Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

In this assignment, you are going to design a simple network monitoring system that is suitable for a small business.

Project Background:

You are the proprietor of InSat a new Internet based startup that focuses satire on the American political process. Your first real product is a tee shirt that portrays Andrew Jackson and Marlin Van Buren as Batman and Robin. You are operating your entire company out of your parents' two car garage; on one side you silkscreen the tee shirts and on the other side you have your computers.

Your entire network consists of three nodes, a Linksys EA 3500 wireless router, and a dumb gigabit Ethemet switch. All three nodes are directly connected to the switch, and the switch is in turn connected to one of the LAN ports of the router; the other three LAN ports on the router are vacant. Your nodes are a mixture of two Windows 7 nodes and one CentOS Linux node. Your Linksys router is directly connected to a cable modem which in tum has a connection to the Internet through a cable providers Business Class services for small business. You have contracted with your cable provider for a single static IP address. You have used the DMZ Host feature of your router to redirect unsolicited inbound traffic directly to the CentOS Linux

node. You are using the CentOS Linux node to host an Apache web server that advertises your business You are allowing only unsolicited inbound SSH, HTTP and HTTPS traffic from the Intemet through your router. And, as an extra precaution, you are only accepting unsolicited inbound SSH traffic on port 36415 instead of the standard port 22.

You must design a simple network monitoring system that is suitable for a small business. You must secure your network and establish the network monitoring system. You have no money to spend, so your solutions must require no cost whatsoever. A no cost solution is a firm requirement. You have been advised to document your network to show potential investors that you are serious.

Project Requirements:

  • You must create a presentation in .pot or .pop format with no less than 6 slides that describes the challenges of monitoring a simple LAN when there is no money available to purchase resources. Your presentation must identity a no cost solution that you will use to perform basic network monitoring. Your presentation must describe the methods and procedures that will be used to monitor and secure the small LAN.
  • You are required to list all of the components that are present in your network, to describe which components must be monitored, and to identify the security requirements of each monitored component. You must produce a network diagram that describes your network. The network diagram must be included in your presentation. You must include in your presentation any other information that is necessary to describe the monitoring system that you are using.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91419635
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Question when we studied clusters we discovered that

Question : When we studied clusters we discovered that semaphores, the mechanism we rely on for mutual exclusion, don't work, and so we studied message-passing as an alternative that does work on clusters. Why do semapho ...

The contracts manager at a company needs to make a large

The contracts manager at a company needs to make a large legal document available to an overseas customer. However, she has some challenges: The document contains sensitive information; it is too large to send via e-mail ...

Suppose that a large integer k is represented in twos

Suppose that a large integer k is represented in two's complement form. It may be negative, zero, or positive. We say that k is even if and only if |k| mod 2 = 0. How can we quickly test if k is even without using arithm ...

Question you all work in or know of people who work in

Question: You all work in or know of people who work in enterprise IT environments Maintaining the enterprise security posture, legal risk, and security is constantly changing. What makes it so difficult to maintain info ...

Question 1 why is it critical for an organization to have a

Question: 1. Why is it critical for an organization to have a DoS attack response plan well before it happens? 2. Please discuss the techniques used by malware developers to disguise their code and prevent it from being ...

Describe the types of network attacks and identify physical

Describe the types of network attacks and identify physical security attacks and vulnerabilities.

Question part 1 analyze the case study titled vodafone a

Question: Part 1: Analyze the case study titled "Vodafone: A Giant Global ERP Implementation" (below) For this assignment, you will need to: 1. analyze and discuss the central issue(s) faced by Vodafone, including the co ...

Secret channels a company uses public internet to carry its

Secret Channels A company uses public Internet to carry its phone service. The voice data will be encrypted before sending to Internet. The encryption algorithm is as follows: For each four-digit decimal integer, (1) Add ...

Eleven people have eleven different favorite numbers from 2

Eleven people have eleven different favorite numbers from 2 to 12. They all agree to participate in a 10,000-roll dice game where they bet $1 on their favorite number for each roll of two standard (fair) dice. A donor ki ...

Question suppose you are given two circularly linked lists

Question : Suppose you are given two circularly linked lists, L and M. Create an algorithm for telling if L and M store the same sequence of elements (but perhaps with different starting points). It needs to have a main ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As