Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Telecommunications : Network Security Plan Project Assignment

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government.

Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed.

As a security professional, you have been employed todesign a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:

1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

2. Each facility has three floors. The buildings are rectangular with each floor being 350'x350'.

3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

4. The primary data center will be located at the Atlanta location.

5. There will be a failover data center at the Cincinnati location.

6. Each location should be protected from intrusions that are not limited to state change attacks.

7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

8. There will be database servers located at the Cincinnati site.

9. The servers must have redundancy.

10. The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

1. You should submit a network drawing listing the network's topology including any necessary hardware.

2. You should list any recommended cable.

3. You can recommend wiring closets wherever you need them.

4. You should recommend ways to assure that you are not getting attacked.

5. You should build traps to stop attackers.

6. You should recommend any WAN or wireless technologies.

7. You should recommend any technology needed in the data center for high availability.

8. Justify your recommendations.

Paper formatting requirements:

Your paper must be submitted as a Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins.

You should have at least 10 pages, not including Title and Reference pages. Please include appropriate diagrams and images for your network security plan.

All academic sources must be cited using the latest APA guidelines. Section and Sub-section headings should be used throughout the paper.

• For in-text citations, the citation needs to go inside the end of the sentence. For example: This is my sentence on APA formatting (APA, 2016).

• For references, this list should start on a new page at the end of your document with a hanging indent (the title of the page should be References). You do not need to include the retrieved date. Here are some examples:

Smyth, A. M., Parker, A. L., & Pease, D. L. (2002).A study of enjoyment of peas.Journal of Abnormal Eating, 8(3), 120-125.

Bernstein, M. (2002).10 tips on writing the living Web.A List Apart: For People Who Make Websites, 149.

De Huff, E. W. (n.d.). Taytay's tales: Traditional Pueblo Indian tales. University of Pennsylvania.

• Start your paragraph with an indent (tab).

• Use section and sub-section headings

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92783701
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Management Information System

Question - are ltc beds the only place to put us are there

Question - Are LTC beds the only place to put us? Are there other alternatives that are more cost-efficient? Given issues of quality -- either perceived or actual -- in many LTCs, do we really even want to keep tradition ...

Discussion 1security countermeasures and strategic

Discussion 1. "Security Countermeasures and Strategic Governance" Please respond to the following: • Recommend three countermeasures that could enhance the information security measures of an enterprise. Justify your rec ...

Topic we all had the unfortunate experience of seeing how

Topic: We all had the unfortunate experience of seeing how computers can, at times, make life's journey abit more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly i ...

Question 1 what aspect of display technology is unique and

Question : 1. What aspect of display technology is unique and potentially what drawbacks does this new technology eliminate? 2. Introducing traditional "non-disruptive products to market is facilitated with market studie ...

Instructionsin this final assignment you will develop a

Instructions In this final assignment, you will develop a paper that reviews some of the main topics covered in the course. Compose an essay to address the elements listed below. Identify the components of an information ...

In this assignment you will create a presentation for your

In this assignment, you will create a presentation for your organization to explain how successful collaboration can improve success and provide competitive advantages. Scenario: Your organization has used a variety of c ...

Enterprise systems assignment report -assessment

Enterprise Systems Assignment Report - Assessment Description - Our textbook, L. F. Motiwalla and J. Thompson, Enterprise Systems for Management, 2e, 2012, Pearson, briefly describes two real world case studies in each c ...

Summaryusing an organization of your choicedevelop a

Summary: Using an organization of your choice: Develop a Complete Disaster Recovery Plan to be submitted to the executive board of your company. Please note that this is a formal writing, all references (peer-reviewed) m ...

Enterprise architecture framework research paper

Enterprise Architecture Framework Research Paper Assignment Purpose of this Assignment This assignment gives you the opportunity to apply your research skills, analysis, and critical thinking skills to describe one of th ...

Dsigning amp implementing zachmans enterprise modelling

Designing & Implementing Zachman's Enterprise Modelling Framework in Multinational Corporate Learning Outcomes: At the end of the assignment. student should be able: • To have an understanding of Zachman's Framework in d ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As