Your organization has just experienced a DoS attack on its internal database system. The organization is a reseller of medical equipment and allows access to their products by both suppliers and customers. Customers will access products and services through the public facing website while suppliers/vendors access these services by way of the company’s extranet. It was determined that one of the vendors’ computers that accessed the extranet was infected with a worm specifically targeting SQL servers. As the SQL server farm is used by both internal and external users, those external users access the reseller’s services through a link on the public site which authenticates them for access to the extranet. While this is not an optimum solution it has not been an issue until now.You have been assigned the task of implementing a solution that minimizes the possibility of a reoccurrence of an attack of this sort. Your solution should address what improvements will be made to the public facing services, the extranet, and the internal network. To do this you must establish the original architecture that has made this attack possible. In other words, your initial (Week Two) deliverable should describe the in-place architecture (DMZ, extranet, internal network) at the time of the DoS attack. For your design considerations assume a medium sized business 25-100 employees.Using PowerPoint, Visio, Dia or any other diagramming tool of your choosing you will demonstrate your ability to design and implement a secure computer network using the concepts presented in this course. You are to include your architecture diagrams in a written proposal (MS Word) that will address your solution in detail. NOTE: As they has not been covered in any detail in the program a review of extranet architectures and technologies should be done. Each week’s deliverable should address the People, Technology, and Operations improvements needed to minimize the possibility of reoccurrence of this type of attack.You should determine how to best represent a series of workstations, without cluttering your design drawing.You should outline your plans, processes, and procedures for keeping your customer’s data secure as it enters into your network, and also as it is distributed to other sites for collaboration.(If you do not have a copy of MS Visio, ask your Instructor. NU participates in the Microsoft Imagine program. You should be able to request access to a copy from the NU Imagine Coordinator. )The deliverables should be delivered according to the following schedule:Week 2: Public facing Architectural design

QUALITY: 100% ORIGINAL – NO PLAGIARISM

(USA, AUS, UK & CA PhD. Writers)

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS

The Best Custom Essay Writing Service

About Our Service

We are an online academic writing company that connects talented freelance writers with students in need of their services. Unlike other writing companies, our team is made up of native English speakers from countries such as the USA, UK, Canada, Australia, Ireland, and New Zealand.

Qualified Writers

Our Guarantees:

CLICK TO SUBMIT YOUR ORDER