Entries by Student

write my assignment 27544

Using the network diagram located here, incorporate into the diagram the devices on the lower right to create a secure corporate network. The devices you must incorporate into the network diagram include: Web server, ftp server, vulnerability scanner, anti-virus server (client-based / server-based), Web proxy, intrusion detection system (IDS), and authentication server.

Note: All client-based / server-based devices work where a client is installed on a workstation, which has bidirectional communication with a corresponding server.

Write a paper in which you:

  1. Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls, routers, and workstations as well as the device(s) you need to incorporate. Include the following for each:
    1. Make or vendor’s name (e.g., Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com, etc.)
    2. Model (e.g., Windows 7, ASA 5500, Cisco 3500, Squid, etc.)
    3. IP address assigned to all devices
  2. Establish the configuration for each device in which you:
    1. Research each of the devices you chose and provide a basic configuration you would use in your network.
    2. Use IP addresses to describe your configuration.
    3. Explain the impact that each of your configurations has on the security of the entire network.
    4. Highlight at least five (5) security features for each device, including devices in network diagram.
  3. Using Microsoft Visio or its open source alternative, create a final network diagram that incorporates all devices into the existing network and ensures the following:
    1. VPN sessions (from laptop) are only allowed to access the desktops in the IT department by IT department employees.
    2. All VPN connections from the Internet cloud into the corporate network terminate at the VPN server.
    3. Users from Engineering and Finance and Accounting CANNOT communicate.
    4. Vulnerability scans occur daily in which all desktops are scanned at least once per day.
  4. Use at least four (4) quality resources in this assignment. (Note:Wikipedia and similar websites do not qualify as quality resources.)
  5. Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

Your assignment must follow these formatting requirements:

  1. Use proper APA format.
  2. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page (if applicable) are not included in the required assignment page length.

 

"Not answered?"


Get the Answer

write my assignment 24395

Using the Internet, research literature reviews and writing research proposals.

To design a credible study, a research proposal needs to be developed.

Develop a research proposal by completing the following tasks:

  • Decide on a topic and form a hypothesis.
  • Test that hypothesis through data analysis—your hypothesis may or may not be correct, but you will not know that before you complete your data analysis.
  • Identify the independent and dependent variables of the hypothesis.
  • Determine the unit of analysis for your study.

Design the first part of a study using quantitative data on a topic of interest to you. Complete each of the following parts of the design:

  • Topic
  • Research question
  • Hypothesis
  • Independent variable for the hypothesis
  • Dependent variables for the hypothesis
  • The unit of analysis for your study

 Provide substantial feedback to your classmates about their topic and approach.

 Answer the following questions using your experience in designing a study’s proposal:

  • How do you conduct a proper literature review?
  • What is the process, from beginning to end?
  • Why is the literature review so important?

 Part 2

Locate and read two articles of original research from at least two different sources mentioned in the text, such as journal articles, monographs, a reader, or a dissertation. Each article should be from a different source.

  • Post your research articles. Based on your readings, answer the following questions:
    • What are the differences in the structures of the articles?
    • How do you evaluate a source of reliability?
    • Which resources do you like the most?
    • Which resources do you like the least? Make sure you explain your reasoning.
    • What are the steps involved in the literature review process?
  • Choose two topics that are not researchable. Explain why they are not researchable.

 1. Cite all sources in APA format.2. Support reasoning with research and examples.  

 

"Not answered?"


Get the Answer

write my assignment 29722

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and hig

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed.  As a security professional, you have been employed todesign a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications: 

1.      There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

2.      Each facility has three floors. The buildings are rectangular with each floor being 350’x350’.

3.      There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

4.      The primary data center will be located at the Atlanta location.

5.      There will be a failover data center at the Cincinnati location.

6.      Each location should be protected from intrusions that are not limited to state change attacks.

7.      The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

8.      There will be database servers located at the Cincinnati site.

9.      The servers must have redundancy.

10.  The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

1.      You should submit a network drawing listing the network’s topology including any necessary hardware.

2.      You should list any recommended cable.

3.      You can recommend wiring closets wherever you need them.

4.      You should recommend ways to assure that you are not getting attacked.

5.      You should build traps to stop attackers.

6.      You should recommend any WAN or wireless technologies.

7.      You should recommend any technology needed in the data center for high availability.

8.      Justify your recommendations.

Paper formatting requirements:

Your paper must be submitted as a Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins. You should have at least 5 pages, not including Title and Reference pages. Please include appropriate diagrams and images for your network security plan. All academic sources must be cited using the latest APA guidelines. Section and Sub-section headings should be used throughout the paper. Please review APA guidelines here: https://owl.english.purdue.edu/owl/resource/560/01/ for reference.

·         For in-text citations, the citation needs to go inside the end of the sentence. For example: This is my sentence on APA formatting (APA, 2016).

·         For references, this list should start on a new page at the end of your document with a hanging indent (the title of the page should be References). You do not need to include the retrieved date. Here are some examples:

Smyth, A. M., Parker, A. L., & Pease, D. L. (2002).A study of enjoyment of peas.Journal of Abnormal Eating, 8(3), 120-125. Retrieved from http:// M. (2002).10 tips on writing the living Web.A List Apart: For People Who Make Websites, 149. Retrieved from http:// Huff, E. W. (n.d.). Taytay’s tales: Traditional Pueblo Indian tales. University of Pennsylvania. Retrieved from  http://digital.library.upenn.edu/women/dehuff/taytay/taytay.html

·         Start your paragraph with an indent (tab).

·         Use section and sub-section headings

 

"Not answered?"


Get the Answer

write my assignment 7938

This is for the Zipcar case study in Chapter 2.

Obviously, you must read the case in its entirety. But, also read the chapter as well. The case requires “short answer” responses to 4 questions. A “short answer” response is a minimum of 6 good sentences. Remember that in addition to applying the knowledge you gained from the readings, this is a writing assignment. To receive full credit for this case assignment, you are expected to cite at least two scholarly sources to support your opinion or assertions. A cover page is NOT required. However, provide an APA style reference list at the end of your response to the last question; only one reference list is required that covers all responses.

Textbook:Pearlson, K., Saunders, C., Galletta, D. (2016). Managing and Using Information Systems: A Strategic Approach,

6th ed. Burlington, MA: Wiley ISBN: 9781119244288

 

"Not answered?"


Get the Answer