Description
Short Report Assignment #2 Local Area Network Design Proposal:
you can find the instruction for the proposal in the attachment.
Unformatted Attachment Preview
IST275-70: Information Networking and Security
Fall 2018, HE
Short Report Assignment #2
Local Area Network Design Proposal
I.
Purpose of the Assignment:
This assignment has a two-fold aim: first, it will provide you with an opportunity to better understand
practical issues of network design; second, it will help you to apply your knowledge of network design
gained in this course to solve problems that are common in the real world.
II.
Requirements of the Assignment:
IST275.net, an expanding organization providing training for a variety of clients, currently locates in
Office 101 of Building A with 10 computers in a bus topology. It is going to lease another two offices
next month. One is Office 202 in the same building, and another is Office 303 in Building B across the
parking lot. The distance between the two buildings is over 300 meters. The organization wants to
expand the existing network as follows:
a. 22 computers in Office 101, 33 computers in Office 202, and 44 computers in Office 303.
b. A server hosts the organization’s website, and a server runs the organization’s business database.
c. All computers except the database server need access to the Internet.
d. Security and speed are the two top priorities.
e. Budget should be reasonable.
Your task is to write a short proposal of 5-6 double-spaced pages (excluding the diagram) for designing
the network. Your proposal will address the following issues with appropriate justifications:
Introduction
The network operating system. Give your reasons.
The topology(s). Give your justifications.
The equipments and media types. Give your reasons.
The protocol(s). Give your justifications.
Change(s) need be made in Office 101. Give your reasons.
The estimated and itemized cost for this network. Justify your budget.
The top five issues that affected your decision making. Briefly discuss each of them.
Citations if you had them.
A detailed diagram for the network designed in your proposal.
This assignment accounts 10% of your final grade.
III.
Grading Criteria:
The content, quality, clarity, and concise of your report (70%).
The organization/structure of your report (30%).
IV.
Due Date:
Please email your report to your instructor Dr. Shaoyi He at she@csusb.edu by:
11:59pm, Saturday, December 8, 2018.
* Late submission will result in a reduction of the grade by 10% for each calendar day.
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Hello,Attached find is the completed work. I did a thorough r...
Completion Status:
100%
Review
Review
Anonymous
Awesome! Perfect study aid.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
American Military Office of Personnel Management Cyber Hacking Paper
In a minimum of 3-full pages in length with a minimum of 3-outside sources, answer the following questions: 1) Finally, w ...
American Military Office of Personnel Management Cyber Hacking Paper
In a minimum of 3-full pages in length with a minimum of 3-outside sources, answer the following questions: 1) Finally, we have concluded the OPM court case. The suspects were all found guilty, and they all agreed to name the Central Government of China as the organization behind the attack. We need to consider what is the best steps going forward. If we publicly name the Chinese government as the culprits, what type of fall out can we expect? Is CyberWar a possibility? Will there be a technological arms race, along the lines of the Cold War, in new technology, such as quantum computing and others? Alternatively, will we see a series of low-level attacks via IoT, social engineering, and other means? Discuss how one would see each of the scenarios playing out. 2) Is it always best to name and shame, or do international relations restrict that approach?
CST 620 GATC Enterprise Key Management Policy Report
Enterprise Key Management
As a security architect and cryptography specialist for Superior Health Care, you're familiar wi ...
CST 620 GATC Enterprise Key Management Policy Report
Enterprise Key Management
As a security architect and cryptography specialist for Superior Health Care, you're familiar with the information systems throughout the company and the ranges of sensitivity in the information that is used, stored, and transmitted.
You're also expected to understand health care regulations and guidelines because you're responsible for advising the chief information security officer, or CISO, on a range of patient services, including the confidentiality and integrity of billing, payments, and insurance claims processing, as well as the security of patient information covered under the Health Insurance Portability and Accountability Act, or HIPAA.
You also have a team of security engineers, SEs, that help implement new cryptographic plans and policies and collaborate with the IT deployment and operations department during migrations to new technology initiatives.
This week, the CISO calls you into his office to let you know about the company's latest initiative.
"We're implementing eFi, web-based electronic health care, and that means we need to modernize our enterprise key management system during the migration,” he says.
The CISO asks for an enterprise key management plan that identifies the top components, possible solutions, comparisons of each solution, risks and benefits, and proposed risk mitigations.
The plan will help create an enterprise key management system.
The SEs would be responsible for the implementation, operation, and maintenance of the plan and system.
The CISO also wants you to come up with an enterprise key management policy that provides processes, procedures, rules of behavior, and training.
The new web-based system needs to be running in a month. So, you'll have a week to put together your enterprise key management plan and the accompanying policy.
In the previous course, you learned how security professionals employ cryptography, a system of algorithms that hide data. You learned systems can be unlocked with a key provided to those who have a need to know that data. An important part of cryptography is how to manage these keys to the kingdom. This involves learning and understanding enterprise key management systems and concepts.
Cryptography is the application of algorithms to ensure the confidentiality, integrity, and availability of data, while it is at rest, in motion, or in use. Cryptography systems can include local encryptions at the file or disk level or databases. Cryptography systems can also extend to an enterprise-wide public key infrastructure for whole agencies or corporations.The following are the deliverables for this project:
Information Assurance Plan (length requirements:3–4 pages)
Hello,i need help.it is very important for me. so read instuction carefully.Information Assurance PlanYou will submit your ...
Information Assurance Plan (length requirements:3–4 pages)
Hello,i need help.it is very important for me. so read instuction carefully.Information Assurance PlanYou will submit your introduction to the information assurance plan. This section of the plan will provide the overview of the current state of the organization. Provide a brief overview of the goals and objectives of your information assurance plan, including the importance of ensuring the confidentiality, integrity, and availability of information. What are the benefits of creating and maintaining an information assurance plan around those key concepts? Are there current protocols and policies the organization has in place? Additionally, what deficiencies exist within the organization’s current information assurance policies? What are the potential barriers to implementation of a new information assurance plan? You will review a real-world business scenario in order to apply information assurance research and incorporate industry best practices to your recommendations for specific strategic and tactical steps. These skills are crucial for you to become a desired asset to organizations seeking industry professionals in the information assurance field. Prompt: In Module Two, you will submit your introduction to the information assurance plan. This section of the plan will provide the overview of the current state of the organization. Provide a brief overview of the goals and objectives of your information assurance plan, including the importance of ensuring the confidentiality, integrity, and availability of information. Your submission should answer the following questions: What are the benefits of creating and maintaining an information assurance plan around those key concepts? Are there current protocols and policies the organization has in place? Additionally, what deficiencies exist within the organization’s current information assurance policies? What are the potential barriers to implementation of a new information assurance plan? Specifically, the following critical elements must be addressed: I. Introductiona) Provide a brief overview of the goals and objectives of your information assurance plan, including the importance of ensuring the confidentiality, integrity, and availability of information. What are the benefits of creating and maintaining an information assurance plan around those key concepts?b) Assess the confidentiality, integrity, and availability of information within the organization.c) Evaluate the current protocols and policies the organization has in place. What deficiencies exist within the organization’s current information assurance policies? What are the potential barriers to implementation of a new information assurance plan?use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA citation method. Page-length requirements:3–4 pages. Make sure you cite if you take a piece of someone’s work, very important and also your reference should relate to your writing (don’t cite a reference because it relates to the course and not this very paper) at least 4 references.please communicate for any clarifications and please read instructions and follow them. Some tutors don't pay attention to instructions at all. Very important I am not doing try and error here so please do not send a bid if you have no ideas or experience with research and literature review and protect confidentiality because I will have to provide you with some additional information.
3 pages
203.edited
WPScan-what it does, how it works, and what type of information it extracts. WPScan is an enumeration tool for Kali Linux ...
203.edited
WPScan-what it does, how it works, and what type of information it extracts. WPScan is an enumeration tool for Kali Linux used to enumerate WordPress.
ISOL 535 Harrisburg University Cryptography History of Caesar Cypher Discussion
Hi,Need help with below assignment.After reading chapter 3(attached), analyze the history of Caesar
Cypher and its impact ...
ISOL 535 Harrisburg University Cryptography History of Caesar Cypher Discussion
Hi,Need help with below assignment.After reading chapter 3(attached), analyze the history of Caesar
Cypher and its impact on cryptography. You must use at least one scholarly
resource. 1. Using proper APA formatting write a minimum 300-word assignment.2. Need 2 responses with 100 words each.thanks,
Similar Content
CSC 569 SEU Data Classification Issues In WEKA Software F Measure Discussion
What are classification issues? I need a detailed and clear answerWith writing the source?...
Jadavpur University Computer Science Discussion
What iis a default and a conversion constructior?what are advantages and disadvantages...
Database Questionnaire
3 parts total, the first part has 8 single choice questions. the second part is a discussion. the third has 2 questions th...
King Khalid University Computer Network Questionnaire
King Khalid University
College of Science and arts in Tanumah
Department of Computer Science
Data communication and networ...
NSCC Computer Science Artificial Intelligence & Other Information Technologies Paper
Research paper. Describe how artificial intelligence and other information technologies are providing career opportunities...
Strayer University Ransomware and Virus Protection Questions
You work as an information security specialist for a large financial company and your CISO has asked you to investigate re...
Information Technology 1
The Information System Architecture contains critical information about the current hardware, software and networking capa...
Computer science test (cbse)
1. (a) Distinguish between an object and a class. (b) How does a pointer variable differ from a simple variable?
(c) Wha...
Data Analytics Question
The medicine or healthcare industry is the focus of this analysis. The problem under study is related to patient data and ...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
American Military Office of Personnel Management Cyber Hacking Paper
In a minimum of 3-full pages in length with a minimum of 3-outside sources, answer the following questions: 1) Finally, w ...
American Military Office of Personnel Management Cyber Hacking Paper
In a minimum of 3-full pages in length with a minimum of 3-outside sources, answer the following questions: 1) Finally, we have concluded the OPM court case. The suspects were all found guilty, and they all agreed to name the Central Government of China as the organization behind the attack. We need to consider what is the best steps going forward. If we publicly name the Chinese government as the culprits, what type of fall out can we expect? Is CyberWar a possibility? Will there be a technological arms race, along the lines of the Cold War, in new technology, such as quantum computing and others? Alternatively, will we see a series of low-level attacks via IoT, social engineering, and other means? Discuss how one would see each of the scenarios playing out. 2) Is it always best to name and shame, or do international relations restrict that approach?
CST 620 GATC Enterprise Key Management Policy Report
Enterprise Key Management
As a security architect and cryptography specialist for Superior Health Care, you're familiar wi ...
CST 620 GATC Enterprise Key Management Policy Report
Enterprise Key Management
As a security architect and cryptography specialist for Superior Health Care, you're familiar with the information systems throughout the company and the ranges of sensitivity in the information that is used, stored, and transmitted.
You're also expected to understand health care regulations and guidelines because you're responsible for advising the chief information security officer, or CISO, on a range of patient services, including the confidentiality and integrity of billing, payments, and insurance claims processing, as well as the security of patient information covered under the Health Insurance Portability and Accountability Act, or HIPAA.
You also have a team of security engineers, SEs, that help implement new cryptographic plans and policies and collaborate with the IT deployment and operations department during migrations to new technology initiatives.
This week, the CISO calls you into his office to let you know about the company's latest initiative.
"We're implementing eFi, web-based electronic health care, and that means we need to modernize our enterprise key management system during the migration,” he says.
The CISO asks for an enterprise key management plan that identifies the top components, possible solutions, comparisons of each solution, risks and benefits, and proposed risk mitigations.
The plan will help create an enterprise key management system.
The SEs would be responsible for the implementation, operation, and maintenance of the plan and system.
The CISO also wants you to come up with an enterprise key management policy that provides processes, procedures, rules of behavior, and training.
The new web-based system needs to be running in a month. So, you'll have a week to put together your enterprise key management plan and the accompanying policy.
In the previous course, you learned how security professionals employ cryptography, a system of algorithms that hide data. You learned systems can be unlocked with a key provided to those who have a need to know that data. An important part of cryptography is how to manage these keys to the kingdom. This involves learning and understanding enterprise key management systems and concepts.
Cryptography is the application of algorithms to ensure the confidentiality, integrity, and availability of data, while it is at rest, in motion, or in use. Cryptography systems can include local encryptions at the file or disk level or databases. Cryptography systems can also extend to an enterprise-wide public key infrastructure for whole agencies or corporations.The following are the deliverables for this project:
Information Assurance Plan (length requirements:3–4 pages)
Hello,i need help.it is very important for me. so read instuction carefully.Information Assurance PlanYou will submit your ...
Information Assurance Plan (length requirements:3–4 pages)
Hello,i need help.it is very important for me. so read instuction carefully.Information Assurance PlanYou will submit your introduction to the information assurance plan. This section of the plan will provide the overview of the current state of the organization. Provide a brief overview of the goals and objectives of your information assurance plan, including the importance of ensuring the confidentiality, integrity, and availability of information. What are the benefits of creating and maintaining an information assurance plan around those key concepts? Are there current protocols and policies the organization has in place? Additionally, what deficiencies exist within the organization’s current information assurance policies? What are the potential barriers to implementation of a new information assurance plan? You will review a real-world business scenario in order to apply information assurance research and incorporate industry best practices to your recommendations for specific strategic and tactical steps. These skills are crucial for you to become a desired asset to organizations seeking industry professionals in the information assurance field. Prompt: In Module Two, you will submit your introduction to the information assurance plan. This section of the plan will provide the overview of the current state of the organization. Provide a brief overview of the goals and objectives of your information assurance plan, including the importance of ensuring the confidentiality, integrity, and availability of information. Your submission should answer the following questions: What are the benefits of creating and maintaining an information assurance plan around those key concepts? Are there current protocols and policies the organization has in place? Additionally, what deficiencies exist within the organization’s current information assurance policies? What are the potential barriers to implementation of a new information assurance plan? Specifically, the following critical elements must be addressed: I. Introductiona) Provide a brief overview of the goals and objectives of your information assurance plan, including the importance of ensuring the confidentiality, integrity, and availability of information. What are the benefits of creating and maintaining an information assurance plan around those key concepts?b) Assess the confidentiality, integrity, and availability of information within the organization.c) Evaluate the current protocols and policies the organization has in place. What deficiencies exist within the organization’s current information assurance policies? What are the potential barriers to implementation of a new information assurance plan?use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA citation method. Page-length requirements:3–4 pages. Make sure you cite if you take a piece of someone’s work, very important and also your reference should relate to your writing (don’t cite a reference because it relates to the course and not this very paper) at least 4 references.please communicate for any clarifications and please read instructions and follow them. Some tutors don't pay attention to instructions at all. Very important I am not doing try and error here so please do not send a bid if you have no ideas or experience with research and literature review and protect confidentiality because I will have to provide you with some additional information.
3 pages
203.edited
WPScan-what it does, how it works, and what type of information it extracts. WPScan is an enumeration tool for Kali Linux ...
203.edited
WPScan-what it does, how it works, and what type of information it extracts. WPScan is an enumeration tool for Kali Linux used to enumerate WordPress.
ISOL 535 Harrisburg University Cryptography History of Caesar Cypher Discussion
Hi,Need help with below assignment.After reading chapter 3(attached), analyze the history of Caesar
Cypher and its impact ...
ISOL 535 Harrisburg University Cryptography History of Caesar Cypher Discussion
Hi,Need help with below assignment.After reading chapter 3(attached), analyze the history of Caesar
Cypher and its impact on cryptography. You must use at least one scholarly
resource. 1. Using proper APA formatting write a minimum 300-word assignment.2. Need 2 responses with 100 words each.thanks,
Earn money selling
your Study Documents