An information security changes required in the environment

Assignment Help Computer Network Security
Reference no: EM13307784

Question 1.

The management of your employer wants to find out about desktop virtualisation and how it works. They think that there may be some advantage to the organisation from adopting some of these desktop virtualisation technologies.

You have been tasked to provide a two (2) page report that describes the differences between the different desktop virtualisation technologies that are now available.

Your report should briefly outline how each virtualisation technology works and indicate the circumstances where the use of each type of technology would be appropriate.

Your report should be supported by references to academic and/or practitioner literature in APA 6th edition format.

Question 2.

An affiliated company of your employer has approximately 2000 users who work on Windows XP workstations. Management wishes to upgrade the operating system to Windows 8 without refreshing and updating its desktop fleet.

Describe which virtualisation technology would be the better choice for virtualising this fleet of workstations. Your report should not exceed two (2) pages and it should include the following information:

Describe your reasons for choosing this virtualisation technology

What advantages does this virtualisation technology give you in this scenario?

What are the disadvantages of using this technology?

Which vendor would you recommend for this and why would you recommend their implementation of this technology?

Your report should be supported by references to academic and/or practitioner literature in APA 6th edition format.

Assignment 2

Regional Gardens Ltd is a company that runs a number of related gardening enterprises. It has a large display garden that it opens for public inspection a number of times a year. The company also ownsthe Regional Gardens Nursery which sells plants and garden supplies to the public. The company also owns Regional Garden Planners, which is a small company that provides garden advice, design and consultancy services.

Regional Gardens Ltd has a small data centre at its main site in Bathurst where the company's servers and data storage is located. The company has the following server infrastructure:

2 x Active Directory domain controllers on Windows Server 2012, (2 x Xeon 3.6GHZ, 8GB RAM, 140GB HDD);

3 x SQL Server 2012 database servers on Windows Server 2012 (2 x Xeon 2.8GHZ, 12GB RAM, 250GB RAID-5 array);

1 x MS Exchange Server 2013 email server on Windows Server 2012 (2 x Xeon 3.6GHZ, 8GB RAM, 250GB RAID-1 array);

4 x Windows Server 2012 File and Print servers (2 x Xeon 2.8GHZ, 4GB RAM, 250GB RAID-1 array);

2 x Red Hat Enterprise 6 Linux servers running Apache and TomCat (2 x Xeon 2.8GHZ, 16GB RAM, 140GB HDD).

The company has some 150 staff, who include management, administrative staff, nursery and Regional Garden Planners staff. The company has a range of different types of relatively old personal computers, which run Windows XP, to connect to the company data centre. These computers will need to be updated in the near future.

The directors of Regional Gardens Ltd are concerned about the increasing costs of power and cooling to operate their data centre and they are investigating whether they should employ a virtualization technology in their data centre. They are also considering whether they should use virtualisation to provide an updated desktop environment to their staff.

You are to consider how to implement a virtual infrastructure for the company and prepare a report for the directors of Regional Gardens Ltd. Your report should include:

A one (1) page Executive Summary that describes the main points of your report

A description of the proposed virtual infrastructure for the data centre, including which virtualisation technology is recommended and the reasons for that recommendation

A description of how virtual applications or desktops (or both) will be delivered to the user's desktops

A description of how you will provide disaster recovery in this infrastructure

A discussion of the information security changes required in this environment and the steps taken to monitor and control these changes

Your argument must be supported by references to academic and/or practitioner literature. All references must be in APA 6th edition format.

Reference no: EM13307784

Questions Cloud

What is the mathematical expression for the magnetic field : A plane electromagnetic wave propagates in a vacuum in the z-direction. What is the mathematical expression for the magnetic field
Write program that prompts user to pick either seat or price : Write a program that prompts users to pick either a seat or a price. Mark sold seats by changing the price to 0. When a user specifies a seat, make sure it is available.
Use ray tracing to determine the height of the image : A near-sighted person might correct his vision by wearing diverging lenses with focal length f = -60cm.  use ray tracing to determine the height of the image
Determine the tsp emission rate of the power plant : On a clear summer afternoon with a wind speed of 3.20 m/s measured at 100 m elevation, the TSP (total suspended solids) concentration was found to be 1520 ug / m3 at a point 2 km downwind
An information security changes required in the environment : A description of how you will provide disaster recovery in this infrastructure. A discussion of the information security changes required in this environment and the steps taken to monitor and control these changes
Competitor evaluation benchmark : Your company has decided to provide you with a new tablet of your choice. However, you must bring your procurement manager a proposal for your selection with benchmark of selected product capabilities and costs. Using MS Excel, build a Competitor Eva..
Write a program that asks user to input grade of student : Write a program that asks the user to input the grade of the student. If the grade is equal or greater than 60, the program prints the word "pass", otherwise it prints the word "fail".
Find the height to which the block rises : Type your question hereA bullet (m = 0.0210 kg) is fired with a speed of 92.00 m/s and hits a block (M = 2.60 kg) supported by two light strings as shown, Find the height to which the block rises
Find the first four terms of recursively defined sequence : Find the first four terms of the recursively defined sequence bk = 2k - bk - 1, for all integers k greater than or equal to 2, where b1 = 4

Reviews

Write a Review

Computer Network Security Questions & Answers

  Compute value of shared secret key

You have secretly picked value SA = 17. You begin session by sending Bob your computed value of TA. Bob responds by sending you value TB = 291. What is the value of your shared secret key?

  Explaining asymmetric encryption algorithms

Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob. You should include any steps taken by Bob that allow him to read the message.

  Prepare a diagram using rationale

Analyse the article/case study from the perspective of at least two different classical ethical theories and present well reasoned arguments for your assessments and recommendations.

  Explain network security management-flow diagram

Network Security Management-flow diagram, assets and detail of functions. I have completed the assets and flow diagrams and interfaces. Start systems engineering on for MIIS, based on prior homework assignments:

  Compare u.s. and e.u. policies

Compare U.S. and E.U. policies and underlying philosophies of privacy. Include references to monitoring and privacy in the workplace, surveillance, and disclosure/data privacy. In your estimation, could self-regulation be effective or does it need to..

  Describe network crimes related to dns entry alteration

Describe network crimes that are related to DNS entry alteration or bogus DNS servers. In a network investigation, some network administrators may be cooperative while others may not.

  Question about program consistency

Please provide an example of a event where consistency has caused too many problems? Is there a program you have used in your own work environment where consistency has caused problems?

  Defects of gsm networks

Security mechanism, threat, GSM networks, DDoS attacks, IPv4, IPv6, IPsec integrity, authentication and privacy, IPsec AH,  ‘single sign-on' in the context of access control, Secure Electronic Transaction (SET) protoco,  Encryption

  Case study on byod

Identify the primary benefits of BYOD in organizations, and determine the key ways in which its concepts can enhance an end user's overall working experience.

  Scenario-based project

Authentic Assessment:   The scenario will be a realistic, enterprise-level situation encompassing diverse networking components, including Microsoft Windows, Linux, VoIP, security, wireless, and Cisco technologies.

  Describing security topology covers four primary areas

Security topology covers four primary areas of concern (design goals, security zones, technologies, and business requirements). Describe each area including key topics in each area. Discuss software threats.

  Explain rsa public-key encryption scheme

Consider the plain (i.e., non-padded) RSA public-key encryption scheme. Encrypt the message m = 12 using the public key pk = (N,e), where N = 35 and e = 3.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd