What is a firewall

Assignment Help Computer Network Security
Reference no: EM13785907

Project 1

You are the senior network architect for a large corporation. The company has offices in L.A., New York, and Miami. The company has been experiencing tremendous growth over the last year, and as a result, management has decided to hire temporary workers to fulfill the customer service duties. You must ensure that a logical design is in place that relegates access to other areas of the network and improves performance. You planned on using VLANs and firewalls to accomplish this deployment requirement. Your boss wants to see a report of your planned approach so that she can make that presentation to upper management.

In a 2-3 page document, explain the following to your boss:

•What is a VLAN?

•What is a firewall?

•How does a VLAN and firewall combination assist you in achieving the desired goal?

•What additional benefits can be achieved from implementing VLANs?

Use a diagram as an aid in explaining the deployment of the combined technologies.

2-3 page report and a diagram

Project 2

You work for a University that has over 3500 students on campus. The you supports about 600 staff and faculty that are also supported on the same network. The university presently uses an analog phone system and the administration is looking to deploy voice over IP solution. Before they move forward, they want to ensure that the environment can support the technology. Your manager has assigned you and two other engineers to do some do an assessment of the network and based on the assessment results. Recommend an appropriate solution to support VoIP in the network.

Create a 2-3 page report that includes the following:

•Switch assessment and requirement

•QoS requirement if needed and why

•POE requirements and support

•Appropriate network subnet design

Description how traffic will be handled based on your design proposal

Project 3

You are the network manager for a local university. Every year, you are audited to ensure that you are meeting with SOX compliance. In the environment, you support more than 5,000 user accounts in the network over 100 servers and more than 1,000 workstations. The environment supports e-mail servers, database services, and many Web-based applications.

Based on the services that are running in your environment, create a report of 2 -3 pages that includes the following:

•Research and discuss steps than can be taken to complete an assessment ahead of your SOX audit.

•Research and identify a solution that could be leveraged to automate the audit process of one or more applications.

Based on your report, create 4-6 PowerPoint slides that summarize the following:

•Your audit utility solution

Also, submit a 2-3 page report

Reference no: EM13785907

Questions Cloud

Issue managment life cycle process model : Apply the issue managment life cycle process model to this case. Which stages of the process can you identify in this case?
How can you make clear the advantage hiring : Explain one way in which you could make your superior information literacy skills evident in job interview. What examples could you use? How can you make clear the advantage hiring you would provide the employer?
What federal or state laws protect owners of intellectual : What federal or state laws protect owners of intellectual property? How do they apply here? Explain. What damages, if any, has Mathis suffered because of Normandale's conduct? Explain
Estimate the value of abc : Estimate the value of ABC Co using the price/earnings ratio method and discuss the usefulness of the variables that you have used.
What is a firewall : What is a firewall. How does a VLAN and firewall combination assist you in achieving the desired goal
What range of output would the new equipment be purchased : C&A currently has fixed costs of $200 per month and variable cost of $40 per unit for its production operations. They are considering the purchase of a new equipment that will raise the fixed costs to $500 per month but reduce the variable cost to $3..
Prepare a presentation on united postal services : Prepare a presentation on united postal services on social cost and benefits.
About the fixed costs-variable costs : Process A has fixed costs of $2000 and variable costs of $40 per unit. Process B has fixed costs of $5000 and variable costs of $30 per unit. Which of the following statements is true?
Calculate total project cost for mixed-use development : Calculate the total project cost for this mixed-use development from the information provided. If lenders are willing to provide 60% of the project cost in the form of debt, calculate the dollar amount of debt and equity that Frank Douglas must rais..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Implementing information systems security policies

Describe the roles and responsibilities of those implementing information systems security policies.

  What ethical issues surround using honeypot to trick attacks

Although honeypots are common, some security professionals believe they should not be used because they encourage attackers. What do you think?

  Identify 3 different computer crimes that you are aware

computer crime has become a serious matter for your discussion board post consider the following do you think computer

  Server program receives a newline character

The server program receives a NewLine character sent from the client, it will display a message like 'Line from the client: - How much will it be to get some help with this small portion of the assignment?

  Type of security problems computer services encounter

Students would enter the room, pick up their jobs, and leave. What kinds of security problems might computer services encounter with a system such as this?

  Cyber crime research

Conduct an Internet search of cyber crimes. Find a cyber crime, a crime where a computer is used to commit a majority of the crime that has occurred in the last three months. Write a 1 ½ to 2 page synopsis of the crime, using APA style formatting.

  Ideas for energizing a project team

Assume you are introduced to a assignment manager, who does not have authority to give a pay raise or promote a project team member.

  Chunks of code to give secure-reliable computing environment

How are many chunks of code from many organizations really going to work together to provide a secure and reliable computing environment?

  Security was merely checking virus updates

When you first started in this field, security was merely checking virus updates and making sure you put patches on your computers to protect the system from intruders. If the servers or workstations did get a virus, you conducted research on your..

  Details of the attack on the playstation network

Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered.

  Explain diffie-helman protocol for sending message

In Diffie-Helman protocol, the common modulus is selected as n = 19 and the generator g is chosen to be 2. Alice and Bob select numbers 6 and 10 privately.

  Describe any risks or threats mitigated by using firewall

Install an application-based firewall on a personal workstation. In one paragraph, describe the name and version of the firewall installed and its core features. In a second paragraph, describe any risks or threats mitigated by using this firewall..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd