How will security measures be verified

Assignment Help Management Information Sys
Reference no: EM131111151

Case Study

Your company, Patrician LLC, develops wireless transmission technology. Upper management has decided to move the headquarters and primary operations to Tucson, Arizona and create a disaster recovery site in a newly purchased building in Cheyenne, Wyoming.

Patrician, LLC, while most of its technology is for the civilian market, has one Research and Development unit that is developing a secure microburst technology for use in the military market. This unit is made up of many people that do not currently live in either Cheyenne or Tucson and the company has no plans to force their relocation to Tucson.

Both buildings are 3 floors in height and have approximately 150,000 square feet. As the senior CISSP, you have been tasked with designing the network solution with both functionality and usability in mind.

Further specifications\company requirements:

1. The two buildings will be consideredidentical. The Cheyenne, WY building does not have to be described as it is a mirror hot site for business continuity\disaster recovery

2. There needs to be a constant connection between the buildings with no less than 32 Mbps throughput

3. There will be a datacenter on the third floor

4. There will be 100 network connections on each floor

5. There are 4 primary divisions in the company: Headquarters\Administration, Sales\Customer support, Research and Development (this division includes the secure microburst group) and Information Technology

6. The members of the secure microburst research group that do not live in Tucson need to be able to connect to the primary datacenter at any time

7. Physical security as well as logical must be considered

8. There are file servers, database servers, corporate webservers and external sales webservers and all must have high-availability

9. All servers must have redundancy (both physical and how they are configured)

10. The solution should have a plan to verify security measures

Case requirements:

1. You should submitnetwork drawingsshowing

a. the topology of the network
b. the topology of the VPN setup

They should include the hardware (and be labeled as such) but only generally - no brand names or models, just "switch", "firewall", "router", "server" and so on; any cabling differences should be noted as well.

2. You should include a paper that contains the following:

a. List any recommended cable and where it will be used

b. List the type of connection you will utilize to ensure 32 Mbps connection between sites (do not just give a medium, like fiber or copper, or just a protocol)

c. Recommend wiring closets wherever needed

d. Recommend any WAN or wireless technologies; mention and explain what topologies you used and why

e. How you will set up the servers (both physical and logical should be explained) to have

i. redundancy
ii. high-availability

f. What logical protections you recommend

i. What measures you will take to protect against attack
ii. What measures you will take to prevent attacks
iii. What measures you will take to be notified that you are being attacked

g. Recommend and describe logical (i.e. network)traps to stop attackers

h. Any physical security measures you deem appropriate

i. What they are
ii. Where they are

i. How the remote users will connect

j. How will security measures be verified?

k. Justify your recommendations

Requirement:

1. APA or MLA style\formatting is acceptable.

2. Network diagrams must be your original work or they will not be accepted

3. Network Diagrams must show all network devices (workstations, since there are a large number, can be grouped so that 1 icon can represent 10 or 100 or whatever number you want them to be); the VPN diagrams only need to show the nodes involved in the VPN setup, including the remote user.

Reference no: EM131111151

Questions Cloud

A first-order model for mean annual earnings : Detailed interviews were conducted with over 1,000 street vendors in the city of Puebla, Mexico, in order to study the factors influencing vendors' incomes (World Development, Feb. 1998).
Question regarding the pareto efficiency : Using Pareto efficiency, explain the argument that if one accepts the assumptions made in the memo written by Larry Summers that sending more polluting industries to the third world might be Pareto efficient.
Model equation in three quantitative independent variables : Consider the first-order model equation in three quantitative independent variables
Discounting benefits and costs in future time periods : A highway department is considering building a temporary bridge to cut travel time during the three years it will take to build a permanent bridge.
How will security measures be verified : Recommend any WAN or wireless technologies; mention and explain what topologies you used and why, How you will set up the servers (both physical and logical should be explained) to have redundancy and high-availability.
The least squares prediction equation : SAS was used to fit the model E(y)  data points and the printout shown on page 573 was obtained
A large number of banks and insurance companies : A company called CRW runs credit checks for a large number of banks and insurance companies. Credit history information is typed into computer files by trained administrative assistants.
Elasticity of demand as the prices falls : The equation for a demand curve is P=2/Q. What is the elasticity of demand as price falls from 5 to 4? What is the elasticity of demand as the prices falls from 9 to 8? Would you expect the answers to be the same? Why/why not?
About the performance of its graphite shafts : Over the last year, a company that manufactures golf clubs has received numerous complaints about the performance of its graphite shafts and has lost several market share percentage points.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describing what can be done to attract intruders

Based on this information, write a one-page report describing what can be done to attract intruders and keep them connected to the network long enough to trace them. The report should discuss the pros and cons of using this strategy and mention an..

  What role would it play in meeting those expectations

Place yourself in the role of a manager at a company undergoing a merger or acquisition. What would be the most important things customers would expect from you while still in that process? What role would IT play in meeting those expectations? Pr..

  Describe your decision to attend college

Describe your decision to attend college. What led you to choose the degree you are seeking? How will this degree impact your future? How has your enrollment impacted others in their current or future educational pursuits

  Examine the influence of web-based information

Examine the influence of web-based information on global citizenship and multicultural understanding. Then, compile a list of three factors you believe should be considered when evaluating Internet sources for use in researching information

  Hired as an information security engineer

You have just been hired as an Information Security Engineer for a large, multi-international corporation. Unfortunately, your company has suffered multiple security breaches that have threatened customers' trust in the fact that their confidential d..

  Has social media changed how you interact with businesses

Has social media changed how you interact with businesses

  Questiona discuss who are the key people in an

questiona. discuss who are the key people in an organisation that can have the most effect on implementing green is

  Evaluate the two major information delivery methods

Evaluate the two major information delivery methods in mobile commerce - data security of information transmitted in the wireless network

  How have networks contributed to the digital divide

Information Systems: Networks - How have networks contributed to the digital divide and If you had your own retail business selling t-shirts

  Cost benefits to cloud computing using specific examples

Cloud Profitability In a one- to two-page paper (250-500 words), discuss whether or not there are cost benefits to cloud computing using specific examples. Be sure to include at least three reference sources. APA rules for formatting, quoting, paraph..

  At and t ipad security breach

AT&T iPad Security Breach - Show the content that you would include in a public service announcement (PSA) informing the public of the breach and your plan to resolve the issue

  How has your group chosen to separate the workload

How has your group chosen to separate the workload? Why did you choose to complete the work in this way? Has it been effective? How or how not

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd