Secured Network vs. Dirty Network – custom papers

Secured Network vs. Dirty Network Order Description The 10 pages document will be placed as a new order but I want the same writer who will do my 2 pages outline and 5 slides PPT. Outline: Attachment with instructions to follow. Topic: Secured Network vs. Dirty Network Over the past two months management has been approached about passwords and sensitive information being compromised. The current network includes dirty internet traffic which has led to stolen passwords. To mitigate exploitation of stolen passwords the IT Project manager will be presenting management with two proposals. First proposal includes structural build-out to allow for up-to-date cabling which will not fully meet security requirements. Second proposal includes moving the unit to a brand new building. This would give IT full benefit of controlling the secured network with a two-tiered firewall. The transition must be seamless to the customer from telephone communications to maintaining military compliance as we fulfill the customer request through operations. The Project assignment reflects a possible real-life IT project that you, as a member of the IT technical staff at a real or assumed employer, will be tasked to do. So, you imagine your boss assigning a specific IT project for you to do (perhaps in collaboration with peers).The 1st step of the project is to define the topic of the project.The 3rd step is to craft a short PowerPoint presentation that you will present to your management. One purpose of the PP presentation is for you to persuade your management of your approach or solution to the project. This week, you create a presentation using Microsoft PowerPoint for your IT project. The presentation would be intended to your management to keep them abreast of the project. The Presentation must include a Name/Title slide/introduction, 5 slides on the theme of the project, and a bibliography slide (with at least 3 good and relevant references). You are encouraged to keep the slides simple, and use the Notes sections of the slides to include descriptive details and references!You are also encouraged to use graphics, images, audio-visuals, budget (workstations, cabling, servers, etc.) and any other features that may help enhance your presentation. You may included It’s required to draw a diagram that illustrates the project, and include it in the presentation. You may use Visio or any other drawing tool. The presentation will be subjected to checking against plagiarism upon submission. Turnitin is built into the Sakai classroom. The paper must follow acceptable originality criteria (no more than 15% max originality index, and 2% per individual source match are allowed). Use the following file naming convention for your PowerPoint presentation: ISSC340_Presentation_Selina_Nixon.ppt(x). Topic: Secured Network vs. Dirty Network Over the past two months management has been approached about passwords and sensitive information being compromised. The current network includes dirty internet traffic which has led to stolen passwords. To mitigate exploitation of stolen passwords the IT Project manager will be presenting management with two proposals. First proposal includes structural build-out to allow for up-to-date cabling which will not fully meet security requirements. Second proposal includes moving the unit to a brand new building. This would give IT full benefit of controlling the secured network with a two-tiered firewall. The transition must be seamless to the customer from telephone communications to maintaining military compliance as we fulfill the customer request through operations. Solution must have the capability to support trusted and untrusted internet connection, VoIP phone lines, file and printers and video teleconference capability. Feedback from teachers/classmates to consider throughout project: Make sure you employ theories pertaining to networking and also use scholarly references in your submission. You have to ensure that you relate your project specifically to networking theories to develop a solution solve the project to project you propose. LAN / WAN based. You basically will migrate a datacenter/local office from one location to another without a loss of business and improving security through access control. Consider using VPN and LAN interconnection. There are different ways to setup a VPN such as Client VPN’s, SSLVPN’s (Secure Socket Layer), DMVPN (Dynamic Multipoint), Site to Site, etc. Tunnels (Cisco) as the Layer 2. Network topographic Questions – your setup depends on the topography you are trying to design for. Will your file and print server be in the DMZ as opposed to the internal network? You also need to identify if you will provide guest wireless access and how that will be provided. Need to look at network requirements, draw up a topology diagram, the network design strategy, look at the TCP/IP design, addresses, and whether or not I need static or dynamic addresses, and the router configuration. Questions – what exactly is the scope of the VPN deployment? Do you have a ballpark of how many users this solution will support. Is this really for site to site access or will this be for end users to log in to the corporate network using their laptops or desktops? Will you be allowing for non-enterprise devices or user owned devices to log in? What kind of protocols will you use for VPN and layer-2 termination to ensure security and privacy? Thoughts – Will new building connect onto the existing network with computer and have VoIP capabilities for the phone lines? If so will you deploy a DHCP server? Also you need to provide detail around size and how many networks you will be providing DHCP for. When you set up the computer and VOIP how would you manage your port count. With CISCO VOIP it has an input and output network port, so you can use 1 port on a switch but provide network capabilities to 2 devices.

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount! Use Discount Code “Newclient” for a 15% Discount!NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post Secured Network vs. Dirty Network – custom papers appeared first on The Nursing TermPaper.

Order a similar paper and get 15% discount on your first order with us

Dr. Padma Myers
Dr. Padma Myers
98% Success Rate
Read More
“Hello, I deliver nursing papers on time following instructions from the client. My primary goal is customer satisfaction. Welcome for plagiarism free papers”
Stern Frea
Stern Frea
98% Success Rate
Read More
Hi! I am an English Language and Literature graduate; I have written many academic essays, including argumentative essays, research papers, and literary analysis.
Dr. Ishid Elsa
Dr. Ishid Elsa
98% Success Rate
Read More
"Hi, count on me to deliver quality papers that meet your expectations. I write well researched papers in the fields of nursing and medicine".
Dr. Paul P. Klug
Dr. Paul P. Klug
99% Success Rate
Read More
"A top writer with proven reliability and experience. I have a 99% success rate, overall rating of 10. Hire me for quality custom written nursing papers. Thank you"

How Our Essay Writing Service Works

Tell Us Your Requirements

Fill out order details and instructions, then upload any files or additional materials if needed. Then, confirm your order by clicking “Place an Order.”

Make your payment

Your payment is processed by a secure system. We accept Mastercard, Visa, Amex, and Discover. We don’t share any informati.on with third parties

The Writing Process

You can communicate with your writer. Clarify or track order with our customer support team. Upload all the necessary files for the writer to use.

Download your paper

Check your paper on your client profile. If it meets your requirements, approve and download. If any changes are needed, request a revision to be done.

Recent Questions

Stay In Touch!

Leave your email and get discount promo codes and the best essay samples from our writers!