ined the best network design to ensure the security of internal access while retaining public website availability. ▪ I designed a network configuration with physical and logical topologies, and identified major network elements and their locations within the private and protected network segments. ▪ I created a plan that ensures communications are available 24/7. ▪ I recommended whether to continue using IPv4 or upgrade to IPv6, and explained why. ▪ I created a basic networ

Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter12: Protection Mechanisms
Section: Chapter Questions
Problem 5RQ
icon
Related questions
Question

Self-Assessment Checklist
▪ I determined the best network design to ensure the security of internal access while retaining public website availability.
▪ I designed a network configuration with physical and logical topologies, and identified major network elements and their locations within the private and protected network segments.
▪ I created a plan that ensures communications are available 24/7.
▪ I recommended whether to continue using IPv4 or upgrade to IPv6, and explained why.
▪ I created a basic network diagram that illustrates the current network and enhancements.
▪ I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
▪ I followed the guidelines.

Scenario
The Corporation Techs' current network consists of 1 web server (accessible by the public), 2 application
servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs
Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft
Windows. The network is connected through a series of switches, is not physically connected to other
networks, and runs Internet Protocol version 4 (IPV4). The network is protected by a single border firewall.
The senior network architect, whom you work for directly, has verified the company's business goals and
has determined the features and functions required to meet those goals.
The senior network architect has asked you to create a network design that includes the following
components:
Current infrastructure elements
A logical topology that separates the Accounting and Sales departments
Redundant communications
Justification for continuing with IPV4 or upgrading to IPV6
Tasks
For this part of the project, perform the following tasks:
1.
Conduct research to determine the best network design to ensure security of internal access
while retaining public website availability.
2. Design a network configuration with physical and logical topologies. Identify major network
elements (e.g., servers, switches, gateways) and their locațions within the private and protected
network segments.
3.
Include a high-level plan that ensures communications are available 24/7.
4.
Recommend whether to continue using IPV4 or upgrade to IPV6, and explain why.
5.
Create a basic network diagram that illustrates the current network and enhancements. Include a
few workstations to represent all workstations on the internal network. The diagram will be very
high level at this stage and include only necessary details. You may use a software tool or simply
pencil and paper. You will update this design later in the project.
6. Create a draft report detailing all information as supportive documentation.
7. Cite sources, where appropriate.
Required Resources
Internet access
Course textbook
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation style: Your school's preferred style guide
Length of report: 3–4 pages
© 2022 by Jones & Bartlett Leaning IIC an Ascend I earning Company All rights reserved
Transcribed Image Text:Scenario The Corporation Techs' current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPV4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company's business goals and has determined the features and functions required to meet those goals. The senior network architect has asked you to create a network design that includes the following components: Current infrastructure elements A logical topology that separates the Accounting and Sales departments Redundant communications Justification for continuing with IPV4 or upgrading to IPV6 Tasks For this part of the project, perform the following tasks: 1. Conduct research to determine the best network design to ensure security of internal access while retaining public website availability. 2. Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locațions within the private and protected network segments. 3. Include a high-level plan that ensures communications are available 24/7. 4. Recommend whether to continue using IPV4 or upgrade to IPV6, and explain why. 5. Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. You may use a software tool or simply pencil and paper. You will update this design later in the project. 6. Create a draft report detailing all information as supportive documentation. 7. Cite sources, where appropriate. Required Resources Internet access Course textbook Submission Requirements Format: Microsoft Word (or compatible) Font: Arial, size 12, double-space Citation style: Your school's preferred style guide Length of report: 3–4 pages © 2022 by Jones & Bartlett Leaning IIC an Ascend I earning Company All rights reserved
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps with 1 images

Blurred answer
Knowledge Booster
Network Protection Strategies
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,
Enhanced Discovering Computers 2017 (Shelly Cashm…
Enhanced Discovering Computers 2017 (Shelly Cashm…
Computer Science
ISBN:
9781305657458
Author:
Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:
Cengage Learning
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning