Focuses on a model of implementing security in layers

Assignment Help Computer Network Security
Reference no: EM13773516

Assignment : Defense in Depth

Oftentimes, the process of implementing security opens one's eyes to other forms of security they hadn't thought of previously. Well, in this assignment you should experience just that. This assignment focuses on a model of implementing security in layers which in many cases requires a network that is designed accordingly. In this assignment, you are to design a network to incorporate the following:

Corporate Site (Chicago)
All servers exist here (Web server, file server, print server, mail server, ftp server)
Connection to the Internet (50mbps)
300 employees who only need access to local corporate resources and the Internet
1 Remote Site (8 miles away)
20 employees who need access to all resources at corporate plus the Internet
Connection to the Internet (3mbps)
Write a four to five (4-5) page paper in which you:
Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind which depicts:
All network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and / or others)
The interconnections between network devices
The end user (client) devices (desktops, laptops)
The Internet cloud, generically, to represent your network's interface to the Internet

Reference no: EM13773516

Questions Cloud

What is the pictogram that will go onto the label : Does the information in the EU CLP classification database agree with the pictogram in the supplier SDS? If not, what pictograms do you think should be on the supplier SDS?
Explain how oconnor uses elements of fiction : Explain how O'Connor uses elements of fiction to address the theme of characters struggling with spiritual questions in bizarre, incongruous situations.
What the most reactive in water : What the most reactive in water, magnesium , calcium , or aluminum , why?
What is the effect of the sample size on the width of the : A random sample of 89 observations produced a mean x (x bar) = 25.8 and a standard deviation s= 2.4. - find a 95, 90, and 99% confidence interval for u. In a sample of 304,000 items mailed between Dec. 10 and Mar. 3, the accounting firm determined th..
Focuses on a model of implementing security in layers : assignment focuses on a model of implementing security in layers which in many cases requires a network that is designed accordingly
Why have personal navigation devices become popular : Why have Personal Navigation Devices become popular and what technologies are required to facilitate the success of PNDs?
Write a research paper on anorexia : Write a research paper on anorexia and the causes and affects as well as statistics and a real life example also getting treatment for it.
How many moles of gas are contained : How many moles of gas are contained in a human breath that occupies 0.45 L and has a pressure of 747 mm Hg at 37 C?
Discuss the elements of specific performance : Discuss the elements of Specific Performance. Analyze whether or not the scenarios in above cases are covered under the doctrine of Specific Performance

Reviews

Write a Review

Computer Network Security Questions & Answers

  Find out the security risks with respect to phishing

mobile banking features have added several advantages for customers however there are security risks that come with

  Why is the nfs option grayed out on the share protocols page

Why is the NFS option grayed out on the Share Protocols page and According to the Server Manager console, what roles are currently installed on the computer

  Describe a malware attack that causes the victim

Describe a malware attack that causes the victim to receive physical advertisements and describe an instance of a file that contain evidence of its own integrity and authenticity.

  Identifying and discussing technological improvements

Identify the type of breach and identify and explain how the breach occurred (or suspicions by authorities as to how it may have occurred)

  Method of establishing compliance of it security controls

Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations

  Inherent flaws in the department of homeland securitys

In your opinion, what are the inherent flaws in the Department of Homeland Security's Blueprint for a Secure Cyber Future? Explain your answer

  Explain the security mechanisms available for a database

this assignment requires the use of a relational database management system. strayer university provides each student

  Design item hash table from using hash function

Design the 11-item hash table that results from using hash function h(i) = (i mod 11) to hash the keys 12, 44, 13, 88, 23, 94, 11, 39, 20, 16, and 5, for each of the following assumptions.

  Department of homeland securitys mission

Interpret the Department of Homeland Security's mission, operations and responsibilities. Detail the Critical Infrastructure Protection (CIP) initiatives, what they protect, and the methods we use to protect our assets

  What could ssb and alice have done to protect

Assuming SSB wishes to continue using only 3DES as its cryptographic system, what could SSB and Alice have done to protect against this controversy arising?

  Research the debate over activex controls

Using the Web, research the debate over ActiveX controls and analyze Microsoft's security design. Is it strong enough? What security breaches have occurred in the past regarding ActiveX controls?

  Malicious attacks and / or threats that you identified

For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd