subject

Assignment Requirements You have been working as a technology associate in the information systems department at Corporation Techs for more than two months now. Corporation Techs’ information technology (IT) department is setting up a new network in a remote office for an engineering firm. The network requires several groups: Project Management, Engineering, Drafting, and Architecture. The office is being set up near the project site and therefore, is separate from the main office. Further, several key employees will need access to the main office and remote office computer services. A network security and Virtual Private Network (VPN) plan is needed to connect it all together.
The network should segment for the four major groups with VPN access allowed by specific remote workers into each group.
Tasks
Develop a network security plan, basic topology, and VPN plan for this remote office. The security plan should keep the main office and its digital assets safe in case of a failure at the remote office.
Remote Office
Required Resources
Assignment Template:
(YOU MUST USE THIS TEMPLATE TO GET FULL CREDIT)
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: APA
Length: 3–4 pages
Spelling and Grammar count
Self-Assessment Checklist
I identified at least four different ways to protect digital assets with a
defense-in-depth approach.
I explained at least three methods to protect corporate digital assets from the potential threats the host-to-gateway VPN would introduce.
I explained the overall network topology.
Week 6: (RS4) Assignment 6: Remote Access Security Plan and Documentation
(YourName)
Assignment Requirements
You have been working as a technology associate in the information systems department at Corporation Techs for more than two months now. Corporation Techs’ information technology (IT) department is setting up a new network in a remote office for an engineering firm. The network requires several groups: Project Management, Engineering, Drafting, and Architecture. The office is being set up near the project site and therefore, is separate from the main office. Further, several key employees will need access to the main office and remote office computer services. A network security and Virtual Private Network (VPN) plan is needed to connect it all together.
The network should segment for the four major groups with VPN access allowed by specific remote workers into each group.
Tasks
Develop a network security plan, basic topology, and VPN plan for this remote office. The security plan should keep the main office and its digital assets safe in case of a failure at the remote office.
Describe the Network Topology to connect the Remote Office as shown above to the Corporate Office:
Identify at least four different ways to protect digital assets with a Defense-in-Depth approach:
Defense 1:
Defense 2:
Defense 3:
Defense 4:
List at least three methods to protect corporate digital assets from the potential threats the host-to-gateway VPN would introduce.
Method 1:
Method 2:
Method 3:
Method 4:

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 18:10
How can i delete permalinks from a word press site?
Answers: 1
question
Computers and Technology, 23.06.2019 02:00
As with any small island country, cuba has fewer natural resources than countries such as brazil. this affects their economy in that cuba a) exports only manufactured products. b) exports more products than it imports.. c) must import more products than it exports. d) has imposed trade barriers against the united states.
Answers: 3
question
Computers and Technology, 23.06.2019 18:30
This program should be a short piece of code that prints all of the positive integers from 1 to 100 as described more fully below. the program may contain multiple methods, and if using an oo language, should be contained within a single class or object. the program should be designed so that it begins execution when invoked through whichever mechanism is most common for the implementation language. â–ş print out all positive integers from 1 to 100, inclusive and in order. â–ş print messages to standard output, matching the sample output below. â–ş in the output, state whether the each integer is 'odd' or 'even' in the output. â–ş if the number is divisible by three, instead of stating that the number is odd or even, state that the number is 'divisible by three'. â–ş if the number is divisible by both two and three, instead of saying that the number is odd, even or divisible by three; state that the number is 'divisible by two and three'. â–ş design the logic of the loop to be as efficient as possible, using the minimal number of operations to perform the required logic. sample output the number '1' is odd. the number '2' is even. the number '3' is divisible by three. the number '6' is divisible by two and three.
Answers: 1
question
Computers and Technology, 23.06.2019 19:00
Now you’re on your own. include a short summary of this section with plots in your lab report. write a matlab script file to do steps (a) through (d) below. include a listing of the script file with your report. 1 the soundsc(xx,fs) function requires two arguments: the first one (xx) contains the vector of data to be played, the second argument (fs) is the sampling rate for playing the samples. in addition, soundsc(xx,fs) does automatic scaling and then calls sound(xx,fs) to actually play the signal. mcclellan, schafer, and yoder, dsp first, 2e, isbn 0-13-065562-7. prentice hall, upper saddle river, nj 07458. c 2015 pearson education, inc. 4 mcclellan, schafer and yoder, signal processing first. prentice hall, upper saddle river, new jersey, 2003. c 2003 prentice hall. (a) generate a time vector (tt) to cover a range of t that will exhibit approximately two cycles of the 4000 hz sinusoids defined in the next part, part (b). use a definition for tt similar to part 2.2(d). if we use t to denote the period of the sinusoids, define the starting time of the vector tt to be equal to t , and the ending time as ct . then the two cycles will include t d 0. finally, make sure that you have at least 25 samples per period of the sinusoidal wave. in other words, when you use the colon operator to define the time vector, make the increment small enough to generate 25 samples per period. (b) generate two 4000 hz sinusoids with arbitrary amplitude and time-shift. x1.t / d a1 cos.2
Answers: 1
You know the right answer?
Assignment Requirements You have been working as a technology associate in the information systems...
Questions
question
Computers and Technology, 15.07.2019 02:00
Questions on the website: 13722367