Monday, March 4, 2019
Network Security Essay
The infrastructure which encompasses the network origin and security considerations is a major consideration for your fraternity. Considering that the company will be expanding from one (1) floor to three (3) floors in the very near prospective you, as the CIO, ar responsible for the design of the infrastructure and security protocols. You admit been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations.Assumptions should be drawn regarding network usage in affinity to network services and resources. All the established criteria that were set at the flack should be adhered to within your plan. The network solution that is chosen should financing the conceived study system and every last(predicate)ow for scalability. The network infrastructure will support organizational operations therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be u tilize. In addition, access paths for Internet access should be show. Additionally, the security of the network should be in the forefront of your design because protecting your data is a aboriginal consideration. instalment 1 Infrastructure Document 1. Write a quaternary to six (4-6) varlet infrastructure document in which you a. Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company. b. fork up the rationale for the logical and physical topographical layout of the planned network. c. Design a logical and physical topographical layout of the current and planned network through with(predicate) the use of graphical tools in Microsoft Word or Visio, or an have source alternative such as Dia. Note The graphically depicted solution is not included in the required rapscallion length. d. enlarge the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), an d firewalls.Note initiation limitations, workstations, databases, printers, routers, switches, bridges, and access points should be considered in the illustration. e. Create and describe a oecumenical security policy for this data-collection and analysis company that will i. Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note CIA is a widely used benchmark for evaluation of breeding systems security, focusing on the three (3) shopping center goals of confidentiality, integrity, and availability of information. ii. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.Section 1 of your assignment must follow these formatting requirements * Be typed, twofold spaced, using Times New Roman font (size 12), with one-inch margins on all sides citations and references must follow APA or school-specific format. Check with your pr ofessor for any redundant instructions. * Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. * Include charts or diagrams created in MS Visio or Dia as an addition of the infrastructure document. All references to these diagrams must be included in the corpse of the infrastructure document.Section 2 Revised Project Plan habit Microsoft Project to 2. Update the project plan from with three to five (3-5) invigorated project tasks each consisting of five to ten (5-10) sub-tasks.The specific course tuition outcomes associated with this assignment are * Develop information systems-related activities to maximize the business think of within and outside the organization. * Demonstrate an understanding of existing and emerging information technologies, the functions of IS, and its impact on the organizational operations. * Evaluate the issues and challenges associated with information systems integration. * Use engineering and information resources to research issues in information systems. * Write clearly and presently about strategic issues and practices in the information systems domain using appropriate writing mechanics and technical style conventions.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment