Network security and wan connectivity

Assignment Help Computer Network Security
Reference no: EM13921069

The project is to design a network, network security and WAN connectivity for the following situation:

Organization of 100 computer users in three locations.

Location one: two buildings, 25 computer users in each building.
Location two: one building, 15 computer users.
Location three: one building 35 computer users.

Document your design as follows: 

  1. Introduction to the design Explanation of equipment and software used. MS WORD
  2. Diagram of the entire network. PPT
  3. Diagrams for each location. PPT
  4. Explanation of security procedures. MS WORD
  5. Explanation of WAN connection. MS WORD

 Include with your documentation a PowerPoint presentation of 10 slides illustrating the key points you would convey to management and users.

YOU WILL submit TO ME:  the 2 FILES BELOW

1. A MS WORD DOCUMENT

2. A POWERPOINT PRESENTATION

Reference no: EM13921069

Questions Cloud

Begin by constructing a time line : A project has an initial cost of $40,000, expected net cash inflows of $9,000 per year for 7 years, and a cost of capital of 11%. What is the project's NPV? (Hint: Begin by constructing a time line)
Comparing two different capital structures : Kyle Corporation is comparing two different capital structures, an all-equity plan (Plan I) and a levered plan (Plan II). Under Plan I, Kyle would have 790,000 shares of stock outstanding. Under Plan II, there would be 540,000 shares of stock outstan..
What is the portfolios expected return : A portfolio is invested 24 percent in Stock G, 39 percent in Stock J, and 37 percent in Stock K. The expected returns on these stocks are 10.5 percent, 13 percent, and 18.4 percent, respectively. What is the portfolio’s expected return?
Expected return-what must the risk-free rate be : A stock has an expected return of 12.9 percent and a beta of 1.15, and the expected return on the market is 11.9 percent. What must the risk-free rate be?
Network security and wan connectivity : The project is to design a network, network security and WAN connectivity for the following situation:
Perform a mann-whitney u test : Based on eight universities in each of two different regions, is there a difference between university rankings based on their regional locations? Perform a Mann-Whitney U test, being sure to follow the directions under the table.
Discuss why a firm might want to adopt reviews : Discuss why a firm might want to adopt 360-degree reviews. What are the likely problems with this type of performance evaluation?
What is the sunk cost for new deluxe truck camper project : Hoosier Camper, Inc. is a manufacturer of truck campers. Its current line of truck campers are selling excellently. However, in order to cope with the foreseeable competition with other similar truck campers, HC spent $950,000 to develop a new line o..
Is your absenteeism related to work-related health issues : What can we do as a team to help support in weeks and months to come? Is your absenteeism related to work -related health issues? Is your absenteeism related to your current shift designation

Reviews

Write a Review

Computer Network Security Questions & Answers

  Guidance provided by department of health and human services

Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements

  What are the possible flaws in this protocol

Identify which security requirement was violated in the cases and what are the possible flaws in this protocol? Propose how to fix the possible flaws with minimal modifications to the protocol.

  Provide an overview of intellectual property law

Intellectual property law is a major issue facing organizations, and many organizations have been fined significant amounts for violations of intellectual property law. Provide an overview of intellectual property law

  What is the main goal in a denial of service attack

What is the main goal in a Denial of Service (DoS) attack? What is the difference between a virus and a worm

  Describe the relationship between information security

1. research the sarbanes-oxley act. write a minimum of 500 wordsthis question only cite your sources using apa 6th

  Type of security problems computer services encounter

Students would enter the room, pick up their jobs, and leave. What kinds of security problems might computer services encounter with a system such as this?

  Security management

Choose a topic from your major field of study. For example, if you pursuing a degree in education, your topic will come from the education field.

  Ealuate the significance of the internet describe how the

1. analyze the evolution of internet to do this show how it has changed over time.2. evaluate the significance of the

  Write a report on web security services using xml encryption

Write a report on Web security services using XML Encryption and Signatures. The report must have a title, an abstract, an introduction and at least one section that extensively reviews the literature you have read.

  Discuss the major networking building blocks

Discuss the major networking building blocks and their functions. Secondly, discuss software application's vulnerabilities, such as those found in web browsers.

  Design a network or network component

Students are to design a network or network component using a design tool (example: Visio or CAD). Required is a visual representation of this network along with a document describing all aspect of the network design including product selection.

  Define broadband and baseband transmission technology

Define broadband and baseband transmission technology and describe broadband technology and how a broadband system operates.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd