Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Design a secure network for an organization that has three campuses. Campus A has about 250 users and is located 125 miles from Campus B

Design a secure network for an organization that has three campuses. Campus A has about 250

users and is located 125 miles from Campus B and 370 miles from Campus C. Campus B has

about 100 users and is located 390 miles from Campus C. Campus C has 75 users. A user

should be able to login to any workstation and have access to his or her network resources

(printers, network storage, etc.). The organization performs regular business functions and does

not have any special requirements for privacy or secure transmission that exceed regular business

practices but data transmission between campuses should be considered reasonably secure

from inspection. At least two paths should exist from each campus to each other campus to

provide redundancy and a backup in the case that a link fails.

You should deliver a plan that describes the architecture and equipment used to interconnect the

LANs at each campus. List any assumptions that you are making (for example, Windows

Domain Controllers will be used). For each service or hardware component, you must provide a

price, good estimates are acceptable where exact prices cannot be determined. You must provide

estimates for a total amount required to implement the system and also the amount per month to

operate the system. Extra points will be awarded for lower total prices as long as the proposed

equipment and services seem adequate. You must also provide an estimated amount of time

required for implementation and testing.

Remember, you are only concerned with the services, equipment, and costs of securely

connecting the three campuses. You do not need to worry about workstations, printers,

storage, webservers, etc.

-----------------------------------------

.

You will be graded based on how well you demonstrate the following:

1- Identification of Problem or Definition of Project

2- Stakeholder Research and Analysis

3- Impact Analysis Research (economic, cultural, ethical, social, legal)

4- Timeframe Analysis

5- Alternatives Evaluation

6- Hardware Requirements

7- System and Application Software Selected for Use

8- Proposed Solution Objectives

I have found this the best way to explain how private and public keys are exchanged securely. It uses color to explain.

https://www.youtube.com/watch?v=YEBfamv-_do

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Building The Data Lakehouse

Authors: Bill Inmon ,Mary Levins ,Ranjeet Srivastava

1st Edition

1634629663, 978-1634629669

More Books

Students also viewed these Databases questions

Question

Why did Bruce fail to successfully implement the changes?

Answered: 1 week ago

Question

Consistently develop management talent.

Answered: 1 week ago

Question

Create a refreshed and common vision and values across Europe.

Answered: 1 week ago

Question

Provide the best employee relations environment.

Answered: 1 week ago