Determine the primary security concerns regarding scenario

Assignment Help Management Information Sys
Reference no: EM131207894

Imagine that you have been hired as a contractor by a local business that has recently purchased new office space for its growing business. Design a network for the local business based on the following information: The business has approximately fifty (50) employees, and the new office space will stretch across the third and fifth floors of a building. The fourth floor is currently occupied by another tenant.

Write a two to four page paper in which you:

1. Suggest the equipment that you would utilize to design and implement a network, based on the scenario. Justify the need for your suggestions.

2. Recommend the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Suggest a solution that includes the cabling / connecting of the two differing office space floors.

3. Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns.

4. Detail the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length

5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Explain the complexities in an information technology environment by applying best practices and using appropriate technologies and methodologies.
• Describe protocols for inter process communication for communication across networks.
• Outline why the Information Assurance and Security perspective needs to pervade all aspects of information technology.
• Use technology and information resources to research issues in information technology.
• Write clearly and concisely about introductory information technology topics using proper writing mechanics and technical style conventions.

Reference no: EM131207894

Questions Cloud

Identify the consequences on the firm and the individual : Identify the violations on the individual involved, as well as the weakness of the oversight of the organization in which the unethical incident occurred.
Write a python program that prints out a table : Write a Python program that prints out a table of values of all even powers of 2 from 2**0 through 2**32. For each value, print the value in decimal, hexadecimal, and binary.
Discuss the history and purpose of the big mac index : Briefly discuss the history and purpose of the Big Mac Index. Where is it most expensive to buy a Big Mac? Where is it the least expensive to buy a Big Mac?
Why germanium - silicon are element chosen for semiconductor : Explain why germanium and silicon are the element chosen for semiconductor?
Determine the primary security concerns regarding scenario : Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns.
Discuss how diversification reduces risk : Discuss how diversification reduces risk. Comment on the beta of a portfolio with a large number of randomly selected stocks. (Hint: your discussion should include the increased importance of diversification post 2008 financial crisis.)
Optimal cash replenishment level : Watkins Resources faces a smooth annual demand for cash of $1.67 million, incurs transaction costs of $68 every time the firm sells marketable securities, and can earn 3.0 percent on its marketable securities.
Journalize the required entries to record : Memorial Graphs uses a job-order cost system.- journalize the required entries to record the above summarized operations.
Determining the compensating balance : Suppose your firm is seeking an eight-year, amortizing $780,000 loan with annual payments and your bank is offering you the choice between a $828,000 loan with a $48,000 compensating balance and a $780,000 loan without a compensating balance. The ..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Internet lan extranets fully converge in your

internet lan extranets fully converge in your department?please include at least one reference for each question apa

  Important information about costsconvenience stores create

important information about costsconvenience stores create software to lift profitability lead story-dateline wall

  How installing a dell sonicwall vpn server

A 'how to on installing a Dell SonicWall VPN server implementing a HTTPS tunnel. Implementing SSL/TLS, HTTPS, and SSH is a matter of configuring clients, servers, and network infrastructure

  Describe the effect of an organizations strategic planning

Describe the effect of an organization's strategic planning on the IT systems it uses. Address how strategic planning simplifies and complicates IT system development and use

  Find techniques hacker would use to steal organization data

You have been asked to help secure the information system and users against hacking attempts. Complete the following: Take this opportunity to list 2 different approaches and techniques a hacker would use to steal the organization's data

  Impact of technology on customers in regard

Prepare a paper about the impact of technology on customers in regard - How the company introduced the new product to customers

  What are three innovative technologies that can be used

What are three innovative technologies that can be used to address the needs of the organization? How do the technologies address the need

  Explain why you chose the specific technique

Explain why you chose the specific technique(s) and why it is important in your current profession or in another type of organization. Predict negative consequences that could occur if you do not apply your chosen concept(s). Support your viewpoin..

  What are the advantages and disadvantages to outsourcing

What is outsourcing? Why would a company choose to outsource? What are the advantages and disadvantages to outsourcing?

  How your recommended social crm capabilities would help

Explain one way to implement each of the elements you identified in part c. Describe how your recommended Social CRM capabilities would help to generate a trusted relationship.

  Determine the service utilization

Simulate the process for the first twenty persons arriving for flu shots.-  Determine the average time in queue.- Determine the service utilization.

  Advantages and disadvantages of electronic medical record

What are the advantages and disadvantages of the electronic medical record for patients and for providers

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd