Evaluation of vpn business sites using cisco devices

Assignment Help Computer Engineering
Reference no: EM131370462 , Length: word count:3000

Description of the assessment:

In this assignment, each Group will be allocated a case study (only ONE Case Study) from below. The case studies focus on the design, implementation, and the evaluation of VPN business sites using Cisco devices.

Business Case Study #01:

Virtual Radiologic uses Cisco solutions to secure electronic patient information transmitted between hospitals and remote radiologists.

The largest radiology practice in the United States is not on a hospital campus. It is, in part, in the private home-based offices of hundreds of Virtual Radiologic (vRad) physicians, who provide "tele radiology" services to hospitals across the United States.

"Traditionally, most hospitals have used a centralized model, with doctors working onsite or out of a nearby office," says Patrick Williamson, security engineer, vRad. "Instead we offer hospitals the ability to work with our radiologists over the Internet. The hospital sends us the images for a patient's study, and the vRad physician reviews them and sends the findings back."

For vRad's hospital customers, this innovative use of telemedicine services augments the onsite services of local radiologists with the services of specialty- trained radiologists available to provide interpretations at any hour. For patients, the vRad model speeds turnaround times for study results and provides access to a larger network of subspecialists (for example, specialists in musculoskeletal radiology or neuroradiology) than they might have access to locally.

As a web-based service, however, the vRad model also presents unique challenges. The most significant challenge is helping ensure the security of communications between radiologists and hospitals. vRad must contend with stringent regulatory requirements, including regulations issued to enforce the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH), which mandate strict information security and auditing requirements.

Business Case Study #02:

New Charter Housing Trust uses Cisco Next-Generation Firewall to deliver secure Internet access to staff and residents.

New Charter Housing Trust Group (New Charter) is a social housing authority, located in the Manchester region of the United Kingdom. The organization has approximately 20,000 housing units serving area citizens. New Charter works to provide accommodations that are affordable to people on low incomes, and limits to rent increases set by law mean that rents are kept at reasonable rates. Residents also include at-risk individuals or families who previously were homeless or in abusive relationships and need a fresh start.

The IT department provides services for the New Charter corporate staff of approximately 1000, as well as IT services onsite at the housing units. Providing both corporate and public networks is a big job in its own right, but the company is also actively increasing its housing stock and must integrate newly acquired sites and services into the network on an ongoing basis.

"We have to integrate these units into New Charter's existing IT network. On the face of it, you'd think that wouldn't be too difficult," says Darren Fishwick, telecommunications and network manager for New Charter. "But sometimes we run into massive incompatibilities with some of the legacy hardware and software."

In addition, Fishwick and the IT team at New Charter need to help ensure that the networks at existing and new locations are secure and that web-based filtering is in place.

"When we first implemented the resident PCs, we didn't put any filtering on, because we were of a mind that we didn't want to filter or restrict what people could access. But unfortunately, people are people, and we had a certain minority that was accessing things they shouldn't," Fishwick says.

Finally, New Charter needed to develop role-based access for its corporate network. "We had a supplier come in to do a bit of work for us, and it took us several hours to realize that all he'd done was disconnect the PC at the desk he was working at and connect his own laptop. This, of course, goes totally against our policy and highlighted that we need to ensure that people can't just come along and connect to our network," says Fishwick.

Requirements

Prepare a technical plan for your chosen case study:

The objective of this assignment is to prepare a planning document which will address requirement of the given case study.

1. Including diagrams (should be drawn using network drawing software), a clear and detailed description of the current architectural design of the network for chosen case study.
2. Write down all the security and business objectives required based on give case study.
3. Write down all the assumptions you made during the design of the network and network security.
4. Description and diagram should include current VPN or security status of the network.
5. Justify your design to satisfy all of the objectives such as security objectives, functional objectives and so on stated by the case study.
6. Describe the major and required equipment to implement the proposed VPN architecture and their significance e.g. routers, switches, cables, firewalls and any other equipment involved
7. What sorts of VPN tunnelling and encapsulation protocol(s) and technologies have been chosen on proposed design e.g. MPLS, IPSec, GRE with supportive arguments for their selection.

Submission Guidelines:
Your report should include the following:
- A title page, identifying student (name and number), name of the lecturer and assignment.
- The assignment must use 12 point font size minimum and at least single line spacing with appropriate section headings.
- Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE reference style.
- Must be submitted as one MS Word file on Moodle.

Please make sure the drawn diagrams are neat and clear to assist with the description and the explanation of the assignment requirements.

Reference no: EM131370462

Questions Cloud

Examples of strategic training initiatives : Give two examples of Strategic Training initiatives at your workplace. Describe their effectiveness. How would you do them differently?
Identify its organizational system design : Research an organization with which you are familiar and identify its organizational system design. You may use an organization selected for a previous assignment. To begin your paper, describe the organization’s system design. Assess how these appro..
Future companies survive to resolve current aviation issues : Business sustainability is critical to a thriving, growing industry. How do you plan to use your learning to ensure your future companies survive to resolve current aviation issues??
Evaluation of vpn business sites using cisco devices : Prepare a technical plan for your chosen case study - Write down all the security and business objectives required based on give case study - The case studies focus on the design, implementation, and the evaluation of VPN business sites using Cisco d..
What are relational returns : What are relational returns and what are some good examples of these? How important are they in the retention of valuable employees?
Provide a variety of learning processes : Consider why it is crucial for organisations to provide a variety of learning processes, including formal, social and informal in the workplace. 1500 word essay with 5 academic sources.
Generations of workers now in the workplace : Consider the four generations of workers now in the workplace. Identify a worker you know from each generation. How do they fit into their generational stereotype? How do they differ? Are there reasons other than age that accounts for the similari..
Analyze background information on how that problem developed : Describe background information on how that problem developed or came into existence. Identify global societal problem within the introductory paragraph and conclude with a thesis statement that states your proposed solution(s) to the problem.

Reviews

len1370462

1/24/2017 8:02:50 AM

Report Presentation 5 Table of contents with appropriate section numbers, figures, references and other appendices Current VPN infrastructure /5 The diagram included all system components and interconnecting the devices, with proper labelling of network equipment. Proposed VPN infrastructure /8 The diagram included all system components and interconnecting the devices, with proper labelling of network equipment. Equipment’s and protocol requirements, topology for proposed VPN structure and justification /12 Detailed descriptions and very well supported arguments.

len1370462

1/24/2017 8:02:39 AM

Section to be included in the report Description of the section Report Length About 1500 words Report style Report (ToC, figures, references, appendices etc) Proposed VPN structure The new proposed VPN architecture design Explanation of the proposed design Major components of the new design Technical details VPN protocol(s), topologies and technologies Reference style Use IEEE referencing style only Poor writing Inadequate structure, careless presentation, poor referencing technique or not using at all

len1370462

1/24/2017 8:02:15 AM

Your report should include the following: • A title page, identifying student (name and number), name of the lecturer and assignment. • The assignment must use 12 point font size minimum and at least single line spacing with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE reference style. • Must be submitted as one MS Word file on Moodle. Please make sure the drawn diagrams are neat and clear to assist with the description and the explanation of the assignment requirements.

Write a Review

Computer Engineering Questions & Answers

  Write a computer program using q basic

You need to write a computer program using q basic with the subsequent information. We just started learning about loop commands but I'm completely lost.

  Write program that inputs a word representing binary number

Write a program that inputs a word representing a binary number (0s and 1s). First your program should verify that it is indeed a binary number, that is the number contains only 0s and 1s.

  Plot the average lengths versus m

(a) For a binary source with probabilities P(0) = 0.9, P(l) = 0.1, design a Huffman code for the source obtained by blocking m bits together, m = 1, 2, . . ., 8. Plot the average lengths versus m. Comment on your result.

  Difference between clustered and nonclustered indexes

define the meaning of each of the transaction levels supported by SQL Server.

  Create a useful model of supply chain operations which

explain the aspects regarding three crucial decisions to make regarding the creation and holding of inventory in a

  How a simple backward chaining interpreter could be used

Describe how a simple backward chaining interpreter could be used to go through the possible diagnoses, asking the user questions about their symptoms.

  Discuss the levels of the cmmi process improvement approach

Discuss the levels of the CMMI process improvement approach. What is Scope and why is it important to a Risk Management Project. What is a Cost Benefit Analysis and Why is it important

  How to write an applet that draws the house shown

How to write an applet that draws the house shown. When the user clicks on the STOP sign an audio of your choice plays.

  Draw a domain class diagram for the system

Develop a system sequence diagram based on each fully detailed use case description - Develop a first-cut design class diagram for the system and Based on the first-cut sequence diagram, develop a communication diagram for each use case

  Question 1explain why worst-case fair wfq can have the

question 1explain why worst-case fair wfq can have the absolute fairness bound.question 2consider wfq weighted fair

  Create a program to compute numeric grades for a course

Write down a program to compute numeric grades for a course. The course records are in a file that will serve as the input file. The input file is in exactly the following format: Each line contains a student's last name, then one space, then the ..

  Write down the sql command to add math scope

Write down the SQL command to add SUBJECT to TUTOR. The only values allowed for SUBJECT will be "Reading", "Math", and "ESL".

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd