Free Essay

Project Part 3 Task 2

In:

Submitted By mozurjus
Words 963
Pages 4
Project Part 3 Task 2: Recommend a Software Management Plan
Scenario
The original task team at First World Bank Savings and Loan has concerns about the support and software management of the organization’s Linux-based infrastructure. The team wants you to recommend a software management plan keeping in mind the various servers and the cost.
Tasks
You need to: * Make a recommendation for a software management plan. Consider options available from the open source community and from vendors. If you select a vendor, specify the software it will support and how it will support. * Explain the need to install anti-virus software on Linux servers providing a rationale in support of your answer. * Summarize a plan for applying patches and security updates to the Linux system.
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 1–2 pages
Due By:Unit 9
Self-Assessment Checklist * I have recommended a suitable software management plan. * I have explained the need to install anti-virus software on Linux servers. * I have explained how to manage critical and noncritical security-related updates.
The recommendation for a software management plan is to use RPM. RPM is a software management tool originally created by Red Hat, and later GNU’ed and given to the public at http://www.rpm.org/. It forms the core of administration on most systems, since one of the major tasks for any administrator is installing and keeping software up to date. Various estimates place most of the blame for security break-ins on bad passwords, and old software with known vulnerabilities. This isn’t exactly surprising on would think, but while the average server contains 200-400 software packages on average, on begins to see why keeping software up to date can be a major task.
The main page for RPM leaves something-to-be-desired, but the book “Maximum RPM” on the other hand is really wonderful and freely available (http://www.rpm.org/). This book is suggested for any Red Hat administrator, and can say safely that it is required reading if you plan to build RPM packages. The basics of RPM are pretty self-explanatory; packages come in an rpm format, with a simple filename convention (package_name-package_version-rpm_build_version-architecture.rpm or nfs-server-2.2beta29-5.i386.rpm)
All computer systems can suffer from malware and viruses, including Linux. Thankfully, very few viruses exist for Linux, so users typically do not install antivirus software. It is still recommended that Linux users have antivirus software installed on Linux systems that are on a network or that have files being transferred to the device. Some users may argue that antivirus software uses up too much resource. Thankfully, low-footprint software exists for Linux. To better understand antivirus programs, it may be beneficial to understand malware itself.
In order to manage critical and noncritical security-related updates, there are some things that are recommended. The first of which is to turn off any unused services. Services which you don't enable can't be attacked from the outside. If you don't provide access to a service, it doesn't matter if there are any vulnerabilities in the daemon which would provide that service. So disable anything you don't need to use.
Some daemons are started when the system boots, and remain active as long as the system remains up. For these persistent daemons, you need to look at the initialization scripts or programs used to start services when the system boots. Other services are not started at boot time, but instead are managed by either inetd or xinetd. If your system is configured with inetd, look at /etc/inetd.conf, and remove, or simply prefix with a "#" character to make it a comment, any entry providing a service you don't need.
The second step would be where available, install IP filter or firewall rules. While restricting network access helps, it is no guarantee that you won't be attacked. If you allow itt-tech.edu, you can be attacked from another itt-tech.edu system. But restricting access to a smaller group of systems will reduce the number of attempts you see made against you.
You would configure IPtables or IPchains. You can use one of these to define whose IP addresses you will accept or reject. The rules can be different for incoming and outgoing packets. There are model configurations or scripts which can be installed on a Linux system to define the rules such that only packets originating inside the itt-tech.edu domain are accepted.
The next step involves installing ssh and tcpd. SSH (Secure Shell) is a protocol which supports logging into a remote system or executing commands on a remote system, using an encrypted communication between the two systems. Session encryption protects you from unscrupulous packet sniffers who may have access to one of the networks through which the packets between the two hosts may have to travel.

The tcp wrapper daemon, tcpd, comes as a part of recent Linux installations.
Finally you would need to configure hosts.allow and hosts.deny files for tcpd and sshd. Both ssh and the tcp wrapper tcpd use a pair of configuration files to define what hosts are allowed to make connections to specific TCP services on your machine. Use these to limit access to those services and prevent unwanted intrusion attempts.

References:
Johnson, D. (2014). RPM: Commands and Management. Retrieved from http://www.linux.org/threads/rpm-commands-and-management.5338/ Miscellaneous (2013). Does Linux Need Anti-Virus Software? Retrieved from http://www.futurehosting.com/blog/does-linux-need-anti-virus-software/

Morris, J. (2013). Overview of Linux Kernel Security Features. Retrieved from http://www.linux.com/learn/docs/727873-overview-of-linux-kernel-security- features/

Similar Documents

Premium Essay

Project Wbs

...Diploma of Project Management Manage Project Time Assessment Activities & Exercises Candidate Details Assessment – BSB51407 - Time Please complete the following activities and hand in to your trainer for review. This forms part of your assessment. Name: _____________________________________________________________ Address: _____________________________________________________________ _____________________________________________________________ Email: _____________________________________________________________ Employer: _____________________________________________________________ Declaration I declare that no part of this assessment has been copied from another person’s work with the exception of where I have listed or referenced documents or work and that no part of this assessment has been written for me by another person. Signed: ____________________________________________________________ Date: ____________________________________________________________ If activities have been completed as part of a small group or in pairs, details of the learners involved should be provided below; This activity workbook has been completed by the following persons and we acknowledge that it was a fair team effort where everyone contributed equally to the work completed. We declare that no part of this assessment has been copied from another person’s work with the exception of where we have listed or referenced documents or work and that no part of this assessment...

Words: 1504 - Pages: 7

Premium Essay

None

...Course Project Introduction | | In this course, you will have one course project and will require two different assignments – Course Project Part I and Course Project Part II.  This project will test your knowledge of all of the project management tools and techniques that we'll cover in this course.  Before you begin, please review the PM 586 Course Project Tour. [You'll find the link above.]  This audio/visual tool will take you on a "tour" of the project and will highlight many of the logistics and "need to know" information to successfully complete the two parts of the project. In addition, this course project does require use of Microsoft Project.  If you are not familiar with the software or just need a "refresher," please run through the tutorials above or look at the end of the chapters in the textbook for a mini-lesson of the software.  Course Project Description | | Johann Seitz founded the SEITZ Corporation in 1982. The main products of the firm were small- to medium-sized plastic bottles and containers, used mainly in the food and dairy industries. By 1985, the annual sales of the corporation had reached $31 million and the firm enjoyed a dominant market position in the upper Midwest. In 1998, Walter and Teri Seitz, Johann’s grandchildren, assumed the day-to-day operation of the business. Teri Seitz was a somewhat unstructured, but diligent, student of the latest business school theory and decided that in order to meet increased competition, especially...

Words: 3297 - Pages: 14

Premium Essay

Intl Business

...|School/Portfolio: |The Business School | | |Course Code/ID: |BSMAN 3005 | | |Course Title: |Project Management | | |Teaching Location: |(Insert Teaching Location) | | |Program(s): |Bachelor of Applied Management | | |Author: |Alan Labas | | |Level: |Advanced...

Words: 3271 - Pages: 14

Premium Essay

Pert Cpm

...Excel worksheet. PERT/CPM TECHNIQUES Task: A. Use the estimates for Company A in Table 1.1 to do each of the following: 1. Determine the expected completion time for each of the ten project activities, showing all of your work. Task Optimistic Time to Complete (weeks) Probable Time to Complete (weeks) Pessimistic Time to Complete (weeks) Expected Time to Complete (weeks) A 2 3 4 3.00 B 5 6 13 7.00 C 3 4 8 4.50 D 10 11 15 11.50 E 4 5 6 5.00 F 8 10 12 10.00 G 4 6 11 6.50 H 8 10 18 11.00 I 3 6 12 6.50 J 2 3 7 3.50 a. Determine the variance for each project activity, showing all of your work. Task Optimistic Time to Complete (weeks) Probable Time to Complete (weeks) Pessimistic Time to Complete (weeks) Variance (weeks) A 2 3 4 0.11 B 5 6 13 1.78 C 3 4 8 0.69 D 10 11 15 0.69 E 4 5 6 0.11 F 8 10 12 0.44 G 4 6 11 1.36 H 8 10 18 2.78 I 3 6 12 2.25 J 2 3 7 0.69 2. Prepare a PERT chart (network diagram) to identify the critical path for project completion. From the above diagram, you will observe that the critical path (a critical path has slack of zero) is shown by Start-B-F-G-I-J-End. 3. Determine each of the following, showing all of your work or reasoning: a. Expected duration of the entire project The expected project duration is the sum total of all critical path activities. B 7.00 F 10.00 G 6.50 I 6.50 J 3.50 Project Duration 33.50 b. Slack for project task A ACTIVITY Earliest Start Earliest finish...

Words: 1410 - Pages: 6

Premium Essay

Finnish Project Management Championships 2010

...Finnish Project Management Championships 2010 Technical case Case OleanTek: scheduling, resourcing and costs for a new service business launch project OleanTek is a medium-sized technology-based firm with its core business in equipment and system deliveries for large engineering industry clients. Its three strategic customers have increasingly requested maintenance services after the actual equipment and system deliveries, and these services have so far been carried out by the side of other duties by the technical staff. OleanTek’s leaders have noticed that maintenance could be implemented also in the form of more strategic service business that could complement the company’s offering and generate important benefits to other customers, too. OleanTek has decided to invest in a new service business launch project to plan and test four basic service concepts concurrently: corrective maintenance, preventive maintenance, spare parts service, and modernization. The project starts with delimiting the service offering and ends with planning the broader service launch process; the actual marketing and broader launch of new services are excluded from the project. Paul Lander, the maintenance manager, has been selected as project manager for the project. He is well acquainted with OleanTek and its clientele already. Paul has noticed that it is very difficult to plan the project with detail as most of the tasks include a lot of uncertainty due to their ambiguous content and novelty and...

Words: 1075 - Pages: 5

Premium Essay

Project Management

...Contents List of Figure 2 PART A 3 1.0 Introduction 3 2.0 Literature Review 4 2.1 Definitions 4 2.2 Why organization use project management to achieve strategic objective 4 2.3 Case study 7 3.0 Conclusion 8 PART B 9 Question 1: 9 Question 2 11 Question 3 13 Question 4 14 Question 5a 14 Question 5b 16 Question 5c 18 Reference 21 Appendix 23 List of Figure Figure 1: Dialog box to change working time 9 Figure 2: Gantt chart for Part B-Question 1 10 Figure 3: Networking Diagram 12 Figure 4: Project summary for Part B - Question 1 13 Figure 5: Collapse Boxes for the Networking diagram 14 Figure 6 : Inserting 15 days of delay 15 Figure 7: Gantt chart for Part B Question 5a after delay 15 Figure 8: Gantt chart before delay 16 Figure 9: Leveling Gantt for Part B – Question 5b 17 Figure 10: Gantt chart before any delay 17 Figure 11: Gantt chart for Part B – Question 5b 18 Figure 12: Gantt chart for Part B Question 5c 19 Figure 13: Gantt chart before any delay 19 PART A 1.0 Introduction Nowadays strategic objective is viewed as essential as operation target to an organization’s operation (Brown & Russell, 2008). There is an increasing awareness that solely achievement on the operation goal will not generate the prominent competitive advantage as expected. It can only be realized through the accomplishment of strategic objective...

Words: 3990 - Pages: 16

Premium Essay

Microsoft Project Tutorial

...CS 587 Software Project Management Instructor: Dr. Atef Bader MS Project Tutorial MS MS Project in Labs: Available in Siegal Hall Lab in Main Campus Available in Room 210 Rice Campus Prepared by Milton Hurtado How to get MS Project ? How Download MS project from following link http://www.microsoft.com/office/project/ Embarking new Project Embarking Go to file, select new. This will open a screen for blank project click ok. You can now enter your project information viz. start date, finish date and also how would you like to schedule the project from either start or finish date. You can also chose selection if you will be using night shifts. Gantt Chart Gantt Select Gantt Chart view from the view menu. You’ll have a spreadsheet where you can now enter information of all the activities i.e. task name, duration, start date, end date, predecessors and various other fields. You can enter required information in two ways, in spreadsheet or when you double click on cell you get pop up window in which you can enter all the information of that particular activity. For predecessor activity you need to write activity number. The SW itself will calculate start and end date. Now the Gantt Chart is complete. Adding tasks and milestones to a Project File Adding 1. 2. 3. 4. 5. 6. On the View menu, click Gantt Chart. In the Task Name field, type a task name, and then press TAB. (Microsoft Project enters an estimated duration...

Words: 2605 - Pages: 11

Premium Essay

Manage Your Health Chapter 4-6

...Chapter 4 Task 1. Summarize each of the above-proposed projects in a simple table format suitable for presentation to top management. Include the name for each project, identify how each one supports business strategies, assess the potential financial benefits and other benefits of each project, and provide your initial assessment of the value of each project. Project 1 | Recreation and Wellness Intranet Project | Project goal description | Allow employees to register for company-sponsored recreational programs, such as soccer, softball, bowling, jogging, walking and other sports.Allow employees to register for company-sponsored classes and programs to help them manage their weight, reduce stress, stop smoking, and manage other health related issues.Track data on employee involvement in these recreational and health-management programs.Offer incentive for people to join the programs and do well in them. | Business strategy compliance | This project should contribute to reducing internal costs of the company, as one of the strategic key goals.MYH, Inc. pays 20% more that industry average for employer health care preniums.This add-on to the existing Intranet will help employees improve their health and at the same time, lead to lower health insurance preniums. | Benifits | Net savings of at least $30/employee/year for full-time employees over the next for years.Total financial benefit for 20,000 full-time employees, with $30 saving per employee per year, for 4...

Words: 5320 - Pages: 22

Premium Essay

Green Computing Research Project

...EBM680 Q1-2016 Green Computing Research Project Introduction: The purpose of this research project (50% of final grade) is to use a structured approach to project management by practicing and executing a series of project related activities throughout the course. You will execute a series of project tasks that fall within the five major phases of a project. These are individual assignments, be sure to show all work and document references. Instructions and grading parameters are detailed below and under each task. You must follow instructions and formatting requirements as listed below and under task assignment  Submit using MS Office Products (Word, Excel, PowerPoint, Project) as instructed  Include a cover page (where indicated) containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date.  Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; properly document any references used  All Assignments are Uploaded via Moodle Site to correct assignment folder  Must submit each case study by the assignment due date – or points will be deducted  Must be of high quality  These are individual assignments – do your own work The specific course learning outcomes associated with these case studies are:  Apply the concepts, knowledge and process areas of project management in accordance to the Project Management Institute Project Management Body of Knowledge (PMBOK®)...

Words: 2228 - Pages: 9

Premium Essay

Nomad

...cmgt 410 PROJECT PLANNING & IMPLEMENTATION [pic] CONTRIBUTORS THE UNIVERSITY GRATEFULLY ACKNOWLEDGES THE CONTRIBUTION OF THE FOLLOWING PROFESSIONALS TO THE COMPLETION OF THIS COURSE. 1. Stephen Northam, MA, Faculty Member, University of Phoenix. 2. Kenneth Sardoni, MCIS, Faculty Member, University of Phoenix. 3. Blair Smith, MBA, Associate Dean, College of Information Systems and Technology. 4. Claudia Avila, BSBA, Curriculum Development Manager, College of Information Systems and Technology. 5. Adam Honea, Ph.D., Dean, College of Information Systems and Technology. Copyright ( 2001 by the University of Phoenix. All rights reserved. The University of Phoenix® and UniModuleTM are marks of Apollo Group, Inc. in the United States and/or other countries. Edited in accordance with University of PhoenixSM editorial standards and practices. (Template U1.0) Overview COURSE DESCRIPTION This course provides the foundation for understanding the broad concepts of successful planning, organization, and implementation within the realm of information technology. This course uses real-world examples and identifies common mistakes and pitfalls in project management. Topics covered include project scoping, estimating, budgeting, scheduling, tracking and controlling. TOPICS AND OBJECTIVES Project Management and the Organization • Define Project Life Cycle. • Identify roles in project management. • Identify project manager's skills. • Demonstrate...

Words: 3448 - Pages: 14

Premium Essay

A&D High Tech

...Case #3 A&D High Tech (A): Managing Projects for Success: A Negative View 1. What is the estimated project completion date? (Assume there are no holidays and ignore the sunk cost of the planning team’s effort) The estimated project completion date is TUE 11/13/13 with duration of 127 days. After leveling and re-allocating work along the project line, the project got delayed for 3 days so that the completion day moved up to FRI 11/21/13 (total duration of 130 days). (MS Project 2007) 2. What is the total cost? How much of the total cost are labor costs? Capital costs? Total Cost: $98,500 + $844,980 = $943,480 Labor Cost: $ 844,980 (given result of project) Capital Cost: (12 Windows 2000 workstations*$3,000) + (5 Window 2000 servers*$12,500) = $98,500 3. What is (are) the critical path(s) in the project? What is the level of risk in completing tasks on the critical path(s)? Explain. The critical path is added to the appendix of this case report. As shown in Figure 1 and 2, many tasks are correlated so that one critical phase can affect the other. Here, we divided the entire process into three parts: namely by “Detailed Design” part (on the left hand of the network diagram), “Create Functional Requirements (upper side),” and “Development & Unit Test (bottom left side).” Even though, we leveled the resource referring on automated re-allocation methods, except for 7 phases in this project, most of the critical stages remained still critical...

Words: 1284 - Pages: 6

Free Essay

Network

...Textbook/Workbook Assignments • Complete the following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching on page 3 VLSM Subnetting a Subnet Exercises on pages 9-11 VLSM Addressing Design Scenarios 1-6 on pages 15-20 Summary Route Exercises on pages 21-24 Concept Questions on pages 25-27 VLSM Case Study on page 27 Internet Research on page 29 (Use the ITT Tech Virtual Library.) • Complete Chapter 9 Review Questions 2-7, 10, 14, 20-22 on pages 258-259 of Introduction to Telecommunications. Submit your written answers to your instructor at the beginning of Unit 2. . Assignment 1.2: Virtual Labs • Complete Virtual Labs 6, 7, and 8 from the CCNA 640-802 CCNA Simulator, which you can find by clicking through these paths: ICND1 Troubleshooting Scenarios Lab 6: IP Addressing and Routing. ICND1 Troubleshooting Scenarios ICND1 Part 4: Troubleshooting Labs Lab 7: IP Routing I ICND 2 Troubleshooting Scenarios Lab 13: IP Routing II Submit your written answers to your instructor at the beginning of Unit 2. ©ITT Educational Services, Inc: Date: 03/13/09 Network Technology and Service Integration Unit 2 Homework The following homework is designed to cover the course objectives for this unit. Assignment 2.1: Textbook/Workbook Assignments • Complete the following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching on page 70 Vocabulary Exercise: Completion on page 71 Concept...

Words: 2825 - Pages: 12

Premium Essay

Ism Final

...Information Technology Project Management, Third Edition ISBN 0-619-159847 Course Technology MIS Series Companion Web Site: www.course.com/mis/schwalbe Kathy Schwalbe, Ph.D., PMP Table of Contents CHAPTER 1 1 CHAPTER 2 3 CHAPTER 3 7 CHAPTER 4 9 CHAPTER 5 13 CHAPTER 6 18 CHAPTER 7 22 CHAPTER 8 27 CHAPTER 9 31 CHAPTER 10 35 CHAPTER 11 38 CHAPTER 12 41 APPENDIX A 44 APPENDIX B 49 APPENDIX C 51 List of solution files available with the Instructor Resource material: CHAPTER 1 Introduction to Project Management Discussion Questions 1. Why is there a new or renewed interest in the field of project management? More and more projects are being done by a variety of organizations. The projects are more complex and often involve the use of new technologies. Organizations are struggling to find better ways to manage their projects. 2. What is a project? How is it different from what most people do in their day-to-day jobs? A project is “a temporary endeavor undertaken to create a unique product or service” (PMBOK( Guide, 2000, p. 4). Projects are different from day-to-day activities primarily because they have focused goals and definite beginning and ending dates. 3. What is project management? Briefly describe the project management framework. Project management is “the application of knowledge, skills, tools, and techniques to project activities in order to meet project requirements” (PMBOK( Guide, 2000, p. 6). The project management framework graphically...

Words: 31210 - Pages: 125

Premium Essay

Case Study

...4 A-1 Use Parts 1, 2 and 3 of the case study in Appendix B, Topic A, named Billing System Conversion Project to develop a communication plan for the conversion project. Identify at least three audiences. Identify all audiences who have an interest in the project (sponsor, team members, and so on). For each audience, describe the type of information that should be communicated (progress, scope changes, costs, and so on) and the level of detail needed. List the frequency of each communication (weekly, monthly, as needed, and so on). Audience: Team Type(s) of information: presentation of project progress Frequency: as needed Audience: client/customer Type(s) of information: report of overall progress, formal briefing Frequency: as needed Audience: Team Type(s) of information: team meeting, group interaction for project Frequency: weekly B-1 Use Parts 1, 2 and 3 of the case study named Billing System Conversion Project, to determine which tasks or deliverables can be purchased from sellers and then determine which ones, if any, you would recommend for seller purchase. The tasks and deliverables that could be outsourced include the training of the team, the update of the system, software install, and the purchase of the new PCs. The only thing I would recommend outsourcing or buying from an external seller would be the PCs so that a price comparison can be done and the company could make the best financial decision. C-1 1. Use Parts 1 and 2 of the case...

Words: 465 - Pages: 2

Premium Essay

Qat Task 4.1

... * Task A. (2+12+4)/6=3 * Task B. (5+24+13)/6=7 * Task C. (3+16+8)/6=4.5 * Task D. (10+44+15)/6=11.5 * Task E. (4+20+6)/6=5 * Task F. (8+40+12)/6=10 * Task G. (4+24+11)/6=6.5 * Task H. (8+40+18)/6=11 * Task I. (3+24+12)/6=6.5 * Task J. (2+12+7)/6=3.5 a. The activities completion time variance is: ²= ((b-a)/6)² * Task A. ((4-2)/6)²=0.10 * Task B. ((13-5)/6)²=1.76 * Task C. ((8-3)/6)²=0.68 * Task D. ((15-10)/6)²=0.68 * Task E. ((6-4)/6)²=0.10 * Task F. ((12-8)/6)²=0.43 * Task G. ((11-4)/6)²=1.34 * Task H. ((18-8)/6)²=2.75 * Task I. ((12-3)/6)²=2.25 * Task J. ((7-2)/6)²=0.68 2. See Network Diagram attachment 3. a. Expected duration of the entire project: 33.5 weeks b. Slack for project task A: LS-ES=slack time = 6.5-0= 6 c. Slack for project task H: LS-ES=slack time= 19-18.5= 0.5 weeks d. The week project task F. is scheduled to start: Task F begins when Task B ends, which= week 7 e. The week project task I. is scheduled to finish: Task J. LS= task I. LF time=week 30 4. Probability that the project will be done in 34 weeks: ²=²b+²d+²h+²j= ²=1.76+.43+1.34+2.25+.68=6.42 Project standard deviation: 6.42=2.53 Project completion times: Z=Due date-expected date of completionσT = 34 weeks-33.5 weeks2.53 = 0.19 weeks Z- Value of 0.19= P (z≤.19) = 0.57535 B. 1. Maximum reduction in time: normal weeks-crash weeks=maximum reduction in time * Task A: 3 weeks-2 weeks=...

Words: 727 - Pages: 3