Describe a comprehensive security policy for this data

Assignment Help Science
Reference no: EM132311941

The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one (1) floor to three (3) floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. Additionally, the security of the network should be in the forefront of your design because protecting your data is a primary consideration.

Section 1: Infrastructure Document

Write a four to six (4-6) page infrastructure document in which you:

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.

Present the rationale for the logical and physical topographical layout of the planned network.

Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

Illustrate the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Note: Facility limitations, workstations, databases, printers, routers, switches, bridges, and access points should be considered in the illustration.

Create and describe a comprehensive security policy for this data-collection and analysis company that will:

Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.

Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Reference no: EM132311941

Questions Cloud

Analyze US political news article from RealClearPolitics : For this News Briefing Quest task, pick and analyze a U.S. political news article from RealClearPolitics. Present your own opinion about the political issue,
Applicability of concept to your professional practice : How well you demonstrate knowledge and understanding of concept and critical thinking pertaining to applicability of concept to your professional practice.
Explain how the nonprofits filled the need : Explain how the nonprofits filled the need. Describe intended and unintended consequences of these partnerships. Use two to four scholarly resources to support
Who had digestive disorders or difficulties such as ulcers : During your lifetime you may have known individuals who had a digestive disorders or difficulties such as ulcers or irritable bowel syndrome,
Describe a comprehensive security policy for this data : Create and describe a comprehensive security policy for data-collection and analysis company that will. Address ethical aspects related to employee behavior.
Why students should take professional communications course : Develop promotional message that is no more than one page to explain why students should take a professional communications course
Differences between the texts of motet and madrigal : What are the differences between the texts of a motet and a madrigal? How does the music for these forms reflect these differences?
What kinds of cyber-attacks have you experienced : What kinds of cyber-attacks have you experienced? Have you had a computer that was infected with a virus? Have you fallen for a phishing scheme?
Discusses issue from both workplace and societal viewpoint : You will choose social issue affecting workplace-working environment and develop paper that thoroughly discusses issue from both workplace-societal viewpoint.

Reviews

Write a Review

Science Questions & Answers

  Write a comment about hand hygiene compliance

Write a comment about hand hygiene compliance.

  Evaluate the argument for its soundness

A sound argument is valid (correctly formed) and has all true premises. Your book Chapters 8 and 9 discuss several ways to test the soundness of an argument. Now it is your turn to apply the tests. Go to a website that provides political opinio..

  Identify the heritability of a particular behavior

One of the goals of behavioral genetics is to identify the heritability of a particular behavior

  Explain to the couple the likely exposure

Assuming your suspicion is correct, explain to the couple the likely exposure source and one possible treatment for this toxicant.

  Write two ways to increase your whole grains

What % of your grains were whole grains? What does MyPlate recommend for whole grains? Write two ways to increase your whole grains.

  The health and human service profession

What is social-cultural values? Explain at least two ways a service provider's values could impact the relationship with the client system in the health and human service profession

  Describe the laws of thermodynamics

Explain how these scientific laws apply to energy use, energy conversions, and the need for energy efficiency - Research and describe 2 provisions of the Energy

  Methods of securing arbitration

In response to such events as the Cuyahoga River fire and a 250 million gallon crude oil spill of the coast of Santa Barbara, California, Congress passed which Act in the 1960s?

  The power to authoritatively allocate values

The power to authoritatively allocate values is vested in a single person

  Apply a sociological perspective to the social world

Apply a sociological perspective to the social world. Analyze contemporary social issues using the sociological imagination and use sociological theories and concepts to analyze everyday life. Demonstrate the ability to identify, locate, and retrieve..

  Discuss the behavioral importance of each

Neurotransmitters are considered to be the "language" of the brain. They play critical role in the body and in behavior. First, discuss three different neurotransmitters in the brain, and, then discuss the behavioral importance of each of these..

  What is charging with reference to trna

Explain in 200 words that what is charging with reference to trna

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd