Security plan for the network

Assignment Help Computer Network Security
Reference no: EM13753590

You have been assigned as the cybersecurity architect in charge of implementing the security procedures for a network used in an upcoming project. The project is highly classified due to market competition. You have the full array of tools and capabilities at your disposal and expense is no object. Utilizing the security mechanisms you have learned design the security plan for the network according to the project manager's requirements.

The project manager provided you the following requirements and criteria:

a. Only the project team of 25 employees is allowed to access the network and the information residing on it.

b. The 25 employees are divided into four separate groups consisting of six members each plus the project manager: Product Development (Group A); Marketing (Group B); Sales (Group C); and Production (Group D).

c. Each group requires their own data storage with restricted access only to that group and the project manager.

d. Each group has deliverables that require data storage accessible by each member of the project team.

e. The project team requires access to the Internet for research and communication both internally and with external partners.

f. The project team will only be working between the hours of 0600-1800, Mon-Fri.

g. The project is expected to last for six months.

Reference no: EM13753590

Questions Cloud

The disadvantages of allowing unlimited access : Employers can use a number of products to monitor their employees' use of the Internet. These products report an employee's access of non-business related Web sites. Advocates insist that these products conserve network resources, make workers mor..
Write an essay on citizenship and nationalism : Write an essay on citizenship and nationalism. Analyze primary sources between 1970-2011 to demonstrate understanding of American Identity in relation to citizenship or nationalism using a post-modern approach.
Determine the key strategic differences that have impacted : Determine the key strategic differences that have impacted the relative success of both Amazon.com and Yahoo.com. Provide two (2) specific examples of such strategic differences to support the response.
Find the modified internal rate of return : Find the Modified Internal Rate of Return (MIRR) for the following annual series of cash flows, given a discount rate of 10.50%: Year 0: -$75,000; Year 1: $15,000; Year 2: $16,000; Year 3: $17,000; Year 4: $17,500; and, Year 5: $18,000.
Security plan for the network : Utilizing the security mechanisms you have learned design the security plan for the network according to the project manager's requirements
Technology have changed the way managers perform tasks : The four management tasks (planning, organizing, directing, evaluating) existed long before computers. Discuss how the use of computers and technology have changed the way managers perform these tasks.
Appropriate cost of capital tools : Operational leverage should discuss the appropriate cost of capital tools including weighted average cost of capital and the capital asset pricing model.
Calculate the value of the project : Use the WACC method to calculate the value of the project. Assume that both the comparison firm and out firm have risk-free debt and risk-free tax shields.
Explain the importance of communication protocols : Explain the importance of communication protocols and Define the overall network architecture

Reviews

Write a Review

Computer Network Security Questions & Answers

  How to set up or improve their cybersecurity

How should government justify telling private industry how to set up or improve their cybersecurity?

  Write down a class code that outputs a security code the

question 1 write a class called message that prompts the user to enter a message of three words as one string where

  Define and describe voip and virtual private networks and

1. list and describe the principal internet services.2. define and describe voip and virtual private networks and

  Write a short report documenting the installation

Write a short report documenting the installation even if you don't get the application running

  Typical network security problem

The topic, may be of your interest, needs to be approved in advance by the course convenor Dr Xin-Wen Wu; other than that, there are no restrictions.

  Targets of security breaches can be larger-smaller companies

Study three recent information security breaches. Do the key targets appear to be larger or smaller companies? Is there particular industry which appears predominately targeted?

  Evaluate the importance of the nondisclosure agreement

Evaluate the importance of the Nondisclosure Agreement and other legal agreements to both parties -  Propose the main pre-penetration test steps that the penetration tester should perform before beginning the initial phases of the XYZ penetration t..

  Using rsa user ciphers text m with other user public key

Using RSA User1 ciphers his text M with User2 public key and he gets the cipher text C=371 he sends the Ciphertext to User2 who decrypts the cophertext with his private key.

  The discussion board db is part of the core of online

the discussion board db is part of the core of online learning. classroom discussion in an online environment requires

  How to demonstrate that the server is up and running

You have been asked to install an SVN repository on a server. The SVN will be remotely accessed using the svnserve daemon that is supplied with SVN (please note that this is not the most secure way to access an SVN repository)

  Determine the level of necessary controls to mitigate risks

Describe how an organization determines the level of necessary controls to mitigate the risks while considering the value of its assets.

  Xyz company xyz a mid-sized corporation is in the middle of

company xyz a mid-sized corporation is in the middle of satisfying their regulatory compliance needs. the manager of

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd