Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Telecommunications

Network Security Plan Project Assignment

The Acme Corporation is a new startup that wishes to sell their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+,  to the government.

Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed.

As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:

1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

2. Each facility has three floors. The buildings are rectangular with each floor being 350'x350'.

3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

4. The primary data center will be located at the Atlanta location.

5. There will be a failover data center at the Cincinnati location.

6. Each location should be protected from intrusions that are not limited to state change attacks.

7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

8. There will be database servers located at the Cincinnati site.

9. The servers must have redundancy.

10. The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

1. You should submit a network drawing listing the network's topology including any necessary hardware.

2. You should list any recommended cable.

3. You can recommend wiring closets wherever you need them.

4. You should recommend ways to assure that you are not getting attacked.

5. You should build traps to stop attackers.

6. You should recommend any WAN or wireless technologies.

7. You should recommend any technology needed in the data center for high availability.

8. Justify your recommendations.

Paper formatting requirements:

Your paper must be submitted as a Microsoft Word document with double spacing, 12- point Times New Roman font, and one-inch margins.

You should have at least 10 pages, not including Title and Reference pages.

Please include appropriate diagrams and images for your network security plan.

All academic sources must be cited using the latest APA  guidelines. Section and Sub-section headings should be used throughout the paper.

For in-text citations, the citation needs to go inside the end of the sentence. For example: This is my sentence on APA formatting (APA, 2016).

For references, this list should start on a new page at the end of your document with a hanging indent (the title of the page should be References). You do not need to include the retrieved date. Here are some examples:

Smyth, A. M., Parker, A. L., & Pease, D. L. (2002). A study of enjoyment of peas.

Journal of Abnormal Eating, 8(3), 120-125.

Bernstein, M. (2002). 10 tips on writing the living Web. A List Apart: For People Who

Make Websites, 149. De Huff, E. W. (n.d.). Taytay's tales: Traditional Pueblo Indian tales. University of  Pennsylvania.

Start your paragraph with an indent (tab).

Use section and sub-section headings

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92866603
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Management Information System

Write a minimum of 100 words for each question provide

Write a minimum of 100 words for each question, provide citation and reference for each question. - Provide two answers for each question. 1. What is your understanding of Entity Integrity Vs Referential Integrity. Illus ...

Answer the following questions 1 you have been asked to

Answer the following Questions : 1. You have been asked to test the disaster recovery plan for a small business in your area. The company has a break up plan that is well documented. 2. Describe the steps you would use t ...

Assignmentafter you have analysed your collected

Assignment After you have analysed your collected information, produce the following UML diagrams for proposed system as the specifications for a new automated information system for ASC. 1. Identify classes that should ...

Assignment standards researchthe following website may be

Assignment : Standards Research The following website may be used for reference to complete this assignment. The website represents an electronic document titled "Standards Organizations," written by William Stallings (2 ...

Suppose we have the following context-free grammar which

Suppose we have the following context-free grammar which accepts a list of variable initializations. Goal ::= single | Goal single single ::= VAR "=" exp ";" exp ::= VAR | INT | exp + exp Here each V AR terminal can be m ...

In class we have discussed web 20 web 30 cloud computing

In class, we have discussed Web 2.0, Web 3.0, Cloud Computing, Mobile Computing, and the Internet of Things. Select an example of one of these four topics (for example, Amazon Web Services or the smart home) and discuss ...

Assignmentif you have not done so already please review the

Assignment If you have not done so already, please review the Module Overview, read the required readings, and watch the lectures/presentations. These are three short essay questions. Answers can be found in the text. (D ...

Question you are in charge of creating a new security

Question : You are in charge of creating a new security awareness policy for your organization or an organization you are familiar with. You are also to create a plan for training on this policy in this same organization ...

Question briefly explain your understanding of

Question : Briefly explain your understanding of countermeasures and defense mechanisms that could be used to protect an organizations environment. Make sure to cite and reference the sources used for this discussion, as ...

Assignmentplease take advantage of the outside sources

Assignment Please take advantage of the outside sources provided to help you with your assignment. Submit as a Word Document. You will need to answer the following questions in a 600-word response (total for all four que ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As