Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

It infrastructure design document

27/03/2021 Client: saad24vbs Deadline: 2 Day

Scenario:

Overview: Now that you’re super knowledgeable about security, let's put your newfound know-how to the test. You may find yourself in a tech role someday, where you need to design and influence a culture of security within an organization. This project is your opportunity to practice these important skillsets.

Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements.

About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted widgets. They've hired you on as a security consultant to help bring their operations into better shape.

Organization requirements: As the security consultant, the company needs you to add security measures to the following systems:

· An external website permitting users to browse and purchase widgets

· An internal intranet website for employees to use

· Secure remote access for engineering employees

· Reasonable, basic firewall rules

· Wireless coverage in the office

· Reasonably secure configurations for laptops

Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don't want customer information falling into the hands of an attacker due to malware infections or lost devices.

Engineers will require access to internal websites, along with remote, command line access to their workstations.

Grading: This is a required assignment for the module.

What you'll do: You’ll create a security infrastructure design document for a fictional organization. Your plan needs to meet the organization's requirements and the following elements should be incorporated into your plan:

· Authentication system

· External website security

· Internal website security

· Remote access solution

· Firewall and basic rules recommendations

· Wireless security

· VLAN configuration recommendations

· Laptop security configuration

· Application policy recommendations

· Security and privacy policy recommendations

· Intrusion detection or prevention for systems containing customer data

**** This is an example*** I found same assignment on Chegg.com****

Introduction

This document describes how the functional and nonfunctional requirements recorded in the Requirements Document and the preliminary user-oriented functional design based on the design specifications.

Furthermore, it describes the design goals in accordance with the requirements, by providing a high-level overview of the system architecture, and describes the data design associated with the system, as well as the human-machine scenarios in terms of interaction and operation. The high-level system design is further decomposed into low-level detailed design specifications including hardware, software, data storage and retrieval mechanisms and external interfaces.

Purpose of the Security Infrastructure Design Document

The Security Infrastructure Design Document helps to document and track the necessary information required to effectively define architecture and system design in order to give the guidance on the security architecture of the IT environment that is going to be established.

2. General Overview and Design Approach

2.1 General Overview

The client requires an IT infrastructure to perform their business activities that involve e-commerce applications and internal VPN access for their customers as well as employees with a high priority on the security and privacy of customer information and of the client’s as well

2.2 Assumptions/Constraints/Risks

Assumptions

It has been assumed that the employees are increased by 5% every year thereby reflecting the usage of the network bandwidth and increase of the devices that are connected to the enterprise network infrastructure.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Grade Essay
Calculation Master
Accounting & Finance Specialist
Engineering Exam Guru
A+GRADE HELPER
Coursework Assignment Help
Writer Writer Name Offer Chat
Top Grade Essay

ONLINE

Top Grade Essay

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$57 Chat With Writer
Calculation Master

ONLINE

Calculation Master

I have read your project details. I can do this within your deadline.

$65 Chat With Writer
Accounting & Finance Specialist

ONLINE

Accounting & Finance Specialist

I have read your project details. I can do this within your deadline.

$53 Chat With Writer
Engineering Exam Guru

ONLINE

Engineering Exam Guru

Give me a chance, i will do this with my best efforts

$95 Chat With Writer
A+GRADE HELPER

ONLINE

A+GRADE HELPER

I will cover all the points which you have mentioned in your project details.

$96 Chat With Writer
Coursework Assignment Help

ONLINE

Coursework Assignment Help

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$32 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

How to create vlan in hp switch - Commonlit the raven answer key - The most common circumstance for project closure is simply a - The norton introduction to philosophy 2nd edition - 1200 words and three scholarly sources - Apply: DDOS - Deliberate development plan examples - Introduction and Procedures Assignment - English_Double Entry Journal - Trifles - Mein kampf in the book thief - Advantages and disadvantages of flash memory cards - Comparing and contrasting transition words - Standard reduction potential of ag - Page 86 big book - 2013 pdhpe hsc exam - Using pairs of opposites, such as helena and hermia, is called - 1. Memo Format (1 Page) 2. Short Essay For The 2 Selected Paragraph (1 Page) - The ____ team is responsible for recovering and reestablishing operating systems (oss). - Essbase report script level 0 - What are some eukaryotic cells - Cold cathode tube lighting - Internal and external environment of ford motor company - Econo - 1.1 10 practice written assignment apex - How to cite fasb codification in apa - Text week year b - Atomic theory timeline pictures - Caught in the crowd kate miller - Identification of unknown ketones lab report - Factor label method worksheet with answers - Woodford correctional centre postal address - CAPSTONE PAPER - R programming - Sugar fermentation in yeast lab report - Total words in quran - Alien rpg starter set pdf - Comp4920 company case study - Bailey and burch ethics scenarios - The stag burnham beeches - How to win erp simulation game - Mu mu mv mv - Global supply chain management simulation solution - Persuasive techniques in writing - Assignment - Bb imperial ac uk - University of sunderland turnitin - Jasmine siqueiros cause of death - How has nature view succeeded in the natural foods channel - Phonics screening test 2014 - Crafting and executing strategy 21st edition case solutions pdf - Common Assignment Alcoholism - Which is a characteristic of panamanian homes in santa fe - Macbeth act 2 discussion questions answers - Http teacher scholastic com tools class_setup - Sydney water bill check - Why do potatoes gain mass in water - Two step flow of communication pdf - Density dependent limiting factors examples - Arc professional year fee - Corporal punishment in queensland schools - Macbeth act 2 discussion questions answers - General Characteristics of Letters as they are found in the New Testament - What does ayri fik mean - Airbnb annual report 2015 pdf - Aristotle nicomachean ethics cliff notes - What mineral helps keep blood vessels unblocked - Generalized Anxiety Disorder - Rank the following carbocations in order of increasing stability - Order qualifiers and order winners examples - Short run average cost curve u shaped - Operational Planning - Damage stability booklet pdf - Evidence based sports medicine - Macromolecules worksheet biochemistry 8 answers - Google earth plate boundaries kmz - Robert stephens geek squad net worth - The briefcase questions and answers - ¿de quién es? answer each question affirmatively using the correct possessive adjective. - A gantt chart can be used to track informal communication paths. - Reply 2 635 - Dr lai fon min - Airline strategic management - National early literacy panel 2008 - A molecule is best described as - Angry birds algebra project answers - Bp solar gci inverter - 561 Community Paper A and B part. - Ideo case study harvard analysis - Cross cultural consumer behavior - Mask you live in discussion questions - Cardiff university phd gown - Research Paper with Out line - Introducing public administration 8th edition chapter summaries - Week 7 - Individual Project - Spartan leadership development anaheim hills - How to use timer resolution - Subnetting practice exercises - Ilure lashes groupon - Hawke cable gland spanners - Ethical Behavior of Business Students at Bo Diddley Tech