What measures you will take to protect against attack

Assignment Help Computer Engineering
Reference no: EM131264382 , Length: 3500 words

Case Study Assignment

Your company, Praetor, Inc, develops non-lethal crowd control technology for police and military use. It has decided to move the headquarters and primary operations to Amarillo, Texas and utilize an outside disaster recovery company to provide a disaster recovery hot site in Wayne, Pennsylvania.

Praetor, Inc, while most of its technology is for the civilian police market, has one Research and Development unit that is developing a light-based crowd control device for large groups for use by the military market. This unit is made up of 25 people - many of which do not currently live in Amarillo and the company has no plans to force their relocation to the new location.

The headquarters building is 3 floors in height and have approximately 150,000 square feet. As the senior CISSP, you have been tasked with designing the network solution with both functionality and usability in mind for the new location.

Further specifications\company requirements:

1. The primary site (Amarillo) is the only one you need to concern yourself with designing as the hot site (Wayne) is considered to be logically identical as it is a mirror hot site for business continuity\disaster recovery

2. There needs to be a constant connection between the two sites with no less than 105 Mbps throughput

3. There will be a datacenter on the third floor

4. There will be 100 network connections on each floor

5. There are 4 primary divisions in the company: Headquarters\Administration, Sales\Customer support, Research and Development (this division includes the Light device research t group) and Information Technology

6. The members of the Light device research group that do not live in Amarillo need to be able to connect to the primary datacenter at any time

7. Physical security as well as logical must be considered

8. There are file servers, database servers, corporate webservers and external sales webservers and all must have high-availability

9. All servers must have redundancy (both physical and how they are configured)

10. The solution should have a plan to verify security measures

Case requirements:

1. You should submit network drawings showing

a. the topology of the network
b. the topology of the VPN setup

They should include the hardware (and be labeled as such) but only generally - no brand names or models, just "switch", "firewall", "router", "server" and so on; any cabling differences should be noted as well.

2. You should include a paper that contains the following:

a. List any recommended cable and where it will be used
b. List the type of connection you will utilize to ensure 105 Mbps connection between sites (do not just give a medium, like fiber or copper, or just a protocol)
c. Recommend wiring closets wherever needed
d. Recommend any WAN or wireless technologies; mention and explain what topologies you used and why
e. How you will set up the servers (both physical and logical should be explained) to have:

i. redundancy
ii. high-availability
f. What logical protections you recommend
i. What measures you will take to protect against attack
ii. What measures you will take to prevent attacks
iii. What measures you will take to be notified that you are being attacked

g. Recommend and describe logical (i.e. network) traps to stop attackers

h. Any physical security measures you deem appropriate

i. What they are
ii. Where they are
iii. How they protect

i. How the remote users will connect securely
j. How will security measures be verified?
k. Justify your recommendations.

Verified Expert

Overview:- The company has absolute to transfer the head office and main processes to Texas, Amarillo and use an outdoor disaster retrieval business to deliver a disaster rescue hot location in Wayne, Pennsylvania. This paper will define the site network topology and secure VPN connection along with the required elements that will make up a new business set-up or network. The control center building is comprise of about 3 floors in elevation and have around 150,000 total square feet. As the high-ranking CISSP, we proposed with designing the network elucidation with together usability and functionality in attention for the freshsite.

Reference no: EM131264382

Questions Cloud

Create a data flow diagram of some given system : Create a data flow diagram of some system. Can use a real world example or a hypothetical one. Write a summary explaining the data flow diagram and trust boundaries.
What would be the optimal level of mosquito control : Suppose the mosquito control is a pure public good; that is, once it is produced everyone benefits from it. What would be the optimal level of mosquito control if it could be produced with a constant marginal cost of $100 per unit and there are no ..
What measures you will take to protect against attack : What measures you will take to protect against attack? What measures you will take to prevent attacks? What measures you will take to be notified that you are being attacked?
What are the clients strengths : What are the client's strengths and how can you apply these strengths to appropriate interventions -  identify each technique as you work towards appropriate interventions with the client. To do this you will need to develop a brief dialogue
Develop a funding proposal for the agency : Develop a funding proposal for the agency -  Identify community partnerships that would collaborate with the agency to advance its mission
How should the balance sheet be expanded to prevent : Using an internet search tool, locate Procter & gamble’s investor relations web site. Under “Financial reporting,” you will find the company’s 2009 annual report. How should the balance sheet be expanded to prevent this?
Write a program that determine which number produce sequence : Write a program that determines which numbers produce a happy sequence, within a series of test numbers. Main will call a user-defined function to read the first and last numbers for the range to test from the user.

Reviews

Write a Review

Computer Engineering Questions & Answers

  You work for a regional forensic computer lab and have been

you work for a regional forensic computer lab and have been tasked with recovering all data from a suspects cellular

  Create a program that displays all of numbers in the file

Create a program that displays all of numbers in the file

  Implementation of type data structures

How can string and word variable type data structures be implemented?

  When the first request arrives in the disk request queue

As in our previous question, when the first request arrives in the disk request queue, the read/write head is at track 50, moving toward the outer (lower-numbered) tracks.

  Vulnerabilities of routers and web servers

Explain the vulnerabilities of routers and the Web servers and remediation strategies which will make them more secure.

  Define the key concepts that are involved

Explain the key concepts that are involved in transaction processing. explain the concepts and provide an explanation of the commands that are involved in the transaction. Also, explain the advantages of using transaction processing in your code.

  What are the types of malicious attack

What are the types of malicious attack

  Sequence of actual mips instructions

use a sequence of actual MIPS instructions to implement the similar behavior.

  Write a compiler program that allows variables

Write a compiler program that allows variables in the postfix expressions; for each variable, the program should ask the user for the value of this variable, and then compute the value of the corresponding expression.

  Describe why a high degree of coupling among components of

q1. explain why a high degree of coupling among components of a software system can make maintenance of the system

  Question1 assume that a file containing a series of

question1. assume that a file containing a series of integers is named number.dat and exists on the computers disk.

  Questionin situation of parallel computing platform

questionin situation of parallel computing platform describe-i bisection width ii arc connectivity iii diameter

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd