With the parameters set forth at the onset of the project

Assignment Help Computer Engineering
Reference no: EM13469309

With the parameters set forth at the onset of the project, present the infrastructure and security policy that will support the expected development and growth of the organization. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. Since the company will be merging with a multinational company, virtualization and cloud technology should be taken into consideration. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy. 

Section 1: Infrastructure Document

Write a five to ten (5-10) page infrastructure document in which you:

  1. Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology. 
  2. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Explain the rationale for the logical and physical topographical layout of the planned network. Note: The graphically depicted solution is not included in the required page length.
  3. Illustrate the possible placement of servers, including access paths to the Internet and firewalls. Note: facility limitations, workstations, printers, routers, switches, bridges, and access points should be considered in the illustration.
  4. Create and describe a comprehensive security policy for the company that will:
  • Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.  
  • Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Reference no: EM13469309

Questions Cloud

Jim sent an email to other salespeople protesting a change : imagine you are a recently-hired chief operating officer coo in a midsize company preparing for an initial public
Unknown solution contains only two absorbing species thymol : an unknown solution contains only two absorbing species thymol blue and methylthymol blue. this sample had absorbance
What do you mean by 404 error what should you do if you : what is a 404 error? what should you do if you receive this error message?your answer should be at least 200 words and
Compare and contrast the terms of reference of the wallis : in december 2013 the government announced the terms of reference for the financial system inquiry. it has been 16 years
With the parameters set forth at the onset of the project : with the parameters set forth at the onset of the project present the infrastructure and security policy that will
What is the csi effect and do you believe it is a : what is the csi effect and do you believe it is a legitimate concern?in your paper address the followingsummarize the
Use the library and the internet to collect information : write 400-600 words that respond to the following questions with your thoughts ideas and comments. be substantive and
Internet domain names are linked to trademark issues : internet domain names are linked to trademark issues. technology makes it easy to copy and distribute music and movies
Describe the responsibilities and ethical concerns that you : how do governments attempt to control foreign businesses operating within their borders? when u.s. companies do

Reviews

Write a Review

Computer Engineering Questions & Answers

  How many prefetches need to be outstanding

How many prefetches need to be outstanding

  Write down english narrative that converts currency

Using the C compiler, write down a C program that contains your narrative from broken down into one line sentences, that have been commented out.

  Determining the bmi

Develop a modular system which determines and display a person’s body mass index (BMI). The BMI is often used to calculate whether a person with the sedentary lifestyle is overweight or underweight for their height.

  Questionthink a disk with the next characteristics these

questionthink a disk with the next characteristics these are not parameters of any particular disk unit block size

  Xpath and xslt transformation

Explain the context in XPath. Explain at least three things you will require to perform an XSLT transformation.

  How to create a directory called class

make a text file, that contains what is your absolute path, relative path and call it paths.txt

  Write down and justify an efficient relational algebra

write and justify an efficient relational algebra expression that is equivalent to the following given

  Program is internet based and it is expected to boost sale

Sunnyville Inc. is in the business of selling home appliances. Sunnyville Inc. has over 50 sales agents all over the country. The management at Sunnyville Inc. has decided to implement an online sales program. The new sales program is Internet bas..

  Make a windows form program for a nina''s cookie source

contain at least one other functional control such as a button (Exit button) or a MenuStrip having an Exit and an About selection.

  Largest solution to the quadratic equation

In case, the value of "b squared" 4ac is negative, then code prints out the message "no real solutions" and returns. On the other hand, the function prints out the largest solution to quadratic equation.

  Make a client/property database using microsoft access

The file New Database window opens, then type the word Client as the name for this file where cursor is blinking, then click the create bottom.

  Develop flip flop which is equivalent to the 74x74

Develop flip flop which is equivalent to the 74x74 positive-edge-triggered flip flop using a 74x109 positive-edge-triggered flip flop. No other component is to be used.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd