Analyze the pros and cons of each alternative architecture

Assignment Help Management Information Sys
Reference no: EM131813364 , Length: 2

• Proposal for a Secure Network Architecture

You have been hired by an international coffee and tea retailer with hundreds of shops around the world. This organization, like most in the industry, is known for providing high-end coffees, teas, and snacks in a caf setting frequented by neighbors and business people in search of an Internet connection.

This organization has a corporate headquarters located in Seattle, Washington. Your task is to recommend a network architecture that will be optimal for the organization to implement in order to offer secure public wireless in each location in a consistent, cost-effective, and secure manner.

Engage in research to explore the available alternatives that would fit these criteria as well as apply the information from the required study materials.

Write a 2-3 page paper that covers the following topics:

• Describe the alternative architectures that would be appropriate to meet the objectives of the project.

• Analyze the pros and cons of each alternative architecture.

• Determine the security implications of each alternative architecture.

• Recommend an architecture that is optimal for implementation by this coffee and tea retailer

• Provide support for your recommendations.

Assignment Requirements

• Written communication: Written communication is free of errors that detract from the overall message.

• APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.

• Length of paper: 2-3 pages, excluding the references page.

• Font and font size: Times New Roman, 12 point.

• Required Reading

The required reading covers design considerations for creating a secure network and will support completion of the unit assignment and discussion.

• Use Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems to read Chapter 3, "The Processes," pages 33-75.

• Web Resources

Videos

The objectives of these videos are to explore applications of network technology and security architectures currently in use and those proposed for the future as well as to provide some context for the required reading and inform the Unit 2 assignment and discussion.

• Level(3) Sponsor Talk: Leveraging Network Intelligence for Data Security (30 minutes).

• Future Network Architectures, SDN, CNN at NetEvents Ethernet 40 Innovations Summit (31 minutes).

Internet and Library Research

Engage in research using the following keywords to explore modern network architectures and the security implications that are associated with those architectures:

• Secure network architecture.

• Secure network design.

• Network architecture alternatives.

• Network design alternatives.

• Network design tools.

• Network architecture development tools.

Reference no: EM131813364

Questions Cloud

Discuss what factors go into deciding what makes up : Security is just one of the trade-offs that organizations must consider when designing their network infrastructure.
What is the relevant cost to make a unit for special order : A customer has offered to buy 14,000 units for $26 each. What is the relevant (incremental) cost to make a unit for the special order
Estimating the state insurance commission : A state insurance commission estimates that 13% of all motorists in its state are uninsured. Suppose this proportion is valid.
Identify and define the users of accounting information : What is accounting information? What role does it play in the firm
Analyze the pros and cons of each alternative architecture : Describe the alternative architectures that would be appropriate to meet the objectives of the project.
What collaborative methods of problem : What collaborative methods of problem MEE 5901, Advanced Solid Waste Management 3 solving could be use to solve the marketing team's problem of choosing an RPF?
Write a report to update her about the potential liability : write a report to update her about the potential liability that auditors face as a result of the global financial crisis
Determine documents will contain with some sort of error : An outside financial auditor has observed that about 4% of all documents he examines contain an error of some sort. Assuming this proportion to be accurate.
Calculate the net cash flow from investing activities : The following information was taken from ABC Company's 2018 income statement: Calculate the net cash flow from investing activities for 2018

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd