Academic Writing Experts For Your Research Projects

Order custom papers, masters thesis and dissertation in 3 guided steps; human written!

Posted: March 3rd, 2022

Information Systems

• Application of Network Security Concepts

An international law firm has asked you to engage in a risk and mitigation evaluation and plan for their organization. The details of their infrastructure follow.
The organization has offices in:
o United States: New York, New York, and Palo Alto, California (headquarters).
o England: London.
o Russia: Moscow.
o Mongolia: Ulaanbaatar.
o China: Hong Kong.
o Japan: Tokyo.
Each location is set up as a star topology with 40 PCs networked together, with the exception of the law firm's headquarters in Palo Alto, California. The offices in New York are located on the 20th floor of a high rise. The remaining locations are all in commercial office centers with office space that shares a common wall with other businesses. All locations have a dedicated closet space that houses the networking equipment. Each location has IT support, and local users are managed locally with organization-wide replication of active directory changes that occur every 20 minutes. 
Headquarters
The Palo Alto location has an additional 10 PCs and the following employees:
o Executives: Chief executive officer, chief financial officer, chief operating officer, chief information officer, and chief ethics officer, plus executive assistants (5).
o Accounting: Director, accounts payable clerk, and accounts receivable clerk.
o Human Resources: Director.
o Information Technology: Director and systems analyst.
o Legal: Attorneys (10), paralegals (10), legal assistants (10), and legal interpreters (2).
o Administration: Office administrator and office assistant.
Other Offices
Each of the other locations has 40 PCs and the following employees:
o Accounting: Director, accounts payable clerk, and accounts receivable clerk.
o Human Resources: Director.
o Information Technology: Director and systems analyst.
o Legal: Attorneys (10), paralegals (10), legal assistants (10), and legal interpreters (2).
o Administration: Office administrator and office assistant.
Further Details
Additional details about the project organization including the following:
o All executives, lawyers, paralegals, legal assistants, and legal interpreters have been issued an HP Pavilion dv7t Quad edition laptop with security provided by Zone Alarm's security suite. No desktops are used by these employees. Docking stations are used at the office. When out of the office, each of these employees conducts business wirelessly using AT&T's wireless card and Motorola's Droid X.
o All other employees use HP's Pavilion Elite HPE-570t series desktop.
o All laptops and desktops run the Windows XP operating system with WordPerfect, Office 2010 - Essay Writing Service: Write My Essay by Top-Notch Writer Professional, Windows Media, WebEx, and Adobe Reader 8 installed. The company uses Gmail as its e-mail provider. Droid X runs all of the above except for the XP operating system. Each runs the Android 2.2 OS.
o Each location uses an IBM BladeCenter HX5 server along with Microsoft Windows Server 2008 - Affordable Custom Essay Writing Service | Write My Essay from Pro Writers R2 (NOS).
o The switch for each location is Cisco's Catalyst 2960-S series model number 2960S-48TS-S with Cisco TrustSec installed.
o All locations but the Mongolia office have been equipped with Cisco's 3900 series Integrated Services Router Model 2951, with security provided by Cisco's Network Analysis Module (NAM).
o The Mongolia office is equipped with Cisco's Space Router due to Ulaanbaatar's unreliable infrastructure.
Connecting the locations to each other is an IP WAN utilizing an integrated services digital network primary rate interface (ISDN-PRI) back up and fiber distributed data interface (FDDI).
Use the study materials, the enterprise description, and any additional research needed to fill in knowledge gaps. Ace my homework - Write a 2–3 page paper that addresses the following:
o Evaluate the existing infrastructure as it currently exists.
o Identify significant vulnerabilities, risks, and points that exist within the network architecture of the organization.
o Recommend specific security technologies/methods that can be implemented to mitigate risks and points of vulnerability within the organization.
o Explore the benefits and challenges of implementing a cloud based solution for this organization.
Assignment Requirements
o Written communication: Written communication is free of errors that detract from the overall message.
o Ace homework tutors - APA formatting: Resources and citations are formatted according to Ace homework tutors - APA (sixth edition) style and formatting.
o Length of paper: 2–3 pages, excluding the references page.
o Font and font size: Times New Roman, 12 point. 

Tags: writing a thesis statement, write my thesis, top dissertation writing services, thesis writing services, thesis writing help, thesis help

Why choose Homework Ace Tutors

You Want Quality and That’s What We Deliver

Top Academic Writers

We’ve put together our writing team with care, choosing talented writers who shine in their fields. Each one goes through a tough selection process, where we look for folks with deep expertise in specific subjects and a solid history of academic writing. They bring their own mix of know-how and flair to the table, making sure our content hits the mark—packed with info, easy to read, and perfect for college students like you.

College Prices

We don’t do AI-written essays or copycat work—everything’s original. Competitive pricing is a big deal for us; we keep costs fair while delivering top-notch quality. Our writers are some of the best out there, and we charge rates that stack up well against other services. This means you get stellar content without draining your wallet. Our pricing is straightforward and honest, built to give you real value for your money. That’s why students turn to us for high-quality writing services that won’t break the bank.

100% Plagiarism-Free

Academic integrity is at the heart of what we do. Every paper starts from scratch, with original research and writing tailored just for you. We write 100% authentic—no plagiarism research essays. Our strict quality control process includes scanning every draft with top tools like SafeAssign and Turnitin, so you get a similarity score and proof of originality. We’re obsessive about proper citation and referencing too, crediting every source to keep things legit. It’s all about giving you peace of mind with content that meets the highest standards.

How it works

When you decide to place an order with Dissertation Writer, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went and the marking criteria grade you scored. You can leave a review recommending a writer for your class and course mates.