Free Essay

Physical Network

In:

Submitted By KSchurr
Words 1713
Pages 7
1. Amazon EC2: Amazon Elastic Compute Cloud: a. Elastic Web-Scale Computing—Amazon EC2 enables you to increase or decrease within minutes, not hours or days. A person can commission one, hundreds or even thousands of server instances simultaneously. But of course, because this is all controlled with web service APIs, the application can automatically scale itself up and down depending on its needs. b. Completely Controlled—A person have complete control of instances. A person has root access to each one and a person can interact with them as the person may would at any machine. A person can stop their instance while retaining the data on you boot partition and then subsequently restart the same instance using the web service APIs. Instances can be rebooted remotely using the web service APIs. The person can also have access to console output of a person’s instances. c. Flexible Cloud Hosting Services—A person may have the choice of multiple instance types, operating systems, and software packages. Amazon EC2 will allow a person to select a configuration of memory, CPU, instance storage, and the boot partition size that is optimal for someone to choose an operating system and application. For an example, a person’s choice of an operating system includes numerous Linux distributions, and Microsoft Winders Server. d. Designed for use with other Amazon Web Services—Amazon EC2 works in conjunction with Amazon Simple Storage Service (Amazon S3), Amazon Relational Database Service (Amazon RDS), Amazon SimpleDB, and Amazon Simple Queue Service (Amazon SQS) to provide a complete solution for computing, query processing and storage across a wide range of applications. e. Reliable—Amazon EC2 offers a highly reliable environment where the replacement instances can be rapidly and predictably commissioned. The service runs with Amazon’s proven network infrastructure and data centers. The Amazon EC2 Service Level Agreement commitment is 99.95% availability for each Amazon EC2 Region. f. Secure—Amazon EC2 works in conjunction with Amazon VPC to provide security and robust networking functionality for your compute resources. i. Your compute instances are located in a Virtual Private Cloud (VPC) with an IP range that you specify. You decide which instance are exposed to the Internet and which remain private. ii. Security Groups and networks ACLs allow you to control inbound and outbound network access to and from your instances. iii. You can connect your existing IT infrastructure to resources in your VPC using industry-standard encrypted IPsec VPN connections. iv. You can provision your EC2 resources as Dedicated Instances. Dedicated Instances are Amazon EC2 Instances that run on hardware dedicated to a single customer for additional isolation. g. Inexpensive—Amazon EC2 passes on to you the financial benefits of Amazon’s scale. You pay a very low rate for the compute capacity you actually consume. v. On-Demand Instances—On-Demand Instances let you pay for compute capacity by the hour with no long-term commitments. This frees you from the costs and complexities of planning, purchasing, and maintaining hardware and transforms what are commonly large fixed costs into much smaller variable costs. On-Demand Instances also remove the need to buy “safety net” capacity to handle periodic traffic spikes. vi. Reserved Instances—Reserved Instances provide you with a significant discount (up to 75%) compared to On-Demand Instance pricing. There are three Reserved Instance payment options (No Upfront, Partial Upfront, All Upfront) that enables you to balance the amount you pay upfront with your effective hourly price. The Reserved Instance Marketplace is also available, which provides you with the opportunity to sell Reserved Instances if you needs change (i.e. want to move instances to a new AWS Region, chance to a new instance type, or sell capacity for projects that end before your Reserved Instance term expires). vii. Spot Instances—Spot Instances allow customers to bid on unused Amazon EC2 capacity and run those instances for as long as their bid exceeds the current Spot Price. The Spot price changes periodically based on supply and demand, and customers whose bids meet or exceed it gain access to the available Spot Instances, if you have flexibility in when your applications can run, Spot Instances can significantly lower your Amazon EC2 costs. 2. Google h. What makes Google Apps for work Different? Five areas set Google Apps apart, which is why research firm Radicati named Google Apps for Work the leader in cloud business email. A summary of the report can be found in the related resources. viii. A cloud pioneer. Google is recognized as a trusted name and an industry leader in reliable cloud infrastructure.
Built for the cloud. Google Apps was designed as an entirely cloud-based service from the ground up, so IT departments don’t need to spend time and money maintaining any desktop components.
A complete package. The suite includes file storage and sharing with Google Drive, real-time collaboration with Google Docs, video meetings with Hangouts and professional email with Gmail, all for one single price.
Consistency and comfort. Google Apps users enjoy the same experience across different devices, operating systems and browsers, and many employees already use Google products at home.
Offline support. Gmail, Calendar and Google Docs let users view, edit and create content when they’re not on the Internet, syncing automatically when they reconnect. i. Why should I pay for Google Apps for Work when Google offers similar products for free? With Google Apps for Work, you'll receive a number of additional business-grade services not included in the free consumer product, including: professional email at your domain, additional storage across Gmail and Drive, 24/7 phone and email support, 99.9% guaranteed uptime, interoperability with Microsoft Outlook, enhanced security features, and full administration of all user accounts. j. How do pricing and billing work? When you sign up for Google Apps for Work, you will automatically be granted a free 30-day trial, for up to 10 users. It is important to set up a billing and payment plan before the end of your trial period to ensure uninterrupted service. For companies of all sizes, Google Apps is $5/user/month or $50/user/year. Google Apps with unlimited storage and Vault is an additional $5/user/month. You have two choices for your billing plan. With the Flexible Plan, you have the flexibility to add and delete user accounts at any time. You will only pay for the service that you use during the month. You will be billed monthly. With the Annual Plan, you are committing to Google Apps for a full year and get a discounted rate. You can add additional users at any time. You will be billed monthly for a portion of the annual commitment. k. If I only want one of the products, do I have to buy the entire suite? Yes. Google Apps is designed as an all-in-one solution with integrated tools that work seamlessly together. For instance, you can receive a message in Gmail and instantly convert it into a Calendar event. When you make a comment in Docs, Sheets or Slides, collaborators automatically receive email alerts. With a single click, you can launch a Hangouts video meeting from your inbox or calendar. Using these tools as a complete package improves productivity while giving your business the most value. However, you are welcome to purchase the suite and only use the services of your choice. l. Is Google Apps compatible with the email client I use today? In addition to accessing Google Apps mail from the Gmail web interface, you can send and receive mail from your favorite desktop client. Depending on the client, you can use either the IMAP or POP mail protocol. If you’re switching to Google Apps from Microsoft Exchange or some other Outlook service, you can use Google Apps Sync. This is a plug-in for Outlook 2003, 2007, 2010 or 2013 that lets you use Outlook to manage your Google Apps mail, calendar and contacts—along with your Outlook notes, tasks and journal entries. m. Can I replace my current software with Google Docs, Sheets and Slides? We’ve found that many of our customers are able to eliminate their existing productivity suites and rely exclusively on Google Docs, Sheets and Slides. Docs, Sheets and Slides are productivity tools that let you create different kinds of files, including text documents, spreadsheets and presentations. You can work on them in real time with other people and store them online in Google Drive. They’re included with Google Apps and work on any device. Unlike with traditional desktop applications, there’s no software to install. They’re compatible with files made in other programs, such as Microsoft Office. n. Will Google host my website and domain? No. We do not host websites or domains. You will continue using your current provider for hosting and simply redirect your Mail Exchange (MX) records to Google’s mail servers. If you have an existing website that you’ve set up independently, it isn’t possible to transfer it directly to Google Apps. If you wish to associate the site with Apps, you essentially have to recreate your web pages from your control panel using Google Sites. 3. Rackspace: o. What is managed cloud? ix. It takes full-featured, optimized platforms, and a team of experts to run workloads. Your business requires (and deserves) a team of experts with a rich knowledge of your business goals to help you achieve success. x. Unlike other providers, we only offer managed cloud—let us help architect, build, and operate your cloud workloads for you. We offer three service levels based on your business needs, and we're available 24x7x365—basic setup and ongoing guidance, or, like most of our customers, for the heavy lifting p. Rackspace cloud service levels xi. We have the expertise to help make sure your cloud initiatives are successful. You get 24x7x365 access by phone, chat, and email to Cloud Engineers dedicated to Fanatical Support® and to your cloud's success. xii. Managed Infrastructure is at $.005/GB/hr service level rate at $50 minimum. Sys Ops is at $.02/GB/hr service level rate at $500 minimum. And lastly is a name that I cannot find for it but its one for $.02/GB/hr service level rate at +$2,500/month.

Similar Documents

Free Essay

Unit 4 Assignment 1 Physical Layer Network Concepts

...a long time it saves your session. All the other steps for both are the application which it the physical app that you click on and it helps you use the app. Transport is the step that let you transfer data from point to point. The next step is Network which is responsible for addressing and controls the routing. The other step is what it does is that it is responsible for transition and establishes logical connections. The next is physical layer at it stream over physical media. The network components and there primary functions are that its build into layer and they all work with each other. There primary functions are that this that connects you to the network and it allows you to connect you to the network. The difference between WAN and LAN is that LAN primarily Ethernet and Token Ring and WAN uses technologies like MPLS, ATM, Frame Relay and X.25 for connectivity over longer distances. Basic security for data in networks is back up important files and making sure your computer is secure. Installing networks wireless it takes some configurations so it can work. Network tools help you connect and troubleshoot networking problems and it allows you to get through problems. The fundamentals of electrical circuits is that it allows you to connect to electrical elements such as resistors, inductors, capacitors, voltage sources, current sources and switches. Physical cabling is using cables like Ethernet, optic cables anything that deals with networking. Basic troubleshooting...

Words: 316 - Pages: 2

Free Essay

Physical Network Term

...------------------------------------------------- physical networking course project NT1310 August 19, 2014 KEAIR KEMP August 19, 2014 KEAIR KEMP The above pictures are pictures of a horribly messed up wiring system. Wiring in these pictures don’t have any organization. As you can see if someone needed to replace a server or something it would be impossible. It would take a long time to trace each wire end to end. Also with this kind of unorganized wiring set up, wires may get hot and start a fire. There are no labels in place to state what wire goes to what. A system like this cause constant server down time do to wires being bent that may come a loose. This is an example of a rush job or someone who just didn’t care about what they left for someone. There are no surge protectors. There are no color coded wires. Even though no color coded wires are needed but it would have help since the wiring system is not tied nor labeled. This wiring system would take the system down until it get straightened out with down time valuable information could be lost or that could equal a valuable lost. If you came into repair the server room and wires were everywhere like this it would cost a lot of money to get the system fixed due to overtime for a down time server. It’s a maze of spaghetti or a bird’s nest of twisted and tangled wires. Overall this is a unorganized and un kept wiring set up. The above pictures are of a very neat and organized network. All wires are clamped together...

Words: 450 - Pages: 2

Free Essay

Ecss Practice Exams

...| | |The most damaging of the denial of service attacks can be a _______________ attacks, where an attacker uses zombie software distributed | |over several machines | | | | | |[pic] | |Bot | | | | | |[pic] | |Distributed denial of service ...

Words: 2882 - Pages: 12

Free Essay

Cis 333 Wk 10 Technical Project Paper

...any potential physical vulnerabilities and threats that require consideration. 2. Identify and analyze any potential logical vulnerabilities and threats that require consideration. 3. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy. 4. Identify all potential vulnerabilities that may exist in the documented network. 5. Illustrate in writing the potential impact of all identified logical vulnerabilities to the network and the pharmacy. More Details hidden... Activity mode aims to provide quality study notes and tutorials to the students of CIS 333 WK 10 Technical Project Paper in order to ace their studies. CIS 333 WK 10 TECHNICAL PROJECT PAPER To purchase this visit here: http://www.activitymode.com/product/cis-333-wk-10-technical-project-paper/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 333 WK 10 TECHNICAL PROJECT PAPER CIS 333 WK 10 Technical Project Paper - Information Systems Security Write a ten to fifteen (10-15) page paper in which you: 1. Identify and analyze any potential physical vulnerabilities and threats that require consideration. 2. Identify and analyze any potential logical vulnerabilities and threats that require consideration. 3. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy. 4. Identify all potential vulnerabilities that may exist in the documented network. 5. Illustrate...

Words: 496 - Pages: 2

Free Essay

Ntc411 Week 4 Vulnerabilities

...you will determine what areas of Riordan’s network and services are critical to their business operations and where they are specifically located at, and how better to protect them to ensure operationally ability in case of physical disaster’s such as. Physical Vulnerabilities * Weather * Environmental disaster – Earthquake, flood, tornado * Fire or other preventable disasters * Political instability in foreign countries * Satellite used for communication between China and San Jose, satellite could fail, be destroyed, or lose communication based on orbit and location Once these physical vulnerabilities have been assessed and determined Riordan can then start the process of providing a continuity plan in case of one of these situations arise. By identifying and planning for this emergency’s Riordan will be better prepared to handle these vulnerabilities and protect against them so to minimize their threat to continued communications. Another aspect of assessing Riordan’s vulnerabilities and weaknesses is to conduct a security assessment. “The network is examined from within by professionals, trained in the vulnerabilities exploited by network invaders.” (Oppenheimer, 2011, p. 13) This process would provide an exceptional technical vulnerabilities/weakness assessment. That Riordan could have, some examples of what they could find are. Technical Vulnerabilities * San Jose used as central location for network, to access other sites data must travel through...

Words: 422 - Pages: 2

Free Essay

Technical Controls

...Administrative Controls •How do Administrative Controls demonstrate "due care?" Administrative Controls demonstrate “due care” by providing and following policies, procedures, and standards that allow a company to show that steps were taken to protect the network and or information that is hidden by a responsible parties. It is critical that the CIA (Confidentiality, Integrity and Availability) is vital in protecting data that companies have of its customers. Due care is defined by the Information Systems Audit and Control Association (ISACA) as: 2.1.1 The standard of “due care” is the level of diligence which a prudent and competent person would exercise under a given set of circumstances. “Due professional care” applies to an individual who professes to exercise a special skill such as information system auditing. Due professional care requires the individual to exercise that skill to a level commonly possessed by practitioners of that specialty. 2.1.2 Due professional care applies to the exercise or professional judgment in the conduct of work performed. Due care implies that the professional approaches matters requiring professional judgment with proper diligence. Despite the exercise of due professional care and professional judgment, situations may nonetheless arise where an incorrect conclusion may be drawn from a diligent review of the available facts and circumstances. Therefore, the subsequent discovery of incorrect conclusions does not, in and...

Words: 1085 - Pages: 5

Free Essay

Home Work 1 - Oppenheimer

...1. A network design customer has a goal of 99.80 percent uptime. How much downtime will be permitted in hours per week? How much downtime will be permitted in minutes per day and seconds per hour? Which values are acceptable in which circumstances? Ans: To compute the uptime/downtime is to take in concern merely the number of minutes before now passed for up-to-date month and existing year which is possibly what we need to find. A typical MTBF goal for a network that's extremely relied upon is 4000 hours. In different words, the network mustn't fail additional typically than once each 4000 hours or 166.67 days. A usual MTTR aim is one hour. In another sense the network failure ought to be fastened among one hour. I calculated downtime ratio by dividing occupied time into quantity of downtime. The summation of that number would be the ratio of downtime. Downtime for 99.8 percentile would be: Availability = MTBF / (MTBF + MTTR) SLA level of 99.8 % uptime/availability gives following periods of potential downtime/unavailability: * Daily: 2m 52.8s * Weekly: 20m 9.6s * Monthly: 1h 27m 39.5s 2. Assume you are in New York City in the United States and you are downloading a 100-KB web page from a server in Cape Town, South Africa. Assume that the bandwidth between the two cities is 1 Gbps. Which type of delay will be more significant, propagation delay or transmission delay? Defend your answer. Ans: Delay is pertinent for every data transmission expertise but...

Words: 1445 - Pages: 6

Premium Essay

Harriet's Chocolate Factory

...Case Study 1: Harriet’s Fruit and Chocolate Company Daniel Michovich Dr. Otto CIS532: Network Architecture and Analysis January 26, 2013 Mission Statement: Striving to be number one fruit and chocolate industry area wide. Introduction “Harriet’s Fruit and Chocolate Company was established in 1935 in the Pacific Northwest of the United States to ship gift baskets of locally grown peaches and pears to customers in the United States (Oppenheimer, 2011)” In regards to the physical infrastructure of Harriet’s Fruit and Chocolate Company, my investigation will reveal many important aspects to aid in the planning of the network design. First, I will determine the number of buildings to be used, as well as the distance between them and what equipment they will contain such as wiring closets or computer rooms and the current network devices. Determining the distance will help in the cabling design and wiring as well as the selection of technologies and devices to meet the design goals. My investigation will further reveal any architectural or environmental constraints, such as tall trees within the path that power lines may travel, that will assist in decisions such as whether wireless technologies are feasible as well as if there are any impediments to communications or installation, to include all hazards. Infrastructure architecture consists of the hardware, software, and telecommunications equipment that, when...

Words: 1326 - Pages: 6

Free Essay

Cis 333 Week 10 Technical Project Paper – New 2015

...com/downloads/cis-333-week-10-technical-project-paper-new-2015/ To Get this Tutorial Copy & Paste above URL Into Your Browser Hit Us Email for Any Inquiry at: Homeworkfy@gmail.com Visit our Site for More Tutorials: (http://homeworkfy.com/ ) Preview : After looking at your network security structure there are various physical threats that we will focus on that could have a Hugh impact on your business intellectual property and availability. For example threat like fire, hurricanes, tornadoes, flooding, lighting, earthquakes and electrical failure that can destroy the network vital information to be lost. In the case of any of these events, to protect the pharmacy from losing important patient data we need to secure this data by implementing a backup and recovery plan to help reduce the downtime to get back online and not loss customer loyalty. Offsite storage like Cloud technology can allow access to all critical information without invests additional resource to maintain the storage solutions and the staff to maintain integrity of the network. When looking at logical threats we must protect the network from unauthorized access internally and external attacks. Hackers understand that every device on the network has it weakness and they are trying to take advantage of it, devices that are most looked at are: servers, switches, routers, desktops, security devices and internal employees themselves. Unauthorized access of the database is a major concern when protecting the IT infrastructure...

Words: 462 - Pages: 2

Premium Essay

Impact of Data Classification

...Impact of Data Classification Standards The three IT infrastructures that will be used is the Workstation Domain, LAN Domain, and the User Domain. The workstation domain is going to help with security because only approved employees or personal will be able to access the entire company’s network. While certain employees will only have access to information that they absolutely need to be productive. Keeping the workstation domain well managed will prevent a lot of security issues since we know who is or isn’t on the network. The LAN Domain is how we will manage all of our connected computers to each other that have access to all the same materials. Once again there will be certain employees that will have more access than others to certain parts of the domain and its physical and data components. This particular domain needs a strong security control because unauthorized access to this domain would be hazards to the company because so much valuable information is stored on it. The User Domain is a simple domain that will control who may or may not access the information on the systems. It is not the highest secured domain but holds all people who use it accountable for their use because they will have to know and understand the basic use policies set in place. Also only certain users will have different access to certain things so all users will be responsible for the information they save and process on their work stations or at the computers that they are...

Words: 256 - Pages: 2

Premium Essay

Improving Security

...a great team that will work together in making it happen. When managing the security of a networked, one thing to keep in mind is to always try and stay one step ahead of the cyber criminals who want to steal, alter and destroy your data. You can’t stay in one place for very long, because hackers are always improving their methods and trying harder and using increasing creativity each day to breach your network and access all the assets it contains. Now we always have to keep in mind that in many cases the attacks aren’t even related to a network breach, since the most destructive attacks are carried out by insiders who are authorized to connect to your network. A first good step to improving your network security is to look at the physical side of it and improve it. If an attacker takes physical control of a computer in the network then they can use a number of tools to access information that is on the hard drive or moving to and from the computer . This is why physical security must be a primary concern before thinking of other security methods. Some of the physical security you can focus on is cards or biometric access controls to the rooms were computers are located. Also video surveillance of the entrances and exits of rooms where assets are located is very important. Logging...

Words: 1237 - Pages: 5

Premium Essay

Sr-Rm-013: Network, Data, and Web Security

...SR-rm-013: Network, Data, and Web Security CMGT/441 June 18, 2012 Abstract Riordan Manufacturing conducts an information systems security review over IT security issues that exist in different plants to prepare for an upcoming audit in accordance to the Sarbanes-Oxley Act. Several elements of the organization's information systems require revisions and updates to optimize physical and network security, data security, and Web security. SR-rm-013: Network, Data, and Web Security The Sarbanes-Oxley Act (SOX), passed in July 2002, requires publicly traded companies to submit accurate and reliable financial information. Securing private information is not included in its requirements; however, establishing security controls for confidentiality, availability, and integrity of the reporting are (Kim & Solomon, 2012). Riordan Manufacturing is preparing for an audit in compliance with SOX and is conducting an information systems security review over its physical and network security, data security, and Web security. Physical and Network Security Riordan Manufacturing performs an information systems security analysis over its physical and network security. Several elements of the IT system require revisions, such as restrictions to physical access to vital IT systems and upgrades to outdated systems within the network. Physical Security After analyzing the headquarters and Riordan’s other sites it was found that they were not designed nor equipped in the same fashion...

Words: 2582 - Pages: 11

Premium Essay

Security Policy Document

...systems are critical for Global Distribution, Inc. interrelationship between data and operations. GDI’s 3,200 employees and contractors are all responsible for protecting information from being accessed by unauthorized persons, modification, disclosure and destruction. An effective security policy sets the guidelines of an organization’s approach to security. The policy varies from a plan, in that a plan is a call to action, while a policy defines the goals of the plan. 2.0 Acceptable use Policy Global Distribution’s network administrator plans to provide a reasonable level of privacy to it users, but all users must note that all data that is created on the corporate WAN and remote facilities (warehouses) is property of GDI (SANS Institute, 2006). In order to protect the network of GDI, any information or data stored on company devices are subject to management monitoring and therefore confidentiality cannot be guaranteed. An audit of the network can be conducted at anytime to ensure that users are in compliance with policies. It is requires that all employees understand that they are responsible for exercising good judgment when using company devices for personal use. “The user interface for information contained on Internet/Intranet/Extranet or related systems should be classified as either confidential or not confidential” (SANS Institute, 2006). Confidential information of GDI would include but not limited to: email routing, financial functions,...

Words: 2146 - Pages: 9

Premium Essay

Msit 540: Management of Information Security

...Inc. employees 6 Pixel Inc. Business partners 6 Pixel Clients 6 Risk Management 7 Policy 9 Sensitivity 10 General 11 Network Access 11 Network Equipment 14 Desktop Policy 15 Messaging Policy 16 Server Policy 16 Backup 17 Physical Security 18 Enforcement 20 Appendix 22 References 23   Abstract This paper describes the security policy of a fictitious company called Pixel Inc. The Pixel Inc. is a small business with nearly 100 employees with business focus on multi-media. Due to the nature of business, the company uses varying operating systems such as windows, Mac and Linux systems wired over a gigabit Ethernet networking. The security policy focuses on the securing intellectual property on storage and transportation. The usage policies are also devised for desktops and devices. Purpose The information security is crucial for Pixel Inc. to secure its information technology assets. The security is expected to provide protection from unauthorized access of its intellectual properties, system assets, network equipment’s, customer data and business system information. The policy described here is for implementing security practices across Pixel Inc. in everyday use of the information technology assets.   Scope The scope of this security policy is limited to securing information technology assets and the physical locations where such systems are used and hosted. The policy considers the threat from both internal and external to the...

Words: 3640 - Pages: 15

Premium Essay

Student

...security services provided in a network communication. There are several ways to provide security in the network communications.  There are different network security technologies and techniques that help to maintain the security in your network such as IPSec, cryptography, SSL, Kerberos, Certificates, PKI, firewall, antivirus solutions and the physical security.  Secure communication is necessary to maintain the integrity of the data.  A specialized field in computer networking that involves securing a computer network infrastructure[->0]. Network security is typically handled by a network administrator or system administrator[->1] who implements the security policy[->2], network software[->3] and hardware[->4] needed to protect a network and the resources accessed through the network from unauthorized access and also ensure that employees have adequate access to the network and resources to work. A network security system typically relies on layers of protection and consists of multiple components including networking monitoring and security software in addition to hardware and appliances. All components work together to increase the overall security of the computer network. Security involves the authorization, authentication and privacy and it can be achieved by implementing a security solution in your network.  A network is susceptible by various internal and external threats such as viruses, Trojans, spyware, adware, hackers and physical security threats. The insecure...

Words: 900 - Pages: 4