Secure assets on wwtc network

Assignment Help Basic Computer Science
Reference no: EM131218973

This is network security design group assignment, my part of the assignment is to write about the roles of security devices. I supposed to used devices correctly with security technologies and stated clearly role of devices in diagram along with configurations. I have attached the diagram and other document I have on this project so far, please I need a tutor with knowledge in computer Networking to help me with this project. All devices need to be a cisco devices and paper needs to be in APA format and references as well. Please approach the question using this rough draft below:

Roles of Security Devices for WWTC: I will divided the network design into five layers and described the roles of security devices in each layer.

1. Physical layer: Door locks, Smart card, HVAC, CCTV, Guards, Remote backup facilities and etc.

2. Roles of devices for ISO layer 2: Switches will be needed

3. Next layer is securing ISO level 3: Routers will needed and VPN

4. Firewall and distributions layer: I will use the Cisco ASA 5500 corporate firewall and NIDS

5. finally, I will talk about how we can use servers or radius serves to secure assets on WWTC network.

Reference no: EM131218973

Questions Cloud

Use the orthogonality principle to find the mmse estimator : Suppose we are allowed to observe a random process Z(r) at two points in time, ro and ri . - Use the orthogonality principle to find the MMSE estimator.
What needs to be done to enforce minimum cardinality : Describe a MUST constraint. Give an example other than one in this chapter.
Describe your firms current raroc system : How would a risk management system differ for a bank/investment firm compared to a construction firm that has high risk investments? Describe your firm's current RAROC system?
What are the pros and cons of locating materials handling : Case Study - Centralised distribution at Nike. What are the pros and cons of locating materials handling operations, such as labelling and packing, in a distribution centre, as opposed to in a factory
Secure assets on wwtc network : 1. Physical layer: Door locks, Smart card, HVAC, CCTV, Guards, Remote backup facilities and etc. 2. Roles of devices for ISO layer 2: Switches will be needed 3. Next layer is securing ISO level 3: Routers will needed and VPN
Use the orthogonality principle to find the mmse estimator : Use the orthogonality principle to find the MMSE estimator. -  Find an expression for the mean square error of the MMSE estimator.
Describe step taken by the bank to ensure it remains solvent : Discuss the importance of risk capital to the banking industry, in particular, Wells Fargo Bank, Citigroup, or Bank of America. Describe the steps taken by the bank to ensure it remains solvent.
Find the wiener hopf equation for the optimum filter : Find the Wiener-Hopf equation for the optimum (in the minimum mean square error (MMSE) sense) filter. - Find the form of the Wiener filter.
Develop cloud-based solutions for an organization : Explain the benefits and drawbacks of using software development tools provided by cloud vendors to develop cloud-based solutions for an organization.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find the volume of a wedge for an arbitrary angle

Two planes cut a right circular cylinder to form a wedge. One plane is perpendicular to the axis of the cylinder and the second makes an angle of θ degrees with the first. (Use r for the radius.)

  Determine the minimum of f x by hand

Determine the minimum of f ( x ) by hand. Report the values of the optimum x and the function value at this point.

  What phases of each can be run concurrently

What changes to garbage collection algorithms can facilitate concurrent garbage collection?

  Kinds of support and tools are available with visual basic

What kinds of support and tools are available with Visual Basic? Sum-up your research, and make sure to reply to each of the questions.

  Create a method that prints rectangle characters to console

Create a method that prints a rectangle of characters to the console

  Digital forensic analyst performs

Identify two reported cases that have impacted the evidentiary process or analysis in digital forensic cases; student will cite the case and summarize the issue before the court; the majority of the analysis should be dedicated to the impact the c..

  Image for further instructions on cloud computing

Image for further instructions on Cloud Computing

  Specific ways to format research papers

When writing papers on a college/university level, there are specific ways to format research papers. The most common format is APA. The second most common format is MLA. What are some differences between APA format and MLA format?

  The design pattern capability is built into the ide

Review the Design Patterns you have learned this module (CRC Cards and Sun Blue Print Designs.) Use the Internet to find at least two other design patterns. What are the advantages and disadvantages of each? What happens when the design patter..

  Determine the operations reqltired to instruct the data path

Determine the operations reqltired to instruct the data path

  Strategic planning on the it systems

Discuss two major issues involved with acquiring systems and two major issues commonly faced when maintaining them. Address how each can be minimized or overcome.

  What is an array and why are they important in programming

What is a multi dimensional arrays. What purposes can you think of for multi dimensional arrays.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd