Design a network security

Assignment Help Basic Computer Science
Reference no: EM13902165

Design a network, network security, and WAN connectivity for the following situation 

Organization of 100 computer users in three locations:

Location one: 2 buildings, 25 computer users in each building. 50 Total

Location two: 1 building, 15 computers 

Location three: 1 building 35 computer users 

Document your design as follows: 

  1. Introduction to the design Explanation of equipment and software used. MS WORD
  2. Diagram of the entire network. PPT
  3. Diagrams for each location. PPT
  4. Explanation of security procedures. MS WORD
  5. Explanation of WAN connection. MS WORD

 Include with your documentation a PowerPoint presentation of 10 slides illustrating the key points you would convey to management and users.

YOU WILL submit TO ME:  the 2 FILES BELOW

1. A MS WORD DOCUMENT

2. A POWERPOINT PRESENTATION

 

Reference no: EM13902165

Questions Cloud

Identify costs to construct facility that should capitalized : Assume that a company needs to acquire a large special-purpose materials handling facility. Identify the costs to construct this facility that should be capitalized as assets.
Determine the distance to the fault : By multiplying the rhs brackets and collecting terms, show the effect of the leads is given by: Rx = (Rf-Ri/Rf) Rc-(RiRi/Rf). Determine the distance to the fault by modifying the expression in (b) and using Rx/Rc = x/L
Prepare a table with the following column headings : In January 2013, ProTech Co. pays $1,550,000 for a tract of land with two buildings.
What are the mission, values, goals and objectives : What are the (mission, values, goals and objectives) of the organization?
Design a network security : Design a network, network security, and WAN connectivity for the following situation  Organization of 100 computer users in three locations: Location one: 2 buildings, 25 computer users in each building. 50 Total
Represent the greatest advancement : 1. Which do you consider to represent the greatest advancement: Quantum mechanics or discovering the shape of the DNA molecule--- and why?
Evaluate the user dialog strategies used by a menu-driven : Write a four to five (4-5) page paper in which you:Evaluate the user dialog strategies used by a menu-driven interface.Determine why menu-driven interfaces continue to be popular in the modern computing age.
Identify a possible technology : What kind of questions might you ask in-order to identify a possible technology? Is there any other information you can identify and provide that would be useful in solving this problem?
Dispose of the pumped groundwater : If groundwater from a contaminated plume is pumped out using strategically placed wells to contain the contamination. What options do you have to dispose of the pumped groundwater?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Wireless local area network

Internet Intranet (local area network, wide area network, and metropolitan area network) Extranet (interactive voice response, automatic call distributor, call routing, and dialer) Wireless local area network (LAN)

  Describe the same task using intelligent software agents

Describe the same task using intelligent software agents

  Write an appropriate me expression capturing the essence

Write an appropriate ME expression capturing the essence

  The opportunity to do analysis on the data

Task Background: Graphs and trees provide you with ways to visualize data sets, and the opportunity to do analysis on the data (e.g., shortest path). Knowing the structure of a database enables you to choose a proper algorithm for searching for..

  Recall the recursive formulas for fibonacci numbers

Recall the recursive formulas for Fibonacci numbers F(sub 2n+1) = ( F(sub n+1) )^2 + ( F(sub n) )^2

  Computes the area of a triangle

The subsequent function computes the area of a triangle, but contains three errors. Find the errors and fix them.

  Print this listing table only in landscape mode

Print this Listing table ONLY in landscape mode. In Page Setup, print the table to fit to 1 page wide by 2 pages tall. Your printout should contain only the Listing table including the Totals Row.

  Discuss how automated cybersecurity tools

1. Prevent, Detect, and Respond to Cyber Attacks Discuss how automated cybersecurity tools can support operations personnel as they attempt to prevent, detect, and respond to cyber-attacks against a company's networks and information systems.

  Did have any difficulties in following this coding process

Did you have any difficulties in following this coding process?

  The multiplexer and expected simulation report

Write a Verilog testbench for the multiplexer and expected Simulation Report.

  Changed phone number setting and want it back where it was

I accidentally changed the phone number setting and want it back to where it was. Is there a simple way to restore this setting

  What makes unix so portable

1-13 - UNIX is highly portable. What is portability ? What makes UNIX so portable ? Why is portability important ?3-13 - Why do you suppose progessional programmers find the consistencey and elegance of UNIX so appealing ?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd