Design a network security policy, Computer Networking

Assignment Help:

SSK Software Corporation has opened an office in Toledo, Ohio. The office will have a wireless Wi-Fi (WLAN), and a Corporate wired Ethernet LAN. Workstation requirements are as follows:

Users                                               Workstations                       Planned Expansion

Accounting Dept.                                       20                                     14

All other Dept's                                         105                                    15

Wireless Users                                            23                                     0

The Corporate plan is to Subnet the Accounting Department, the Wireless Network and the rest of the wired network. The goal is to keep the accounting data private and secure.

(a) Propose a IP network scheme to accommodate the needs of the office above. Your proposal should incorporate the most efficient use of network/host using VLSM and a second option using FLSM. Provide pluses and minuses for each option.

(b) Select one of your options from answer (a) above to use in developing a network number scheme and assign IP addresses to devices (such as PC's, printers, switches). Create a table for the entire network applying this scheme.

(c) Design a Network Security Policy for SSK Software. Assume SSK Software currently has no network security hardware/Software. What items would SSK Software need to purchase in order to implement the Security Policy?

(d) Explain all Security measures you would recommend to SSK Software.


Related Discussions:- Design a network security policy

Discuss an example of threats in computer software, Discuss an example of t...

Discuss an example of threats in computer software Assume only one attack out of the above list i.e., the virus attack. Though the present anti-virus software solutions can det

What is two types of errors, Q. What is Two Types of Errors? Single-Bi...

Q. What is Two Types of Errors? Single-Bit Errors: Merely one bit in the data unit has changed Burst Errors of length 'n': 2 or more bits in the data unit have changed (

What are different ways of securing a computer network, What are different ...

What are different ways of securing a computer network? There are lots of ways to do this. Install reliable and updated anti-virus program on all computers. Make sure firewalls

What is sonet, What is Sonet Synchronous Optical Network is a fiber opt...

What is Sonet Synchronous Optical Network is a fiber optic technology that can transmit high-speed data audio, used for text and video. Single clock handles timing of transm

Compare udp and tcp, QUESTION a) National regulations require the avail...

QUESTION a) National regulations require the availability of the following services for all IP to PSTN, PSTN to IP, and IP to IP calls. Name any three types of these features

Show coaxial cable connectors, Q. Show Coaxial Cable Connectors? - A mo...

Q. Show Coaxial Cable Connectors? - A most common is barrel connector (BNC) - T-connectors are utilized to branch off to secondary cables - Terminators are necessary for

Assignment, i want to make the assignment from you

i want to make the assignment from you

Process communicating - application layer, Process communicating End  ...

Process communicating End   systems  communicate with each  other by the  processes. A process  can be  thought  of a s program  that is  running  within  end systems. Process

What is meant by 3-tier architecture, In 3-tier Client/Server systems, the ...

In 3-tier Client/Server systems, the application logic (or process) lives in the middle tier and it is removed from the data and the user interface. In theory, the 3-tier Client/Se

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd