Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Using the network diagram below, your task is to incorporate the devices on the lower right into the diagram to create a secure corporate network. The devices you need to incorporate into the network diagram include: Web server, ftp server, vulnerability scanner, anti-virus server (client-based / server-based), Web proxy, intrusion detection system (IDS), and authentication server.

Note: All client-based / server-based devices work where a client is installed on a workstation, which has bidirectional communication with a corresponding server.

Write a four to five (4-5) page paper in which you:

1. Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls, routers, and workstations as well as the device you need to incorporate. Include the following for each:

1. Make or vendor's name (e.g., Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com, etc.)

2. Model (e.g., Windows 7, ASA 5500, Cisco 3500, Squid, etc.)

3. IP address assigned to all devices

2. Establish the configuration for each device in which you:

1. Research each of the devices you chose and provide a basic configuration you would use in your network.

2. Use IP addresses to describe your configuration.

3. Explain the impact that each of your configurations has on the security of the entire network.

4. Highlight at least five (5) security features for each device, including devices in network diagram.

3. Using Microsoft Visio or its open source alternative to create a final network diagram that incorporates all devices into the existing network and ensures the following:

1. VPN sessions (from laptop) are only allowed to access the desktops in the IT department by IT department employees.

2. All VPN connections from the Internet cloud into the corporate network terminate at the VPN server.

3. Users from Engineering and Finance and Accounting CANNOT communicate.

4. Vulnerability scans occur daily in which all desktops are scanned at least once per day.

4. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

· Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

· Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

· Design a secure network to address a business problem.

· Use technology and information resources to research issues in network security design.

· Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91960138
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Management Information System

Assignmentyour company has assigned you to work on a

Assignment Your company has assigned you to work on a project plan for a new internal support system. This system will be expected to track financial aspects of your company's existing and proposed projects. In a 3-5-pag ...

Answer the following questions how can big data help your

Answer the following Questions How can Big Data help your employer or school? Will Big Data have an impact on how you use the Internet? What are some of the challenges of Big Data? 275 words apa 2 sources

The it department of your company has begun to appreciate

The IT department of your company has begun to appreciate that its projects do not exist in a business vacuum. That is, your company must also commit resources to operations, shareholder returns, and non-IT projects for ...

Functions and variable scope please respond to the

"Functions and Variable Scope" Please respond to the following: Functions are used to organize code when programming. All programming languages, including JavaScript have built-in functions that come as part of the langu ...

Discussion1 adapting best practices for specific solutions

Discussion 1. "Adapting Best Practices for Specific Solutions" Please respond to the following: • Interpret how context, scope, and feasibility influence the development of a security process, and provide an example of a ...

College of arts amp sciences cybersecurityuse the computers

College of Arts & Sciences: Cybersecurity Use the Computers & Applied Science database Locate the articles: "The Case for Banning Killer Robots: Point" by Stephen Goose and "The Case for Banning Killer Robots: Counterpoi ...

In this step you will refine your ability to conduct

In this step, you will refine your ability to conduct research for information in academic, public, and web domains. First, you will perform a brief industry analysis to become more knowledgeable about your industry and ...

Read cybercrime deterrence and international legislation

Read "Cybercrime Deterrence and International Legislation: Evidence From Distributed Denial of Service Attacks," by Hui, Kim, and Wang, from MIS Quarterly (2017). Refer to this reading when completing Topic 8 DQ1. Read " ...

Question 1 how are digital technologies changing family

Question : 1.) How are digital technologies changing family life? 2.) How are digital technologies changing the following social institutions: politics, education, the economy, and religion to make them better and worse? ...

Scenario a company called colony nursery and landscaping

Scenario: A company called Colony Nursery and Landscaping opened a new store located a few hundred miles away from its original location. The company wants to implement an award system that awards their customers with po ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As