Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Assignment: Defense in Depth

Oftentimes, the process of implementing security opens one's eyes to other forms of security they hadn't thought of previously. Well, in this assignment you should experience just that. This assignment focuses on a model of implementing security in layers which in many cases requires a network that is designed accordingly. In this assignment, you are to design a network to incorporate the following:

Corporate Site (Chicago)

o All servers exist here (Web server, file server, print server, mail server, ftp server)
o Connection to the Internet (50mbps)
o 300 employees who only need access to local corporate resources and the Internet

• 1 Remote Site (8 miles away)

o 20 employees who need access to all resources at corporate plus the Internet
o Connection to the Internet (3mbps)

• Write a four to five page paper in which you:

o Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind which depicts:

- All network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and / or others)
- The interconnections between network devices
- The end user (client) devices (desktops, laptops)
- The Internet cloud, generically, to represent your network's interface to the Internet

• Note: The graphically depicted solution is not included in the required page length.

o Describe the flow of data through your network, and explain how your network design provides multiple layers of security.
o Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

• Your assignment must follow these formatting requirements:

o Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

o Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

• The specific course learning outcomes associated with this assignment are:

o Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used in IP networking.
o Identify network security tools and discuss techniques for network protection.
o Use technology and information resources to research issues in network security design.
o Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92175738
  • Price:- $55

Priced at Now at $55, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Objectives-to learn about more advanced network security

Objectives -To learn about more advanced network security and vulnerability scanning tools Lab Outcome: · To complete the lab procedures & correctly answer the questions in the Blackboard quiz. Lab Deliverables · Answer ...

Network project management assignment -purpose of the

Network Project Management Assignment - Purpose of the assessment - The purpose of this assignment is to build a clear understanding of project management fundamentals and their application, specifically: demonstrate pro ...

Assignment - network implementationbackgroundwidgets and

Assignment - Network Implementation Background Widgets and Gadgets (WaG) have recently acquired a business, We Make Stuff (WMS), in another city. Before work can commence on integrating WMS's network into WaG's, WMS actu ...

Question 12326 packet tracer - configuring pap and chap

Question 1 2.3.2.6 Packet Tracer - Configuring PAP and CHAP Authentication Submit your answer as Q1.pka Question 2 2.5.1.2 Packet Tracer - Skills Integration Challenge Submit your answer as Q2.pka Question 3 3.4.2.4 Pack ...

Part ian attacker seeks to view the contents of a specific

Part I An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access. You may assume that: - no exploitable vulnerabilities of any kind exist; - the attack ...

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

Question what is active threat in terms of network security

Question: What is active threat in terms of network security? Provide an example. The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA format. Note: minimum 300 wor ...

Backgroundyou have obtained a contract position at a small

Background: You have obtained a contract position at a small marketing and advertising firm called the Colour Ability Corporation (CAC). Your contract responsibilities are to help them plan their emerging networking and ...

Assignment - 8021q tunneling q-in-q configuration8021q

Assignment - 802.1Q Tunneling (Q-in-Q) Configuration 802.1Q tunneling (aka Q-in-Q) is a technique often used by Metro Ethernet providers as a layer 2 VPN for customers. 802.1Q (or dot1q) tunneling is pretty simple...the ...

Wireless sensor networks wsn let users to access servers

Wireless Sensor Networks (WSN) let users to access servers, printers, and other network resources regardless of their location, within the wireless reach. This flexibility means that, for example, a user's laptop stays c ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As