Network Infrastructure Design Diagram

Background: Kamehameha Institute is an organization that provides educational offerings to non-traditional students via the institute’s website in a three-tier web, application, and database configuration. The State of Hawai’i regulates the educational sector, driving the need to ensure Kamehameha follows the State’s strict security and regulatory requirements. Kamehameha’s leadership is also very concerned with the threat posed by the online theft of their unique intellectual property. Additionally, the number of Hawai’ian entities breached by threat actors is on the rise. Thus, security, privacy, and compliance are all important considerations for the Kamehameha network architecture.

Your boss, the Kamehameha Institute’s Chief Operating Officer (COO) has tasked you to design a network infrastructure for three facilities located in the Hawaiian Islands of Honolulu, Hilo, and Lihue. The COO stipulated that you must provide for strengthened defenses to protect Kamehameha’s cultural heritage. After meeting with the COO, the two of you drafted the following set of requirements for your network design:

  • Each of the facilities has three floors:
    • The first and second floor of each building requires 150 network connections each for machines connected to the management network used by administrators to manage the network devices
    • The third floor of each building requires 75 network connections for the servers
    • All sites require redundant connectivity to the other sites (e.g., Internet redundancy between the sites can be accomplished through a single Internet connection and a point-to-point link between the sites or two Internet connections provided by separate vendors along with point-to-point VPN connections between the sites)
  • Each datacenter is a redundant failover environment to the other datacenters (Hilo, Honolulu, Lihue)
  • A constant connection between the three locations, carrying at least 75 Mbps of data
  • All servers at all locations must have redundancy
  • Protection from intrusions is required and should be documented
  • A plan to verify security and failover measures is required

Submission: Using a network diagramming tool such as Microsoft Visio, or free tools such as LibreOffice Draw or Draw.io available at https://draw.io (no sign-in or registration required), create a network diagram (drawing) specific to the organization that encompasses the three facilities and also depicts any necessary interconnections. Figure 1 shows the draw.io ‘new network diagram’ dialog window:

Figure 1. Draw.io New File Dialog Showing the Network Diagramming Templates

Your diagram should include enough detail to show the topology interconnections. The viewer should be able to understand the Kamehameha Institute’s network environment and be able to implement the architecture you develop. Ensure that you properly cite any external sources.

One of the keys to producing a viable network diagram is labeling the objects consistently and descriptively. Think about what you would want to know about a network device if you logged into it with little prior information. Consider location, floor number, or other pertinent information. At a minimum, include the following elements:

  • IMPORTANT: Your network diagram must include an identifying label (e.g., callout box) that includes your class and section, assignment title, your name, and the date. Edit the items in italics. Your assignment will not be accepted if this element is missing:

Example Network Diagram Callout Box.

CMIT 350 6980
Project #1 Network Diagram
Student Name: Name
Date: 6/22/2010

  • Any necessary hardware
  • Site-to-Site (WAN) connections (e.g., leased line connectivity, satellite, etc.)
  • Annotate the following values for each of the Sites:
    • Network ID
    • Useable Range
    • Subnet Mask
    • CIDR Value
    • Broadcast Address
  • All devices require hostnames complying with the following naming conventions:
    • Routing Devices: Rx; where x is the site number incremented by a value of 1 for each routing device
    • Switching Devices: Sx; where x is the site number incremented by a value of 1 for each switching device
    • Servers: SRVx where x is the server number incremented by a value of 1 for each server
  • For each site routing device, implement a private ip addressing scheme using a range suitable for corporate infrastructure and include the following:
    • management vlan
    • production vlan
  • High availability

When finished, export the diagram as a PDF document (Note: You will need to use this diagram again in Project 3, so ensure you save the xml source file!) and submit it to the Assignment folder. Figure 2 demonstrates how to export your draw.io diagram as a PDF document:

Relational Database

 Assume that your boss knows  nothing about relational database theory. The goal of this paper is to obtain your boss’s approval to  proceed with your stated project. Do not focus on technical aspects of a database management  system. Focus on how the information will be captured, manipulated, managed, and shared, and the  value the database brings to the organization. Include brief examples of how other industries (both  domestic and international) have successfully used relational databases to increase efficiency. 

Kindly find the instructions of the paper below. 

Wireless Hacking

How can you authenticate, authorize, and audit wireless traffic on a Windows Active Directory Network? Please detail the actual setup. 500 words minimum.

ERM Startegy

The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Chapter Summary

Need to write about 2 pages (1.5 line spacing and 11 or 12 font size) of summary of chapter, so that it contains:

(part 1) important concepts of the chapter

(part 2) experience/application/opinions of the chapter.  

digital evidence

 

In chapter 4, the text mentioned the crime of computer forgery.  Here is a case regarding computer forgery and how digital forensics was able to prove the underlying file was indeed forged.  https://nakedsecurity.sophos.com/2019/01/17/telltale-font-scuppers-bankruptcy-trust-claim/  

Basically, the document claimed to be created (and a printed copy signed and dated as proof, at a time before the fonts used in the document were available.

For this discussion, write 200-250 words on your opinion of this case.  Can you think of other digital artifacts that could be used to prove that a computer file is not what it claims to be?

Final project draft

 

The Final Project requires the student to find a current case of an organization/brand/company who is either (a) engaging in a positive social responsibility campaign or (b) acting in a manner that is ethically questionable. The paper should include the following:

  1. Introduce the organization
  2. Outline the the issues involved in the case
  3. Document the Strategic Communication Tactics used in the case.
  4. Offer perspective on the behaviors in the case and its effect on stakeholders and society in general.
  5. Provide a conclusion

 

To find a case to write about, students should explore current news media, trade press and/or company websites.

For this initial draft, complete an annotated outline. An annotated outline usually has comments, explanations and references to the material you will write. You are telling us what you are going to tell us. An example of an annotated out is Sample #2 located here. Write your annotated outline like this sample.

Assignment Format: MS Word Document; APA format

Length: 4  pages

Citations Required: Minimum 3 Scholarly Reference