Communication Network Paper

timer Asked: Apr 6th, 2019
account_balance_wallet $9.99

Question Description

Assume you have just accepted the position as CIO for a small but growing firm and are tasked with developing a plan for your organizations' existing telecommunication structures and computer networks. The organization needs to protect the valuable information it has but be flexible enough to accommodate employees as they go about executing their jobs and getting business done. It needs to address security aspects such as remote data access, enterprise mobility, and internal communications such as email.

In a minimum five page APA formatted paper (excluding title and reference pages) using the lecture, supplemental resources, and your research, discuss the following elements.

  1. Illustrate the general architecture (centralized or distributed) to support the goals of the organization.
  2. Using information from the course and your research, develop an outline of your security policy and plans that address the areas identified such as remote data access, smartphone access, and internal communications. Be as specific as possible.
  3. Examine and compare the security policy differences between users who work remotely to users who work on-site in a traditional office environment.
  4. Evaluate the elements critical for a successful implementation of such communication systems. Are they more technical such as hardware, software, network infrastructure, security, and cloud computing or more managerial such as project management, change management, logistics, and user involvement? Your list can be different from the list above. Provide the reasons for your arguments.
  5. Include a minimum of five resources, one of which may be the textbook. Of these sources, three must be from the IT industry standard periodicals.

The Final Paper: Computer Network

  • Must be five to eight double-spaced pages in length (not including title and references pages) and formatted according to APA style
  • Must include a separate title page with the following:
    • Title of paper
    • Student’s name
    • Course name and number
    • Instructor’s name
    • Date submitted
  • Must use at least five scholarly, peer reviewed, and other credible sources in addition to the course text.
  • Must document all sources in APA style
  • Must include a separate references page that is formatted according to APA style

Tutor Answer

School: UC Berkeley



Communication Network
Institutional Affiliation




In modern society, many organizations have experienced data breaches and cyberattacks
that occurred through email phishing, denial-of-service-attack, SQL injection, eavesdropping
attacks or man-in-the-middle attack, and zero-day exploit. These kinds of attacks are used by
hackers or cyber intruders to temper or access critical information of organizations. Cyberattacks often cause business interruption that often led to a loss of profits, tainted business
reputation, and a decline in customer's trust. Having proper security measures help to ensure that
data or information of a company and customers are protected. This paper addresses security
aspects such as enterprise mobility, remote data access, and internal communications.
General Architecture
To properly protect the valuable information of the company, centralized access control
system architecture is used. In a centralized architecture, users access all websites, applications,
and other computing and communication systems from a single profile. Centralized architecture
implies that associated power supplies, control panels, output, input, and reader control modules
for each access device are situated in a central location (Muhamed, Doradla, & Wolter, 2015).
Information assets of a company in a centralized architecture are subject to common or unified
management. Resource allocation in a decentralized architecture for all cells is regulated by a
centralized controller. The work of a centralized controller is to collect CSI for all network links,
process information jointly, and make scheduling decisions for all the cells before forwarding to
individual BS.



Centralized access architecture is good for the company because it has the ability to
control and monitor personnel who enter a secure room. This limits the accessibility to the
company's critical data communication circuits between control modules and access control
panels (Muhamed, Doradla & Wolter, 2015). As a result, it allows the company to properly
monitor how critical information is used. The centralized architecture also enables a centralized
controller to troubleshoot the electronic components of a communication network at a single
control location. It is also easy to track and collect data across a communication network in a
centralized network. Hence, network controllers can easily understand the source of attacks and
look for ways to thwart cyber-attacks.
In a centralized architecture, data redundancy is minimized and data integrity is
maximized because data of a company are managed from one central unit. It also enables system
administrators to make updates, re-organize, change, and analyze data at ease because data are
kept at the same place (Basak, Bhunia & Ray, 2015). Doing maintenance in a decentralized
architecture tend to be cheaper and easier since all websites, applications, and other computing
and communication systems are situated in a central location. It is also easier to identify
vulnerabilities in a centralized architecture. This is because information is subjected to common
or unified management.
Outline of Security Policy
Remote Data Access
The security policy and plans used in remote data access include: users are required to
access information according to their job requirements, performance of illegal activities through
the company's network is prohibited, users are not required to share their login credentials even



with family memb...

flag Report DMCA

Excellent job

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors