSP, you have been tasked with designing the network solution with both functionality and usability in mind.

Further specifications\company requirements:

1. The two buildings will be consideredidentical. The Cheyenne, WY building does not have to be described as it is a mirror hot site for business continuity\disaster recovery

2. There needs to be a constant connection between the buildings with no less than 32 Mbps throughput

3. There will be a datacenter on the third floor

4. There will be 100 network connections on each floor

5. There are 4 primary divisions in the company: Headquarters\Administration, Sales\Customer support, Research and Development (this division includes the secure microburst group) and Information Technology

6. The members of the secure microburst research group that do not live in Tucson need to be able to connect to the primary datacenter at any time

7. Physical security as well as logical must be considered

8. There are file servers, database servers, corporate webservers and external sales webservers and all must have high-availability

9. All servers must have redundancy (both physical and how they are configured)

10. The solution should have a plan to verify security measures

Case requirements:

1. You should submitnetwork drawingsshowing

a. the topology of the network

b. the topology of the VPN setup

They should include the hardware (and be labeled as such) but only generally - no brand names or models, just "switch", "firewall", "router", "server" and so on; any cabling differences should be noted as well.

2. You should include a paper that contains the following:

a. List any recommended cable and where it will be used

b. List the type of connection you will utilize to ensure 32 Mbps connection between sites (do not just give a medium, like fiber or copper, or just a protocol)

c. Recommend wiring closets wherever needed

d. Recommend any WAN or wireless technologies; mention and explain what topologies you used and why

e. How you will set up the servers (both physical and logical should be explained) to have

i. redundancy
ii. high-availability

f. What logical protections you recommend

i. What measures you will take to protect against attack
ii. What measures you will take to prevent attacks
iii. What measures you will take to be notified that you are being attacked

g. Recommend and describe logical (i.e. network)traps to stop attackers

h. Any physical security measures you deem appropriate

i. What they are
ii. Where they are
i. How the remote users will connect

j. How will security measures be verified?
k. Justify your recommendations

Reference no: EM131166559

Questions Cloud

Describe a day in the life of a factory worker : Describe a day in the life of a factory worker. Include information about family life, description of the hazards in the workplace, and perspectives about the upper and working classes.
Calculate the number of teeth in a pinion to mesh : Also calculate the number of teeth in a pinion to mesh with a gear of equal size without involute interference. The addendum equals the module.
Describe two potential sources of conflict within project : Describe two potential sources of conflict within your project and how you will determine if the conflict is good or bad. Discuss two potential sources of stress within your project and the methods you can use to reduce that stress
Summarize sources that you have gathered to support research : The purpose of an annotated bibliography is to summarize the sources that you have gathered to support a research proposal project.
How you will set up the servers to have redundancy : What logical protections you recommend- What measures you will take to protect against attack, What measures you will take to prevent attacks and What measures you will take to be notified that you are being attacked.
How has technology aided inventory management : What are some of the ways in which a company can reduce the need for inventories? How has technology aided inventory management
Effect of pollution is to make crop land less productive : Suppose we have an agricultural valley 100km by 50km, with a polluting electricity power plant. The power plant causes pollution problems on a narrow strip of land downwind of the plant, and within this valley 10km in length and 500 m in width, but n..
Evidence based practice to improve patient quality : Describe how you will use evidence-based practice to improve patient quality and safety in your health care setting.
Describe spread of industry throughout europe and into usa : Briefly describe the spread of industry throughout Europe and into America. Discuss Nationalism in the 19th century, including its origins, positives, and negatives.

Reviews

Write a Review

Management Information Sys Questions & Answers

  How to deploy and configure intranet and web applications

Propose the best way to plan, deploy, and configure the file servers. Determine how to deploy and configure the intranet and Web applications

  Key components that webmasters must face

The advantages and disadvantages of outsourcing or insourcing while developing or redesigning your website. Listed below are several key components that webmasters must face when entering the world of ecommerce

  Determine the part of an it security program

Determine the part of an IT security program that you believe is the most challenging for organizations to implement. Justify your reasoning

  New larger 3d printers now can produce a variety of object

New larger 3D printers now can produce a variety of objects for business and medical use by using polymers and plastics to reproduce complex digital design files.

  Analysis of the process variability

Converging technologies - An analysis of the process variability based upon your understanding of the process and any data collected

  Computers and information processing

Computers and information processing: accuracy, convenience, storage device, speed - Describe the role of each of the following in determining the speed of a computer:

  Backdoor access and take a stand

Backdoor access and Take a stand on whether this is a good or a bad practice and give several reasons for your choice.

  Procurement and contract management

What do you believe is the "big picture" and what solution do you propose for the above scenario and Can this be a win/win situation or does it have to be a win/lose situation?

  Challenges of managing a global telecommunications network

Identify the major challenges of managing a global telecommunications network and tell how firms can effectively manage international data communications

  This post addresses views of learningcompare and contrast

this post addresses views of learning.compare and contrast the three views of learning. which do you feel is most

  Describe some of the common vulnerabilities

Describe some of the common vulnerabilities to utility companies with a virus such as Stuxnet.

  Technology advancement and data collection

Technology Advancement and Data Collection - How does the advancement of technology affect the ability to collect data? Provide examples. Does this advancement also increase the chance for errors?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd