Problem regarding the infrastructure and security

Assignment Help Basic Computer Science
Reference no: EM131192402

Project Deliverable 5: Infrastructure and Security

This assignment consists of one (1) section: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one (1) floor to three (3) floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. Additionally, the security of the network should be in the forefront of your design because protecting your data is a primary consideration. 

Section 1: Infrastructure Document

  1. Write a four to six (4-6) page infrastructure document in which you:
  • Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.
  • Present the rationale for the logical and physical topographical layout of the planned network.
  • Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
  • Illustrate the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Note: Facility limitations, workstations, databases, printers, routers, switches, bridges, and access points should be considered in the illustration.
  • Create and describe a comprehensive security policy for this data-collection and analysis company that will:

Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.

Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.

Reference no: EM131192402

Questions Cloud

Explain what roles did black slaves play in the civil war : What roles did Northern women play in the war effort on Union side during the Civil War? What roles did Black slaves play in the Civil War? What roles did free Blacks play in the Civil War? How did the war affect each group?
Payroll report with a list of all the employee : After all data are input and calculated, the program will display a payroll report with a list of all the employee names and weekly pay. In addition, the program will display the total payroll for the week, and the average weekly pay.
Description of your experience in collecting the data : After you have selected your methods for collecting the data, select the position (a job) to analyze and use at least two of the methods for collecting data, collect the data using the methods selected and summarize your findings in a short job de..
The price sensitivity of health care demand : When they need to go to the doctor, they go, regardless of the cost.-  Evaluate this argument in light of the empirical evidence on the price sensitivity of health care demand.
Problem regarding the infrastructure and security : This assignment consists of one (1) section: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section..
Identify significant factors that might influence your work : Identify two significant external factors that might influence your work if you served in a leadership or management role in social work. Explain why these external factors are significant and how they might affect your work as a leader or manager..
What were some of the unfair labor practices : Does arbitration tend to help or hinder public employee bargaining? Be sure to explain and support your position. Does collective bargaining legislation increase the amount of strikes? Explain and support your position.
Agent of manchester automobile repair : What are the elements for an agency relationship to be created? Was Tim Davidson an agent of Manchester Automobile Repair? Why or why not? Was the customer entitled to conclude that Tim was an agent of the business? What legal concepts are implica..
Provide a list of the codes you developed for your interview : Provide a list of the codes you developed for your interview transcript. A description of your thinking or working process, explaining how you developed your codes, including any evolution of your coding system.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The poisson distribution with parameter ramda?

a) the "distribution" where N is the same fixed number with probability 1?b) the Poisson distribution with parameter ramda?

  Problem regarding the networking with windows

The sales people at Company XYZ all use laptops, so they can take data with them on the road. You are a salesperson for a computer business and you are trying to talk Company XYZ into upgrading the laptops from Windows 7 to Windows 8.1.

  Probability-first game joe enters is fourth game of season

Joe Coledge is the third-string quarterback for the University of Alatoona. What is the probability that the first game Joe enters is the fourth game of the season?

  What is ntp and what are clock strata

 What is UTC and why is it used and what is NTP and what are "clock strata"?

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

  Print the elements of the array on the screen

2. Write a C program using a pointer for keying six integers by the user. The six values are stored in an array using a pointer. Then print the elements of the array on the screen.

  How much does stalling hurt the performance

How much does stalling hurt the performance if 20% of all instructions are conditional branches? Ignore all sources of stalling except conditional branches.

  Critically evaluate the use and importance of clusters

Critically Evaluate The Use And Importance Of Clusters As Enhancing National Competitiveness. Provide evidence of both academic referances and real-life examples to support your answer.

  It budget on security

What you need to convey to your CEO is that network attacks are continuing to make the news and organizations have reacted by increasingly spending more of their overall IT budget on security. Business executives are starting to have questions about ..

  Assignment on university database

A prestigious university has recently implemented a consolidation strategy that will require it to centralize their student records. In order to move forward, the local university will need to develop a data model that will retain student records ..

  Development of an integrated system which retrieves client

All 3 assignments in this unit involve creating and building upon a Customer Relationship Management (CRM) system for a nation-wide logistics company. In assignment 3 we aim to link assignments 1 and 2 together in order to add a rebate processor.

  Identify the advantages and disadvantages of using word

Identify the advantages and disadvantages of using Word to work with graphics, tables, and special formatting functionality. Provide specific examples. Create a list of "Word Best Practices" to keep in mind when using Word or other word documen..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd