Routing is a fundamental function of a network.

Routing is a fundamental function of a network. Routing is the process of selecting paths in a network along which

to send network traffic. In many ways, routing is analogous to the postal mail delivery. The routing on the Internet and many other computer networks is based on IP addresses, although routing could use other information such as services. Assume that you are the designer of a new network scheme that does not depend on the current TCP/IP protocols.In your post, address the following:

  • What information do you think is best used for routing? Explain.
  • Since each computer has a Media Access Control (MAC) address for its network interface, what would be the biggest downside to using the computer’s MAC address for routing?
  • What is the most significant benefit to using IP addresses for routing? What is the primary technical goal you could meet because of this benefit?

Be sure to defend and support your opinion and remember to properly cite your sources according to APA guidelines.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Application: Aligning Security with Business Objectives

Application: Aligning Security with Business Objectives

The security policy of an organization is not an

one-for-all solution; it varies with the organization. As you begin your exploration of information assurance and risk management, consider how organizations in different countries, and even different states, are distinct, with their own structures, culture, and dynamics, as well as unique security-related regulations. Some of this may be due to the nature of the organization, its size, and its business use cases—that is, situations in which a technique may be used profitably. Other concerns can be attributed to the laws, regulations, and industry standards for its location. Even organizations doing business on the Internet may face regulations when doing business in another country or state.

To prepare for this Assignment, assume the role of a consultant working for a bank in your home country that is expanding its online banking to mobile devices. At the same time, it will be opening its first branch office in another country. Choose the location of the new office and use the Internet as well as the Learning Resources in this Week to research regulations and industry standards relevant to the new location. Also research the privacy laws (including Internet privacy regulations) that apply for both the locations. Examples could be the Gramm-Leach-Bliley Act (financial services regulation in Weeked States) or the California Breach Notification Law applicable for Weeked States scenarios. You will need to refer to Brotby, “Layered Security” and “An Introduction to ISO 27001, ISO 27002….ISO 27008” in addition to other reading resources.

Explaining how to align the security policy of the organization with its business objectives, keeping in mind the regulations, privacy laws, and industry standards you have identified. Clearly state any assumptions, and provide citations for reputable sources used in your research.

Cover the following points:

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Assignment: Developing Network Topology

Assignment: Developing Network Topology

style=”color:#000000;”>A topology is a high-level blueprint of the network. It is a map that indicates network segments, interconnection points, and user communities. Its purpose is to show the logical organization of the network, not its physical geography or technical implementation. It depicts where routing, switching will occur, and where security policies are to be applied. As a result, the topology is often different from the geographical map of sites. A network topology is normally derived from the network technical requirements. In this Application, you will further refine your network design you started in the previous unit. The following represents the network’s technical requirements:

·        Separate the subnets for the control office and for the stadium. Give each subnet its own separate IP addressing.

·        The two subnets are connected with the campus network.

·        There are different terminal devices: console (computer), video cameras, temperature sensors, and mobile handsets.

·        The network requires both wired and wireless (WiFi) media technologies.

Describe the two types of topology models covered in your readings in this unit. Evaluate each model by examining the advantages and disadvantages of each. Then select the model you believe is the best fit for these technical requirements and explain how your choice satisfies the technical requirements. As an appendix to your paper, include a network topology diagram for the Sports Management Division’s network that uses the model you selected. Show the layering and IP addressing allocation. Be sure to have the WiFi network represented.

Remember to properly cite your sources according to APA guidelines.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

A  Key Assignment Outline to discuss the management of the process by which policies and strategies relating to technology are formed.

Part 1

A  Key Assignment Outline to discuss the management of the process by which policies and strategies

relating to technology are formed.

Part 2

Your company has decided to move forward with the acquisition of the smaller company as described in the Phase 1 Individual Project. Your company was impressed with the information that you provided about Porter’s five factors and your qualitative evaluation of the industry’s strategic position. Your management has now asked you to make a Strategic Business Plan for the newly acquired company. You must provide this new plan and incorporate the information about Porter’s five factors.

Your Strategic Business Plan should include the following features:

·        Executive summary

·        Marketing analysis

o  You should identify a target market.

o  You should establish a strategy for acquiring a customer base.

·        Strengths, Weaknesses, Opportunities, and Threats (SWOT) analysis

·        Financial statements

·        Summary of the relevance of Porter’s five factors

·        Conclusion

Label as part 1 and part 2

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Quality of Service (QoS) helps ensure an acceptable user experience for multimedia applications.

Quality of Service (QoS) helps ensure an acceptable user experience for multimedia applications. In the early days

of Internet development, the focus was on data applications, so QoS was not necessary. However, more and more network applications now depend on multimedia. In your post:

  • Give an example where QoS provisioning is necessary. Explain why.
  • What will be the tradeoffs if QoS is provisioned in a network?

Be sure to defend and support your opinion and remember to properly cite your sources according to APA guidelines.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Developing and implementing an IT security governance program

Developing and implementing an IT security governance program in an organization is not enough; it is equally

important to evaluate its efficacy. You have examined how the effectiveness of the security governance program of an organization can be measured by how well it results in six key outcomes. However, as a security professional you should understand how the six key outcomes shape and affect your security governance program.

Assess the importance and value of applying these objectives to improve security governance at an organization.

Choose an arbitrary organization and briefly describe the nature of its business. The organization can be a fictitious one or a real one about which you have knowledge. Now choose one of the six outcomes of effective security governance (ISACA, 2008, as cited by Brotby, 2009) that you think is the most important for your chosen organization.

Describe specific details about how the outcome can help determine the chosen organization’s security governance objectives. Justify your reason for choosing the particular outcome over others.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

The physical implementation of a network should reflect the network’s technical goals

The physical implementation of a network should reflect the network’s technical goals. For example,

network traffic characteristics may require a particular bandwidth requirement in order to ensure network performance. This need will affect your implementation choices. In your post:

  • Explain two criteria that you think are the most important when selecting the physical devices for a particular networking implementation. Why?
  • Choose one of the technical goals for a network you studied earlier in the course. Describe a networking scenario that would require you to make particular physical media choices to support that technical goal. Why would your choice of media be a better fit for your scenario than another?

Be sure to defend and support your opinion and remember to properly cite your sources according to APA guidelines.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Write a short message of between 15 and 40 characters to your classmates.

Write a short message of between 15 and 40 characters to your classmates. Encode it using a linear affine cipher

with n=26. Post the message to the “Encrypted Messages” thread but do not give the “a” and “b” that you utilized.

Also post your own initial response thread in which you propose at least one way that you might try to decipher messages without the key.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Determining Switching Technologies

Determining Switching Technologies

Work with the topology in the following network

diagram.

wk4.pngDecide which switching technologies, protocols, and physical media you should use for the following segments of the network:

•  The access layer between the Sports Facility Network and the Stadium Subnet

•  The Stadium Subnet and all devices connected to it

•  The Control Office Subnet and all devices connected to it

In a 2- to 3 pp, indicate and justify your choices for the following items:

•  Bandwidth requirements for each wired or wireless segment

•  Cable technology

•  Wi-Fi technology

•  Routers and switches

Be sure to use components currently available on the market today. You may need to search the Internet for vendors.

In addition to your analysis, indicate in your paper where these components should be placed on the diagram.

**Remember to properly cite your sources according to APA guidelines.

WK4 Assignment .docx

Determining Switching Technologies
Work with the topology in the following network diagram. •

• Decide which switching technologies, protocols, and physical media you should use for the following segments of the network:
The access layer between the Sports Facility Network and the Stadium Subnet
The Stadium Subnet and all devices connected to it
The Control Office Subnet and all devices connected to it •


• In a 2­ to 3 pp, indicate and justify your choices for the following items:
Bandwidth requirements for each wired or wireless segment
Cable technology
Wi­Fi technology
Routers and switches
Be sure to use components currently available on the market today. You may need to search the Internet for vendors.
In addition to your analysis, indicate in your paper where these
components should be placed on the diagram.
**Remember to properly cite your sources according to APA guidelines.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Security should be a major consideration in maintaining a network

Security should be a major consideration in maintaining a network. In addition to the use of security protocols,

technologies, and devices in network design, network administrators should periodically audit network components such as computers and routers. Suppose that your manager has just come back from training on network maintenance and asks you to perform an audit of your network. In your post:

  • Identify an item that could be audited.
  • Explain why it is desirable to be audited.
  • Discuss how to audit it.
  • Describe what resources are needed to perform this audit.
  • Describe the security implications for not auditing it.

Be sure to defend and support your opinion and remember to properly cite your sources according to APA guidelines

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"