Validate and support the relationship between

Assignment Help Computer Engineering
Reference no: EM13478145

The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one (1) floor to three (3) floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. Additionally, the security of the network should be in the forefront of your design because protecting your data is a primary consideration.

Section 1: Infrastructure Document

1. Write an infrastructure document in which you:

a. Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.

b. Present the rationale for the logical and physical topographical layout of the planned network.

c. Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

d. Illustrate the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Note: Facility limitations, workstations, databases, printers, routers, switches, bridges, and access points should be considered in the illustration.

e. Create and describe a comprehensive security policy for this data-collection and analysis company that will:

i. Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.

ii. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Reference no: EM13478145

Questions Cloud

How does use of internet intranets and extranets by : why do big companies still fail in their use of information technology? what should they be doing differently? discuss
Distinguish physical security from logical security and : question 1 imagine a local financial company just expanded its operations into five branches connected over a broadband
Eplain with example role of information system in modern : the success of mis function in any organization will depend upon the relative position of the chief of the mis function
Provide an example where a t-test would be useful in health : 1. you have the following data.groupc0000011111intelligencec10090110120130 8590958090run a t-test for this data.
Validate and support the relationship between : the infrastructure which encompasses the network solution and security considerations is a major consideration for your
Evaluate from a management perspective the different kinds : assess from a management perspective the different types of security models and their implications to protect the
As a software engineer youve been asked to write a paper : as a software engineer you have been asked to write a paper that describes the use of current technologies with regard
One of the main functions of any business is to be able to : one of the main functions of any business is to be able to use data to leverage a strategic competitive advantage. this
Estimate megatrend of demographics in it field give opinion : evaluate the megatrend of demographics in the it field. give your opinion as to why it managers must understand this

Reviews

Write a Review

Computer Engineering Questions & Answers

  Consider any of the supercomputing examples

Consider any of the supercomputing examples we discussed in class, and find a scientific paper describing it. Although you can use Wikipedia and similar sites as a starting point, you must find an article in a valid IEEE or ACM publication (journa..

  Program can be used with a video rental business

Extend above with a Rental class. This class must store a Movie that is rented, an integer representing the ID of the customer who rented the movie, and an integer indicating how many days late the movie is.

  The advantages and disadvantages of standardization

find the advantages and disadvantages of standardization in computer hardware and system software.

  Systems research and investigate novel ideas and

systems research and investigate novel ideas and applications.write a research report outlining the architecture and

  What are the ethical implications of it system use locate

what are the ethical implications of it system use? locate an ethical situation you are familiar with or that you have

  Question1 write down a css rule that gives all h1 and h2

question1. write down a css rule that gives all h1 and h2 elements a padding of 0.5 ems a dashed border style and a

  Express about choosing which server-side scripting language

You've been hired by Company X to create a web site which will include a data-driven component. Describe how you would go about choosing which server-side scripting language

  What are the pros and cons of a dhcp server

What are the pros and cons of having a DHCP server on each network segment, versus having some of the network segments receive their IP address and network configuration via a router using a DHCP relay agent? Consider how your answer depends on th..

  Describe the use of queries in an ehr

define a query that you would use as a continuous tool in an EHR.

  At what rate must the magnetic field change

At what rate must the magnetic field change with the time if an induced current of 10 A is to appear in the loop?The resistivity of copper is 1.7X10^-8 ohm.

  Write down the class descriptions for each of the two

yacht is a class that is derived from the boat class. the boat class has two data members that represent weight and

  Write down a 200- to 300-word response recognizing how the

write a 200- to 300-word response identifying how the tasks of an internal and frontline computer support technician

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd