Design and provide the ip scheme for the network

Assignment Help Computer Network Security
Reference no: EM131310632

CASE PROJECT:  LAW FIRM

Company:  Law Firm: Lincoln Partners, Esq.

A law firm has hired you as a Network Security Consultant to help its operations by providing a secure network to support its growth.  The Law firm currently has offices in Philadelphia, Cherry Hill, Wilmington, Harrisburg and Princeton.  Its corporate office out of Philadelphia will provide all of its IT support.

Philadelphia Office is the main corporate office and consists of the following groups

Legal Group

Partners:  There are 3 Attorneys that are the principals of the firm.

Associates:  There are 10 Associates, attorneys, who work for the firm but do not share in the company profits, and therefore are not partners.

Paralegals: There are 15 Paralegals, who work on a part time basis to support the law firm

Office Manager:  One manager who is responsible to support the office and she is responsible to ensure that everything runs smoothly, such as telephone, Fax, Copy, Supplies, Utilities, IT, etc. Also Manages the Cherry Hill Location.

IT Admin:  He is responsible for maintaining all of the IT equipment: Internet Services, Telephone Services, Desktops, Servers, Routers and Switches, and Website. Also supports the Cherry Hill location.

Other Offices:

Associates:  There are three associates, who help get new clients from other offices and their respective areas.

Paralegal: There is one paralegal to support the associates

IT Background Information

 

Philadelphia

Other Offices

Servers (Windows )

1

1

Desktops

20

4

Network Printers / Copier / Fax

1

0

Desktop Printers

5 - (Partners, Office Manager, IT Admin)

4

Laptops

4

0

Routers

1

1

Switches

1 Main 2 Distributions

1

Website - Outsourced

Outsourced

 

Email -

Outsourced

 

Security Issues:  What concerns the partners at this firm

1) Associates and paralegals taking clients / stealing business

2) Not having the ability to monitor business in remote locations

3) Reduce Costs in IT by consolidating

4) Privacy for their clients information

Task 1: Design a Secure Network using either Visio, Paint, Word, etc showing the All locations.

Task 2: Design and provide the IP Scheme for the network

Task 3: Establish a VPN between the All offices and allow the ability to work from home.

Task 4: Allow all employees the ability to access servers at the other locations

Task 5: Show and/or document all necessary security controls and its configuration. And allocate rules (format for rules should be same as attached file 2 )

Task 6: Update the firewalls to ensure security policy is enforced

Task 7: Show the DMZ on the diagram and placement of servers and Eliminate Outsourcing

Additionally, a new database (DB) system has been implemented in the Philadelphia office that is accessible by all locations.  The DB holds client data that is confidential, and needs to be properly protected.  The DB system also tracks attorney hours and allows the attorneys to charge the right customers.  Many attorneys have been issued laptops and now have the ability to VPN from home.

Reference no: EM131310632

Questions Cloud

What circumstances should the state increase restrictions : Should the United States adopt information-control regulations similar to Britain's Official Secrets Act?What are the policy implications of permitting journalists to have the same degree of access to information as occurred during the Vietnam War?
Important contributor to incident management process : Penetration testing is a particularly important contributor to the incident management process. Explain why that is the case, and provide examples of how penetration test results can be used to improve the incident response process.
How long can the air freshener provide fragrance : What is the initial rate of aroma delivery to the surrounding in grams/hour?- How long can the air freshener provide fragrance?
How should i handle the given situation : When confronted, Sarah admitted to the breach of confidentiality. She hasn't made any other mistakes, though, and I really depend on her. How should I handle this situation?
Design and provide the ip scheme for the network : Design a Secure Network using either Visio, Paint, Word, etc showing the All locations. Design and provide the IP Scheme for the network. Establish a VPN between the All offices and allow the ability to work from home
Exception error and explain potential implications : Select a Java program that contains an exception error. The exception error can be one that you have encountered yourself or one you located using the Internet. Describe your chosen exception error and explain potential implications.
Design an autoassociator for these patterns : What response does the network give to the test input pattern, p, shown to the left?
How common is the problem : introduce this topic (i.e., introduce the topic to a casual reader), being sure to present evidence (from the literature) that supports your conclusion that the problem is worthy of concern (How serious is the problem? How common is the problem? ..
Identify various threats to the validity of a proposed topic : In this assignment, you will identify the various threats to the validity of a proposed research topic. The different types of threats to validity and a brief explanation of the threats that are appropriate for your research design.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Write an essay about the privacy on the internet

Write an essay about the Privacy on the Internet. Narrow the big topics down to a specific research question and clearly state what it is in the introduction.

  Concept of privacy and security

For discussion, noting the extent to which we are connected to the internet, at home, while in class, even in flight, what is your approach to protecting your privacy when online? What measures do you take to safeguard your computer and other devi..

  Compare the various elements of our nation''s critical

Compare the various elements of our nation's critical infrastructure that are potentially vulnerable to cyberterrorism and/or information warfare.

  Each discussion question should be answered with about 200

each discussion question should be answered with about 200 words. no references should be used. responses should be

  Difference between legislation and other regulatory document

Compare and contrast the difference between legislation and other regulatory documents, i.e., guidance, standards, directives, executive orders, etc

  Describe a public-key cryptography

Describe a public-key cryptography? George your definition of a mantrap you said it was a space with exit doors that don't open until the other is closed.

  Secure software and systems

What are two of the best practices for developing secure software and systems? Why would each practice be suitable for an organization to implement to strengthen its information security posture? Describe the benefits of each.

  Provide the ip address of the host used by the perpetrator

Provide the IP address of the host used by the perpetrator. Based on this information, what can you tell about the profile of this individual? Explain why.

  Identify two competing security products

Identify two competing security products such as antivirus software, firewall, anti-spyware, or any hardware

  Create checklist of steps you should take to secure computer

Create a checklist of steps you should take to secure your computer from Internet based intrusions, and discuss the steps in some detail.

  Discuss the major categories of information security control

Define and discuss the major categories of information security controls

  Explain about hashing and message authentication codes

Explain the different roles between hashing and message authentication codes (MAC). Can a good hash function serve as a good MAC, and vice versa?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd