Design a logical and topographical layout of planned network

Assignment Help Computer Network Security
Reference no: EM131142533

Project Deliverable: Network Infrastructure and Security

This assignment consists of two sections: an infrastructure document and a revised Gantt chart or project plan.

The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one floor to three floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. Additionally, the security of the network should be in the forefront of your design because protecting your data is a primary consideration.

Section 1: Infrastructure Document

1. Write a four to six page infrastructure document in which you:

? Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.
? Present the rationale for the logical and physical topographical layout of the planned network.
? Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
? Illustrate the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Note: Facility limitations, workstations, databases, printers, routers, switches, bridges, and access points should be considered in the illustration.
? Create and describe a comprehensive security policy for this data-collection and analysis company that will:

• Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity, and availability of information.

• Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Section 2: Revised Project Plan

Use Microsoft Project to:

2. Update the project plan from Project Deliverable 4: Analytics, Interfaces, and Cloud Technology, with three to five (3-5) new project tasks each consisting of five to ten (5-10) sub-tasks.

Reference no: EM131142533

Questions Cloud

Discuss auto backup for android applications : What are the different data types supported as preference-setting values? What is the directory on the Android file system that stores application Preference XML files? Discuss Auto Backup for Android Applications.
Write a paper by answering following question : How has the history of decolonialism and post-colonialism, and global inequality contributed to the developing threat of terrorism?
Find the critical temperature for thermal damage : Do you expect that to be lower or higher than a constant temperature case of the same exposure duration?
How does socioeconomics effect what is in the report : What is a pre-sentencing investigation report and how does the use of that report affect an offender's eligibility for bail (pretrial release vs pretrial detention), a pretrial diversion program, and sentencing and/or probation? How does socioecon..
Design a logical and topographical layout of planned network : Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia.
Discuss the issue of attorney obligations : Discuss here the issue of attorney's obligations under the rule of Confidentiality and the filing of permits for emissions, discharge or waste disposal at facilities
Is this a reasonable value from a physiologic point of view : Is this a reasonable value from a physiologic point of view? Would the patient be considered normal or diabetic?
Write an essay geared towards synthesizing your ideas : write an essay geared towards synthesizing your ideas. Use complete sentences and adhere to standard rules of English grammar, punctuation, mechanics, and spelling.
Who actually formed these ideas : Discuss the following: Who actually formed these ideas? Expand upon the ideas of the 5 general principles. Why do you think they were implemented

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain the security mechanisms available for a database

this assignment requires the use of a relational database management system. strayer university provides each student

  Content filtering and protection

How can these tabs be configured to provide: (a) content filtering and (b) protection from unwanted items like cookies?

  Ethics associated with future global cyber security issues

Interconnectedness Cybersecurity Poses to Society and the Pursuit of Commerce - What three policy points should be included in a proposed model for a GLOBAL cybersecurity policy that will help mitigate the effects of cyber-warfare, cyber-crime, and..

  Biggest new technology

Question 1: What are some problems with not adding data integrity for your input strings? Example: If you are asking for an amount and when you can put in a letter. Question 2: What is one security issue that can take place with an interface? Expla..

  Research paper on the privacy and on financial services

You need to work on the privacy and on financial services. For example Mint, Its an app also online access to keep track of your financial use in a month.

  Information systems security

You are the Information Security Officer for a small pharmacy did Has recently been opened in the local shopping mall. The daily operational of a pharmacy is a unique business requires a combination of did Both physical and logical access controls..

  Do you have any security concerns for using virtual networks

Virtualization has become a key player in our networking world these days. Another important term is the virtual private network (VPN). Are the two terms (virtualization and VPN) related? Discuss and give examples. Do you have any security concern..

  Security issues

A computer forensics investigator needs to develop an understanding about security standards and formal procedures within an organisation.

  Describe application of network security and management

Evaluate the ethical concerns that communication networks raise in a global context. Describe the application of network security and network management in communication technology environments.

  Explain the challenges of attribution

Explain the challenges of attribution and how you believe this impacts cyber intelligence. Would you rank cyber threats above those of terrorism? Why or why not

  Draw network diagram of this network including ip addresses

Draw a network diagram of this network including IP addresses - Describe how the attack may have occurred with sufficient information to explain how a hacker could carry out the attack. Ensure you include references.

  Access and read e-mail from government web sites

He wants to utilize a variety of electronic tablets to access and read e-mail from government web sites (Note: Coast Guard is dual-hatted -Department of Defense and Department of Homeland Security). He has been briefed on a variety of mobile devic..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd