Network infrastructure and security

Assignment Help Computer Networking
Reference no: EM13764133

Network Infrastructure and Security

This assignment consists of two (2) sections: an infrastructure document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

With the parameters set forth at the onset of the project, present the infrastructure and security policy that will support the expected development and growth of the organization. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. Since the company will be merging with a multinational company, virtualization and cloud technology should be taken into consideration. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy.

Section 1: Infrastructure Document
1. Write a five to ten (5-10) page infrastructure document in which you:

a. Thoroughly identify possible network infrastructure vulnerabilities.Thoroughly address network vulnerabilities with the appropriate security measures. Thoroughly ensure that consideration is given to virtualization and cloud technology.

b. Thoroughlydesign a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Thoroughlyexplain the rationale for the logical and physical topographical layout of the planned network.

c. Thoroughlyillustrate the possible placement of servers, including access paths to the Internet and firewalls. Illustrate the possible placement of servers, including access paths to the Internet and firewalls. Note: facility limitations, workstations, printers, routers, switches, bridges, and access points should be considered in the illustration.

d. Thoroughly create and describe a comprehensive security policy for the company that will:

i. Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.

ii. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

 

Reference no: EM13764133

Questions Cloud

Numerical based on compression : Estimate the A-weighted sound pressure level in the 250Hz band at the receiver.
Identify the constitutional law issues : Identify the constitutional law issues in the following hypothetical fact pattern, applying or distinguishing relevant dispositive cases to resolve each relevant issue
Prepare a balance sheet in good form : Prepare a balance sheet in good form (stockholders' equity details can be omitted)
How does this knowledge affect the way you interact : How does this knowledge affect the way you interact in groups? What will you do differently in future groups as a result of this exercise
Network infrastructure and security : This assignment consists of two (2) sections: an infrastructure document and a revised project plan. You must submit both sections as separate files for the completion of this assignment.
Impact on criminal procedure by the courts : Write a 1,400- to 1,750-word paper in which you describe the key elements of the rights guaranteed by the Fourth, Fifth and Sixth Amendments and their impact on criminal procedure by the courts and police officers
Explain to teacher how the classroom equipment supports : Explain to your collaborating teacher how the classroom equipment supports not only your students who have sensory deficits, but may also assist others in the classroom.
Prepare a multiple-step income statement : Prepare a multiple-step income statement. Calculate the Profit Margin, and Gross profit rate for the company. Be sure to provide the formula you are using, show your calculations, and discuss your findings/results.
The advantages of solving disputes at the project level : Assignment: Safety Management Plan, A commercial contractor is seeking legal consultation related to their everyday activities and business operations as a whole

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain systems security certifications consortium web site

What are the areas addressed in CBK? Was policy explicitly listed? If not, where do you feel it is addressed in the CBK?

  What relevant newsgroups do you find

Print and read one article from the newsgroup and summarize it for the purpose of this assignment.

  Give hypothetical situation for signal type used in wan

Give a hypothetical situation for each signal type which illustrates how it could be, or is being, used in WAN. In what circumstance, for example, would a company choose to use a satellite signal?

  Porpose to verify that you can login into the strayer unix

The purpose of this lab assignment is to verify that you can login into the Strayer UNIX / Linux server. You must submit evidence of your login session via a screenshot.

  Research both legacy and voip telecommunications

Research both legacy and VoIP telecommunications. Determine which one is more secure and why.Define what it is and how it will be used in the telecommunications model. Provide 3 sources for your ideas.

  What are the advantages of ipv6 over ipv4

What are the advantages of IPv6 over IPv4. Why is security often considered to be a major advantage in IPv6. Is it really true

  Cyber law or internet law

The director of your department has requested that you conduct some research on the topic of cyber law or Internet law. He has asked you to draft a memo including the following information:

  Plan for setting up network managment separated by routers

At present WAN has seven networks separated by routers. Networks support 12 servers and 145 clients. Write a brief plan for setting up network managment solution for network.

  Is the web is changing users collectively or individually

Is the Web (and Web multimedia) is changing users collectively or individually in profound or superficial ways? Can we see new cultural values being shaped or sub-cultures being formed which may permanently affect our cultural values?

  Describe the features and benefits of csma-cd

For the purposes of this question you do not need to know about the token access method. You just want to explain the features and benefits of CSMA/CD.

  Find length of longest consecutive sequence of os in input

Input stream to 4B/5B block encoder is 0100 0000 0000 0000 0000 OOOI. Answer the following questions: Determine length of longest consecutive sequence of Os in input?

  Subnets broadcast address

Pick a network address from the list below. Everybody must pick a unique network address and number of subnet. The new subnet mask after the subnetting

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd