How you will set up the servers to have redundancy

Assignment Help Management Information Sys
Reference no: EM131166559

Case Study

Your company, Patrician LLC, develops wireless transmission technology. Upper management has decided to move the headquarters and primary operations to Tucson, Arizona and create a disaster recovery site in a newly purchased building in Cheyenne, Wyoming.

Patrician, LLC, while most of its technology is for the civilian market, has one Research and Development unit that is developing a secure microburst technology for use in the military market. This unit is made up of many people that do not currently live in either Cheyenne or Tucson and the company has no plans to force their relocation to Tucson.

Both buildings are 3 floors in height and have approximately 150,000 square feet. As the senior CISSP, you have been tasked with designing the network solution with both functionality and usability in mind.

Further specifications\company requirements:

1. The two buildings will be consideredidentical. The Cheyenne, WY building does not have to be described as it is a mirror hot site for business continuity\disaster recovery

2. There needs to be a constant connection between the buildings with no less than 32 Mbps throughput

3. There will be a datacenter on the third floor

4. There will be 100 network connections on each floor

5. There are 4 primary divisions in the company: Headquarters\Administration, Sales\Customer support, Research and Development (this division includes the secure microburst group) and Information Technology

6. The members of the secure microburst research group that do not live in Tucson need to be able to connect to the primary datacenter at any time

7. Physical security as well as logical must be considered

8. There are file servers, database servers, corporate webservers and external sales webservers and all must have high-availability

9. All servers must have redundancy (both physical and how they are configured)

10. The solution should have a plan to verify security measures

Case requirements:

1. You should submitnetwork drawingsshowing

a. the topology of the network

b. the topology of the VPN setup

They should include the hardware (and be labeled as such) but only generally - no brand names or models, just "switch", "firewall", "router", "server" and so on; any cabling differences should be noted as well.

2. You should include a paper that contains the following:

a. List any recommended cable and where it will be used

b. List the type of connection you will utilize to ensure 32 Mbps connection between sites (do not just give a medium, like fiber or copper, or just a protocol)

c. Recommend wiring closets wherever needed

d. Recommend any WAN or wireless technologies; mention and explain what topologies you used and why

e. How you will set up the servers (both physical and logical should be explained) to have

i. redundancy
ii. high-availability

f. What logical protections you recommend

i. What measures you will take to protect against attack
ii. What measures you will take to prevent attacks
iii. What measures you will take to be notified that you are being attacked

g. Recommend and describe logical (i.e. network)traps to stop attackers

h. Any physical security measures you deem appropriate

i. What they are
ii. Where they are
i. How the remote users will connect

j. How will security measures be verified?
k. Justify your recommendations

Reference no: EM131166559

Questions Cloud

Describe a day in the life of a factory worker : Describe a day in the life of a factory worker. Include information about family life, description of the hazards in the workplace, and perspectives about the upper and working classes.
Calculate the number of teeth in a pinion to mesh : Also calculate the number of teeth in a pinion to mesh with a gear of equal size without involute interference. The addendum equals the module.
Describe two potential sources of conflict within project : Describe two potential sources of conflict within your project and how you will determine if the conflict is good or bad. Discuss two potential sources of stress within your project and the methods you can use to reduce that stress
Summarize sources that you have gathered to support research : The purpose of an annotated bibliography is to summarize the sources that you have gathered to support a research proposal project.
How you will set up the servers to have redundancy : What logical protections you recommend- What measures you will take to protect against attack, What measures you will take to prevent attacks and What measures you will take to be notified that you are being attacked.
How has technology aided inventory management : What are some of the ways in which a company can reduce the need for inventories? How has technology aided inventory management
Effect of pollution is to make crop land less productive : Suppose we have an agricultural valley 100km by 50km, with a polluting electricity power plant. The power plant causes pollution problems on a narrow strip of land downwind of the plant, and within this valley 10km in length and 500 m in width, but n..
Evidence based practice to improve patient quality : Describe how you will use evidence-based practice to improve patient quality and safety in your health care setting.
Describe spread of industry throughout europe and into usa : Briefly describe the spread of industry throughout Europe and into America. Discuss Nationalism in the 19th century, including its origins, positives, and negatives.

Reviews

Write a Review

Management Information Sys Questions & Answers

  How you would address the three components

CNSS Model. Assume that a security model is needed for protection of information in your class. Using the NSTISSC model. examine each of the cells and write a brief statement on how you would address the three components represented in that cell

  Describe the data breach incident and the primary causes

Describe the data breach incident and the primary causes of the data breach. Analyze how the data breach could have been prevented with better adherence to and compliance with regulatory requirements

  Project management alternatives hierarchy processes and

project management alternatives hierarchy processes and project control systems and technologies1 in your own words

  How the use of technology components affects organisation

ISIT938 eBusiness Technology Assignment. Write the report up as a case study/technical report, and include an executive summary and introductory overview of the organisation, providing the background of the organisation and how the use of the tech..

  Interview a health care leader about a new technology

Interview a health care leader about a new technology - Write a paper of (1,100) words, from your perspective on how that process occurred, what happened, what the leader would do again and what mistakes he or she may have made

  Capabilities and weaknesses of the candidate

A new client of your security consulting firm is worried about the potential for data leaks that could expose it to financial losses as well as a damaged reputation. A comparison (compare/contrast) of the capabilities and weaknesses of the candidat..

  How should tiger approach segmenting its customers

How should the revised service packages to each segment be introduced to that segment? By the sales force? Should all segments be done at the same time?

  Brain saving technologies

Read the Real World Case: Brain Saving Technologies, Inc. and the T-Health Institute: Medicine through Videoconferencing

  Internet security paper

Internet Security Paper - I have to write a 3-4 page paper examining the impact that the Internet has placed on information technologies security.

  What is an information system and how does it work

What is an information system? How does it work? What are its management, organization, and technology components and why are complementary assets essential for ensuring that information systems provide genuine value for organizations?

  How do businesses benefit from behavioral tracking

How do businesses benefit from behavioral tracking? Do people benefit? Explain your answer. What would happen if there were no behavioral tracking on the Internet?

  Explain why it projects fail

Why IT Projects Fail - What do you envision are the primary contributors to this dismal record of performance?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd