Validate and support the relationship between

Assignment Help Computer Engineering
Reference no: EM13478145

The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one (1) floor to three (3) floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. Additionally, the security of the network should be in the forefront of your design because protecting your data is a primary consideration.

Section 1: Infrastructure Document

1. Write an infrastructure document in which you:

a. Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.

b. Present the rationale for the logical and physical topographical layout of the planned network.

c. Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

d. Illustrate the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Note: Facility limitations, workstations, databases, printers, routers, switches, bridges, and access points should be considered in the illustration.

e. Create and describe a comprehensive security policy for this data-collection and analysis company that will:

i. Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.

ii. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Reference no: EM13478145

Questions Cloud

How does use of internet intranets and extranets by : why do big companies still fail in their use of information technology? what should they be doing differently? discuss
Distinguish physical security from logical security and : question 1 imagine a local financial company just expanded its operations into five branches connected over a broadband
Eplain with example role of information system in modern : the success of mis function in any organization will depend upon the relative position of the chief of the mis function
Provide an example where a t-test would be useful in health : 1. you have the following data.groupc0000011111intelligencec10090110120130 8590958090run a t-test for this data.
Validate and support the relationship between : the infrastructure which encompasses the network solution and security considerations is a major consideration for your
Evaluate from a management perspective the different kinds : assess from a management perspective the different types of security models and their implications to protect the
As a software engineer youve been asked to write a paper : as a software engineer you have been asked to write a paper that describes the use of current technologies with regard
One of the main functions of any business is to be able to : one of the main functions of any business is to be able to use data to leverage a strategic competitive advantage. this
Estimate megatrend of demographics in it field give opinion : evaluate the megatrend of demographics in the it field. give your opinion as to why it managers must understand this

Reviews

Write a Review

Computer Engineering Questions & Answers

  Why are most photographic images stored in a lossy format

Why are most photographic images stored in a lossy format

  Factors in selecting suitable data type

Explain the factors in selecting the suitable data type for some value? Which of these is most significant?

  The wbfk transport company operates throughout mainland

the wbfk transport company operates throughout mainland australia. the company specialize in fast delivery of

  What role does technology or social media have on how we

1.what role do you think media internet music industry movies or advertising play the development of our self-concept?

  Pros and cons of working with multiple tables

express pros and cons of working with multiple tables.

  Plan a program that asks for the student''s name

Your English instructor, realizing you are a programmer, asks you to write down a Grade Book program for his class to help him compute final grades. plan a program that asks for the student's name and four test grades. Display the student's name, ..

  Suppose it would take 100 hours in execution

For a certain program, 1% of the code accounts for 50% of the execution time. evaluate the following strategies with respect to programming time and execution time.

  Detail advantages of looping

Detail advantages of looping

  Contain reference slide with citations in apa format

build a 5- to 7-slide Microsoft?PowerPoint?presentation detailing the evolution of programming languages. Organize your slide presentation in the form of a timeline, and discuss the various generations of programming language.

  A class named customerrecord that holds customer number

create a class named CustomerRecord that holds a customer number, name, and address. Include methods to set the values for each data field and output the values for each data field. design the class diagram and write the code (not language specifi..

  Using a lock guarantees that deadlock cannot occur

Once a Lock has been obtained by a thread, the Lock object will not allow another thread to obtain lock until the first thread releases it.

  List the merits of using mobile devices from the point of

list the advantages of using mobile devices from the point of view of a fitter salesperson. next list the challenges of

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd