Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Case Study

Your company, Patrician LLC, develops wireless transmission technology. Upper management has decided to move the headquarters and primary operations to Tucson, Arizona and create a disaster recovery site in a newly purchased building in Cheyenne, Wyoming.

Patrician, LLC, while most of its technology is for the civilian market, has one Research and Development unit that is developing a secure microburst technology for use in the military market. This unit is made up of many people that do not currently live in either Cheyenne or Tucson and the company has no plans to force their relocation to Tucson.

Both buildings are 3 floors in height and have approximately 150,000 square feet. As the senior CISSP, you have been tasked with designing the network solution with both functionality and usability in mind.

Further specifications\company requirements:

1. The two buildings will be consideredidentical. The Cheyenne, WY building does not have to be described as it is a mirror hot site for business continuity\disaster recovery

2. There needs to be a constant connection between the buildings with no less than 32 Mbps throughput

3. There will be a datacenter on the third floor

4. There will be 100 network connections on each floor

5. There are 4 primary divisions in the company: Headquarters\Administration, Sales\Customer support, Research and Development (this division includes the secure microburst group) and Information Technology

6. The members of the secure microburst research group that do not live in Tucson need to be able to connect to the primary datacenter at any time

7. Physical security as well as logical must be considered

8. There are file servers, database servers, corporate webservers and external sales webservers and all must have high-availability

9. All servers must have redundancy (both physical and how they are configured)

10. The solution should have a plan to verify security measures

Case requirements:

1. You should submitnetwork drawingsshowing

a. the topology of the network
b. the topology of the VPN setup

They should include the hardware (and be labeled as such) but only generally - no brand names or models, just "switch", "firewall", "router", "server" and so on; any cabling differences should be noted as well.

2. You should include a paper that contains the following:

a. List any recommended cable and where it will be used

b. List the type of connection you will utilize to ensure 32 Mbps connection between sites (do not just give a medium, like fiber or copper, or just a protocol)

c. Recommend wiring closets wherever needed

d. Recommend any WAN or wireless technologies; mention and explain what topologies you used and why

e. How you will set up the servers (both physical and logical should be explained) to have

i. redundancy
ii. high-availability

f. What logical protections you recommend

i. What measures you will take to protect against attack
ii. What measures you will take to prevent attacks
iii. What measures you will take to be notified that you are being attacked

g. Recommend and describe logical (i.e. network)traps to stop attackers

h. Any physical security measures you deem appropriate

i. What they are
ii. Where they are

i. How the remote users will connect

j. How will security measures be verified?

k. Justify your recommendations

Requirement:

1. APA or MLA style\formatting is acceptable.

2. Network diagrams must be your original work or they will not be accepted

3. Network Diagrams must show all network devices (workstations, since there are a large number, can be grouped so that 1 icon can represent 10 or 100 or whatever number you want them to be); the VPN diagrams only need to show the nodes involved in the VPN setup, including the remote user.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91868747

Have any Question?


Related Questions in Management Information System

Recently a terminated employee used his mobile device to

Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to pres ...

Question suppose a computer using direct mapped cache has

Question : Suppose a computer using direct mapped cache has 2G Bytes of main memory and a cache of 512Blocks,where each cache Block has 8words,and word size is 2 Bytes a) How many blocks are in the main memory? b) What i ...

From the first e-activity identify the following cpus 1 the

From the first e-Activity, identify the following CPUs: 1) the CPU that resides on a computer that you own or a computer that you would consider purchasing, and 2) the CPU of one (1) other computer. Compare the instructi ...

Business process management is the technique used by

Business process management is the technique used by organizations to comprehend and describe the activities that help them function. Good process management can help make organizations more efficient and productive. For ...

Deliverables one ms word that must include an

Deliverables: One MS Word that must include an APA-formatted cover sheet. Step One - Part A: Identifying the Variables Review Chapter 17, Healthcare Data Analytics in the Oachs textbook for definitions of variables. An i ...

Question describe and discuss at least two backup

Question : Describe and discuss at least two backup strategies. Discuss the use of cloud backup strategies, as well? Please write minimum of 400 words with 0 % plagiarism and in APA format (Mandatory ).

The result of the spec cpu2006 bzip2 benchmark running on

The result of the SPEC CPU2006 bzip2 benchmark running on an AMD Barcelona has an instruction count of 2.389E12, and execution time of 750s and a reference time of 9650s. a) Find the CPI if the clock cycle time is 0.333n ...

Quantum cryptographyafter reading and review sslides on

Quantum cryptography After reading and review sslides on chapter 10 and 11 - write a paper outlining a position on the use of Quantum cryptography. What problem is quantum cryptography solving? explain. Detail how quantu ...

Assignment standards researchthe following website may be

Assignment : Standards Research The following website may be used for reference to complete this assignment. The website represents an electronic document titled "Standards Organizations," written by William Stallings (2 ...

Hill-rom was transforming from its traditional lines of

Hill-Rom was transforming from its traditional lines of business to a company that was leveraging data to ensure patient safety and satisfaction. 1-How does the HILL-TOM transformation journey change the way the company ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As