The case study company soulmate ventures has expressed a


The case study company (Soulmate Ventures) has expressed a desire to have a secure company-wide network infrastructure. Because the network has to revaluated from the beginning, the company wants to ensure that the new network has as many reasonable security controls and mechanisms in place. What solutions can you propose to support these initiatives?

This section should be 4-5 pages long (2-3 pages of network topology, 1-2 pages of IPS and IDS).

  • Propose an appropriate network infrastructure that offers sound security practices for the existing intranet and the new proposed expansion.
  • Create and describe a diagram of the network architecture, discussing how it can meet the goals of the company.
  • Describe the access controls and how the company can ensure that devices and topology are effective and working to protect the company infrastructure.
  • Review and describe the need for intrusion detection systems (IDS) and intrusion prevention systems (IPS).
  • Discuss how they can effectively be used in a network operations setting.
  • Ensure that there is an appropriate use of the IDS and IPS in the network diagram.

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: The case study company soulmate ventures has expressed a
Reference No:- TGS01222085

Now Priced at $50 (50% Discount)

Recommended (93%)

Rated (4.5/5)

A

Anonymous user

2/26/2016 2:00:17 AM

Provide a paper in approximately 4 to 5 pages word document regarding securing company-wide network infrastructure. The paper must encompass the following questions. 1) Suggest a suitable network infrastructure which provides sound security practices for the existing intranet and the latest proposed expansion. 2) Create and illustrate a diagram of the network architecture, describing how it can meet up the goals of the company. 3) Illustrate the access controls and how the company can make sure that devices and topology are efficient and working to protect the company infrastructure. 4) Review and explain the requirement for intrusion detection systems (IDS) and intrusion prevention systems (IPS). 5) Describe how they can efficiently be employed in a network operations setting. 6) Make sure that there is a suitable utilization of the IDS and IPS in the network diagram.