Free Essay

It Infrastructure

In: Computers and Technology

Submitted By tiff7010
Words 2282
Pages 10
Tiffany’s Networking
Request for Proposal for a Technology Network Infrastructure

May 6, 2011

1 Purpose

The purpose of this Request for Proposal (RFP) is to invite prospective vendors to submit a proposal to supply a Structured Cabling solution to Tiffany’s networking. The RFP provides vendors with the relevant operational, performance, and architectural requirements for the solution.

2 Coverage & Participation

The intended coverage of this RFP, and any agreement resulting from this solicitation, shall be for the use of all departments at Tiffany’s networking along with any satellite offices. Tiffany’s networking reserves the right to add and/or delete elements, or to change any element of the coverage and participation at any time without prior notification and without any liability or obligation of any kind or amount.

General Information

The Enterprise Insert Enterprise Description Here Describe the enterprise in a few brief paragraphs. State the core business of the enterprise, the number of employees and the general size of the IT infrastructure: number of workstations, servers, etc. Include a description of the business and location including any satellite offices that will be involved in the project. Describe the overall objectives of the Structured Cabling solution purchase. Focus on larger business goals, not technical specifications. For example, most enterprises put the purchase of a Structured Cabling solution in the context of meeting specific goals in a data center expansion or a building project, and to ensure a specific level of availability and future growth for the facility. List how the structured cabling solution will contribute to these goals. For example:

• Improve application availability through cabling and access redundancy.

• Create a more efficient and flexible cable management environment.

• Make maximum use of available cable pathway capacity through efficient utilization.

• Centralize management of all cable management through structured method.

1 Original RFP Document

Tiffany’s Networking shall retain the RFP, and all related terms and conditions, exhibits, and other attachments in original form in an archival copy. Any modification of these, in the vendor’s submission, is grounds for immediate disqualification. The RFP may not be distributed without prior written permission of Tiffany’s Networking.

2 Schedule of Events

The following is a tentative schedule that will apply to this RFP but may change in accordance with the organization’s needs or unforeseen circumstances.

Issuance of RFP May 1, 2011 Technical Questions/Inquiries due May 9, 2011 RFP Closes May 11, 2011 Complete Initial Evaluation June 1, 2011 Final Award Notification June 9, 2011

4 Vendor’s Understanding of the RFP

In responding to this RFP, the vendor accepts the responsibility fully to understand the RFP in its entirety, and in detail, including making any inquiries to Tiffany’s networking as necessary to gain such understanding. Tiffany’s networking reserves the right to disqualify any vendor who demonstrates less than such understanding. Furthermore, Tiffany’s networking reserves the right to determine, at its sole discretion, whether the vendor has demonstrated such understanding. That right extends to cancellation of award if award has been made. Such disqualification and/or cancellation shall be at no fault, cost, or liability whatsoever to Tiffany’s networking.

5 Good Faith Statement

All information provided Tiffany’s networking in this RFP is offered in good faith. Individual items are subject to change at any time. Tiffany’s networking makes no certification that any item is without error, Tiffany’s networking is not responsible or liable for any use of the information or for any claims asserted there from.

6 Communication

Verbal communication shall not be effective unless formally confirmed in writing by a specified procurement official in charge of managing this RFP process. In no case shall verbal communication govern over written communication. Vendors’ inquiries, questions, and requests for clarification related to this RFP are to be directed in writing to:

Tiffany’s networking: Tiffany Crawford 555 E Main St. Elizabethton, TN 37643

Applicable terms and conditions herein shall govern communications and inquiries between Tiffany’s networking and vendors as they relate to this RFP.

Informal Communications shall include, but are not limited to: requests from/to vendors or vendors’ representatives in any capacity, to/from any Tiffany’s networking employee or representative of any kind or capacity with the exception of Tiffany’s networking for information, comments, speculation, etc. Inquiries for clarifications and information that will not require addenda may be submitted verbally to the named above at any time.

Formal Communications shall include, but are not limited to:

• Questions concerning this RFP must be submitted in writing and be received prior May 9, 2011 by 5pm.

• Errors and omissions in this RFP and enhancements: Vendors shall bring to Tiffany’s networking, any discrepancies, errors, or omissions that may exist within this RFP. With respect to this RFP, vendors shall recommend to Tiffany’s networking any enhancements, which might be in Tiffany’s networking best interests. These must be submitted in writing and received prior May 10, 2011.

• Inquiries about technical interpretations must be submitted in writing and received prior to May 5, 2011 by 5pm

• Inquiries for clarifications/information that will not require addenda may be submitted verbally to the buyer named above at any time during this process.

• Verbal and/or written presentations and pre-award negations under this RFP.

• Addenda to this RFP.

Addenda: Tiffany’s networking will make a good-faith effort to provide a written response to each question or request for clarification that requires addenda within 3 business days. Tiffany’s networking 423-555-9087 Fax: 423-55-9000

Tiffany’s networking will not respond to any questions/requests for clarification that require addenda, if received Tiffany’s networking after May 5, 2011 by 5pm.

7 Overview of Proposed Solution

Provide the high-level description of the proposed educational institution structured cabling solution as well as its basic elements (racks and cabinets, terminations, documentation, cross-connect subsystem, expansion options, testing, industry standards referenced). Describe in general terms the critical attributes of the solution which will have a major impact on Tiffany’s networking meeting our overall goals as stated in Section 2 above. Also list included software for cable management as well as inventory management software inputs.

8 Technical Specifications

Please describe in detail how the proposed structured cabling solution will meet or exceed each of the following baseline requirements. Provide baseline technical requirements for the structured cabling solution. For each requirement have the vendor list what their solution provides. The vendor, of course, will be motivated to exceed baseline requirements.

9 Main Equipment Room (MER)/ Telecommunications Room (TR)

A MER or TR is an area within the data center to house equipment associated with the telecommunications/data wiring systems. State a baseline requirement for specification from the solution as well as expectations for longer-term incremental non-disruptive growth. For example: a single intra-building backbone with the capability to grow capacity to a campus-wide distribution frame. Vendors should also indicate if their solution meets grounding and bonding requirements, and lightning and surge protection requirements.

10 Voice Communications

Specify whether patch panels (RJ-45) or 110 cross-connect system (rack mounted field terminated wiring blocks) will be required. Include current baseline requirements for number of terminations as well as long-term growth expectations. For example: vendor must install adequate cross-connect equipment to allow for a minimum of 20% additional growth (terminations) upon acceptance. Mounted and fixed cross-connect fields and frames must to allow for easy expansion.

11 Data Communications

Provide specific details about the number of connections required by application (e.g. LANs, IP telephony servers and switches, SANs, WANs, high-end workstations, server clusters). Additionally, provide guidance on cabling media to be included or excluded (e.g. Category 5E, Category 6A Infiniband, Multimode fiber (OM3), Single mode fiber (OS1), etc.) Include current baseline requirements for number of terminations as well as long-term growth expectations. For example: the solution shall provide for a minimum 20% additional growth (terminations) for each application after all base-line requirements described by [Insert Enterprise Name Here] have been met. All patched panels and cross-connect frames must allow for easy expansion.

12 Equipment Cabinets, Racks & Tray Systems

Provide specific details about the current number of connections required by application (e.g. LANs, IP telephony servers and switches, SANs, WANs, high-end workstations, server clusters). Additionally provide the vendor with architectural drawings of the room. Include any specific requirements such as lockable cabinet requirements, if electrical strips are to be included in the solution, fill ratio limits, etc. For example: the solution shall be well placed, flexible, and accessible. Data center hosted applications require that cables and cable pathways be protected from damage, degradation, and heat loads. All cabling equipment and mechanical pathways must provide separation of power and data, ensure accessibility and security, and have a maximum pathway fill at a delivery of 25% to allow for future growth.

13 Cable Management

State the enterprise requirements for the ongoing cable management of the solution. For example: the vendor’s solution is expected to allow [Insert Enterprise Name Here] to maintain a database of structure cabling components across the data center. This solution must utilize proper labeling schemas for terminations (e.g. color coded to indicate application, no hand written labels), include Visio, CAD and/or shop floor drawings for all solution sub-systems and rooms, and equipment lists in an electronic format.

14 Testing

Testing shall conform to ANSI/TIA/EIA-568-C.1 standards. Testing is expected to be completed using level IIe or higher field testers. Submit electronic media with test results.

15 Warrant/ Support

Unless otherwise specified, the vendor should unconditionally guarantee in writing the materials, equipment, and workmanship for a period of not less than fifteen (15) years from the date of acceptance by the enterprise. Tiffany’s networking shall deem acceptance as beneficial use.

16 Sequence & Scheduling

Submit schedule for installation of equipment and cabling. Indicate delivery, installation, and testing for conformance to completion dates.

Vendor Qualifications & References

All vendors must provide the following information in order for their proposal to be considered:

1. A brief outline of the vendor company and services offered, including:

• Full legal name of the company.

• Year business was established.

• Number of people currently employed.

2. An outline of the product line-up they currently support.

3. A description of their geographic reach and market penetration.

4. An outline of their partnerships and relationships to date.

5. An outline of their current and future strategies in the marketplace.

6. Information on current clients, including:

• Total number of current clients.

• A list of clients with similar needs using the same solution.

• Evidence of successful completion of a project of a similar size and complexity.

7. References: contact information for 3 references (if possible) from projects similar in size, application, and scope, and a brief description of their implementation.

Budget & Estimated Pricing

Tiffany’s networking has a total budget of [Insert Total Budget Figure & Currency Type Here] for this project.

All vendors must fill out the following cost breakdown for the implementation of their structured cabling solution for Tiffany’s networking’s project as described in this RFP. Costs should be identified as either capital or non-capital in nature. The vendor must agree to keep these prices valid for 60 days as of May 1, 2011.

Provide a five year cost summary as displayed below.

|Five Year Total Cost Summary |
|Costs |Total |Year 1 |Year 2 |Year 3 |Year 4 |Year 5 |
|Structural/room costs, coring, etc. | | | | | | |
|Cross-connect material and hardware | | | | | | |
|Equipment cabinets, racks, and cable tray | | | | | | |
|systems | | | | | | |
|Electrical, grounding, bonding, surge | | | | | | |
|protection | | | | | | |
|Support/maintenance | | | | | | |
|Installation | | | | | | |
|Integration | | | | | | |
|Miscellaneous | | | | | | |
|Other (specify) | | | | | | |
|Total: | | | | | | |

. 4. Scope of Work, Specifications & Requirements
Include a detailed list of the Business and System Requirements. Include further description for each requirement and ask the vendor to describe how they will fulfill each requirement. Use the list of potential structured cabling features listed below as a starting point. Add, expand upon, modify, or delete requirements as needed.

Vendor Certification

This certification attests to the vendor’s awareness and agreement to the content of this RFP, and all accompanying calendar schedules and provisions contained herein.

The vendor must ensure that the following certificate is duly completed and correctly executed by an authorized officer of your company.

This proposal is submitted in response to the Request for Proposal for a Data Center Structured Cabling Solution issued by Tiffany’s networking. The undersigned is a duly authorized officer, and hereby certifies that:

| |

(Vendor Name)
Agrees to be bound by the content of this proposal and agrees to comply with the terms, conditions, and provisions of the referenced RFP and any addenda thereto in the event of an award. Exceptions are to be noted as stated in the RFP. The proposal shall remain in effect for a period of 60 calendar days as of the Due Date of the RFP.

The undersigned further certify that their firm (check one): IS IS NOT
Currently debarred, suspended, or proposed for debarment by any federal entity. The undersigned agree to notify Tiffany’s networking of any change in this status, should one occur, until such time as an award has been made under this procurement action.

Person(s) authorized to negotiate on behalf of this firm for purposes of this RFP are:

|Name: | |Title: | |
|Signature: | |Date: | |
| | |Title: | |
|Name: | | | |
|Signature: | |Date: | |

Signature of Authorized Officer:
|Name: | |Title: | |
|Signature: | |Date: | |


Tiffany’s networking products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns. Our practical approach is designed to have a clear and measurable positive impact on your organization's bottom line.
We serve over 21,000 clients at 8,000 organizations around the world. Since 1998, we have focused on making the work of IT professionals easier - and on helping them achieve greater personal and corporate success.

Similar Documents

Free Essay


...INFRATSRUCTURE The Eleventh Five Year Plan emphasized the need for removing infrastructure bottlenecks for sustained growth. It, therefore, proposed an investment of US $500 billion in infrastructure sectors through a mix of public and private sectors to reduce deficits in identified infrastructure sectors. As a percentage of the gross domestic product (GDP), investment in infrastructure was expected to increase to around 9 per cent. For the first time the contribution of the private sector in total investment in infrastructure was targeted to exceed 30 per cent. Total investment in infrastructure during the Eleventh Plan is estimated to increase to more than 8 per cent of GDP in the terminal year of the Plan --higher by 2.47 percentage point s a s c ompa red t o the Tenth Pl an. The private sector is expected t o be contributing nearly 36 per cent of this investment. RAILWAYS Some of the major goals set for Vision 2020 in the document include (a) laying of 25,000 km of new lines; (b) quadrupling of the 6,000 km network with segregation of passenger and freight lines; (c) electrification of 14,000 km; (d) completion of gaugeconversion; (e) upgradation of speed to 160-200 kmph for passenger trains; and (f) construction of 2,000 km of high-speed rail lines. • Freight performance: Freight loading on Indian Railways during April-November 2011 was 618.0 MT as compared to 593.4 MT in April-November 2010, an increase of 4.14 per cent. •......

Words: 1202 - Pages: 5

Free Essay

Ppp in Infrastructure Sector

...IIPDF India Infrastructure Project Development Fund The Union Finance Minister in the Budget Speech for 2007-08 announced in the parliament the setting up of a Revolving Fund with a corpus Rs. 100 Crore to quicken the process of project preparation. Accordingly the corpus fund titled India Infrastructure Project Development Fund (IIPDF) has been created in Department of Economic Affairs, Ministry of Finance, Government of India with an initial corpus of Rs. 100 Crore for supporting the development of credible and bankable Public Private Partnership (PPP) projects that can be offered to the private sector. The IIPDF has been created with initial budgetary outlay by the Ministry of Finance, Government of India. The procurement costs of PPPs, and particularly the costs of Transaction Advisors, are significant and often pose a burden on the budget of the Sponsoring Authority. Department of Economic Affairs (DEA) has identified the IIPDF as a mechanism through which Sponsoring Authority will be able to source funding to cover a portion of the PPP transaction costs, thereby reducing the impact of costs related to procurement on their budgets. From the Government of India’s perspective, the IIPDF must increase the quality and quantity of bankable projectsthat are processed through the Central or States project pipeline. The IIPDF will be available to the Sponsoring Authorities for PPP projects for the purpose of meeting the project development costs which may include the......

Words: 2076 - Pages: 9

Premium Essay


...through an unsecured site leading to the disclosure of business sensitive and companywide strategic information pertaining current contract negotiations and company mergers. IDI CIO has enlisted the help of an Information Systems Infrastructure Architect and An Information Systems Security Specialist to investigate and recommend improvements to IDI’s IT Infrastructure. To date, IDI’s network weaknesses out way the network strengths. The larger of the weaknesses is that IDI has no secondary locations in the event of a large scale disaster. Second to that is the lack of security implementations at some of the sites, i.e., Remote access to the Warsaw office runs through a completely unsecure channel and the blatant disregard for adherence to network security policies at the home office. Further evaluations of some of IDI sites have led us to come up with a fairly comprehensive plan to fix and mitigate and major issues that may arise in the future. Our greatest challenge will be to ensure that all sites are working towards the same goal using the same equipment. We are driven to set IT standards which will help us: * Avoiding technological dead ends * Reducing dependency on outside vendors * Promote universality San Paulo’s infrastructure is going to be the basis for the rest of the sites. We recommend that each site have the following hardware and software setups: * Microsoft Windows 2008 Server R2 *...

Words: 3151 - Pages: 13

Premium Essay

Analysis of Infrastructure Sector in India

...Analysis of Infrastructure Sector Infrastructure refers to the fundamental facilities and systems serving a country, city or area, including the services and facilities necessary for its economy to function. Infrastructure is the backbone of an economy. The various types of infrastructure are roads, airports, ports, housing, cold chain, warehousing, telecom towers and allied services, container freight stations etc. In the World Economic Forum’s Global Competitiveness Report for 2011-2012, India was ranked 89th out of 142 countries for its infrastructure. The report also criticized the transport, ICT and energy infrastructure labelling it as “largely insufficient and ill adapted to the needs of business”. Market Size: The Indian power sector has an investment potential of $US 250billion in the next 4-5 years, providing immense opportunities in power generation, distribution, transmission and equipment. The Indian railways have had an increase of 12.57% in revenues from last year. FDI received in construction development sector from April 2000 to January 2015 stood at US$ 24,028.19 million. The number of export and import containers moving through major ports in India expanded 7.34% year over year from April to October 2014. Government Estimation and Plans: Sustained increase in infrastructure is expected to be one of the crucial factors for sustaining strong growth in the economy. Infrastructure investment is expected to surge from 8.9% of GDP in FY15 to 12.1% of GDP......

Words: 700 - Pages: 3

Free Essay

Critical Infrastructure Protection

...The U.S. CIP is a national program to ensure the security of vulnerable and interconnected infrastructures of the United States The United States possesses both the world's strongest military and its largest national economy. Those two aspects of our power are mutually reinforcing and dependent. They are also increasingly reliant upon certain critical infrastructures and upon cyber-based information systems. Critical infrastructures are those physical and cyber-based systems essential to the minimum operations of the economy and government. They include, but are not limited to, telecommunications, energy, banking and finance, transportation, water systems and emergency services, both governmental and private. Many of the nation's critical infrastructures have historically been physically and logically separate systems that had little interdependence. As a result of advances in information technology and the necessity of improved efficiency, however, these infrastructures have become increasingly automated and interlinked. These same advances have created new vulnerabilities to equipment failure, human error, weather and other natural causes, and physical and cyber attacks. Addressing these vulnerabilities will necessarily require flexible, evolutionary approaches that span both the public and private sectors, and protect both domestic and international security. Because of our military strength, future enemies, whether nations, groups or individuals, may seek to harm us in......

Words: 468 - Pages: 2

Premium Essay

Ppp and Project Financing in Logistics Infrastructure

...Project Finance and Private Public Partnership in financing logistics infrastructure. Introduction Finance scholars acknowledge a clear-cut distinction between corporate finance and project finance. The two techniques are considered as basically different approaches to the problem of raising debt to fund capital investments. In corporate finance lenders assess the creditworthy of a whole company, evaluating the going concern, the full range of projects in place, and the cautional value of all the assets. The amount to lend and the risk-spread are decided on a global evaluation of the firm’s economic and financial situation. In project finance, the goal is the implementation of a specific project. Lenders typically finance a special purpose vehicle for the development and construction of a particular project, looking to cashflows and project’s assets as sources of payment for their loans, rather than to the credit ratings of the project sponsors. Historically project finance was widely used in financing transport and logistics infrastructure, like railways or channels. More recently, in the past decades, there has been a new wave of global interest: large amounts of debt have been raised to finance projects like motorways, distriparks, maritime ports, intermodal logistic platforms. These infrastructures are built, owned and operated by special purpose vehicles (SPV), organized for that single project and financed mainly by debt. In many cases, SPVs are not wholly owned by......

Words: 2318 - Pages: 10

Premium Essay

Critical Infrastructure Protection

...Critical Infrastructure Protection (CIP) and the mythology behind this since the attacks of 9/11, as well as a brief history of Critical Infrastructure Protection pass to the present to include attacks from the cyber arena. These attacks are prone to come indirect or direct which will and could affect our need and use for resources for life as we know it based on living naturally on a daily bases, these threats maybe man made or by natural disaster. Problem statement Prior to the attacks of 9/11 there was no main concern with the protection of Critical Infrastructure within the United States from any avenue. As we moved on into the 21 century the threat has evolved from more than just protecting water source, and power plants. With the information age this issue has shown another form of crippling the United States economy with just the push of a button. How we to protect these infrastructures from threats that may not be seen or those from natural disasters is a question for now and the future. Purpose statement I have chosen this particular subject due to the nature of its importance to national security, economy, as well as the everyday needs of Americans to survive. The awareness for the protection of our critical infrastructure is a necessity for the present and future of America’s well fair. Research questions Q1. When did the United States began showing concern for critical infrastructure and why? Q2. Why is the protection of critical infrastructure so......

Words: 786 - Pages: 4

Premium Essay

Assignment 2 Critical Infrastructure Protection

...Assignment 2: Critical Infrastructure Protection Strayer University Introduction In the wake of a terrorist attack, natural disaster, or emergency, the Department of Homeland Security (DHS) is prepared to respond.   DHS primary responsibilities are combatting terrorism, securing boarders, enforcing immigration laws, safeguarding cyberspace, and responding to natural disasters. Coordination with the federal response teams and partnerships with local, state, and private sectors, enhance the DHS response tactics in a national emergency. Department of Homeland Security Mission, Operations, and Responsibilities The Department of Homeland Security’s mission is to keep America safe, protected, and resilient from various elements that threaten the country.  As identified by (, 2013) DHS has three key concepts that strategies are based upon security, resilience, and customs and exchange.  The process that defines homeland security missions and incorporates the key concepts is the Quadrennial Homeland Security Review (QHSR). DHS missions are spread across the enterprise and do not only cover DHS.  The delegated missions define in detail how to prevent, protect, respond, recover, secure, ensure resilience, and facilitate customs and exchange as noted by (, 2013).     Department of Homeland Security operations encompass five core objectives.  The objectives covered under DHS are prevention of terrorism and enhancing security; secure and manage our boarders; enforce and......

Words: 1685 - Pages: 7

Free Essay

Public Key Infrastructure

...Public Key Infrastructure David Croughwell Prof. George Danilovics Networking Security Fundamentals (CIS333) 17 February 2013 Public Key Infrastructure In discussing the Public Key Infrastructure (PKI) we need to discuss the differences between asymmetric and symmetric keys. These two keys differ in how they are distributed to the various parties that would like to transfer information. Symmetric can be completed by hand delivery, transmitting the key encrypted with a public key, or through a secure connection. This symmetric key or “private key” is used by both parties for encryption and decryption, this method once the key is obtained is the faster of the two and the most secure. Private keys can also be incorporated with hardware devices which will also increase the speed in which the encryption/decryption takes place. Asymmetric keys or “public keys” are a combination of private keys and public keys, since in circumstances the individual receiving the file would have no other ways of receiving the private key securely. This requires a key that is generated so that it can be linked with the private key, being linked like this allows you to post the public key to certificate authorities who will verify that the two keys come from the individual that you expected. The means of identifying who you are can be handled by a third-party corporation. This is completed by utilizing a digital signature which is the equivalent of a handwritten signature. This tells......

Words: 915 - Pages: 4

Premium Essay

Public Key Infrastructure

...Case Study 2: Public Key Infrastructure Due Week 6 and worth 50 points You are the Information Security Officer at a small software company. The organization currently utilizes a Microsoft Server 2008 Active Directory domain administered by a limited number of over-tasked network administrators. The remainder of the organization comprises mostly software developers and a relatively small number of administrative personnel. The organization has decided that it would be in its best interest to use a public key infrastructure (PKI) to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation. Email clients, virtual private network products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, digital certificates would be used to sign software developed by the company to demonstrate software authenticity to the customer.  Write a two to three (2-3) page paper in which you: 1. Identify and analyze the fundamentals of PKI. 2. Analyze positive and negative characteristics of a Public and In-house CA. 3. Provide a sound recommendation for either a Public CA or an In-house CA. Your assignment must follow these formatting requirements: * Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for......

Words: 335 - Pages: 2

Free Essay

Cis 502 Critical Infrastructure Protection

...CIS 502 Critical Infrastructure Protection Click Link Below To Buy: Due Week 6 and worth 50 points Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure. The following documents titled, “National Infrastructure Protection Plan”, and “Critical Infrastructure Protection”, may be used to complete the assignment. Write a three to five (3-5) page paper in which you: 1. Examine the Department of Homeland Security’s : a. mission b. operations c. responsibilities 2. Explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets. 3. Describe the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure. 4. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure. 5. Suggest three (3) methods to improve the protection of our critical infrastructure and justify each suggestion. 6. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times...

Words: 1288 - Pages: 6

Premium Essay

Understanding It Infrastructure Security Case Study

...Week 1: Understanding IT Infrastructure Security Case Study Hello my name is YGS and I am an Independent contractor for TJX, they have requested my assistant and I will be in charge of all IT matter at TJX. In recent happenings at TJX you should by now be aware that this company was breached by a hacker by the name of the Albert Gonzalez. He stole over $170 million dollars of customer’s credit card information. As a result TJX has taken a major financial loss and our honor and credibility is in question. The reason we are in question is because it turns out the matter was not discovered until an outside source (our gateway/payment-card processing) partners came in and performed an audit to then discover we were breached. Before the audit we should have caught the transfer of 80 GB of stored data by Mr. Gonzalez. Prior to any breach of this company TJX should have been compliant with the payment card industry compliance and validation regulations. In complying with the Federal Trade Commission (FTC) under FTC jurisdiction our IT team should be consistently taking measures in place to keep customer information secure at all times. By being on top of things we would have been less vulnerable to an attack of this size and speared the embarrassment of not discovering the breach for over seven months. To of eradicated this from ever happening TJX should have made sure that our payment gateway client was compliant with their firewall configuration, protect stored......

Words: 361 - Pages: 2

Free Essay

Assignment 2: Critical Infrastructure Protection

...Assignment 2: Critical Infrastructure Protection Benard Braxton, Jr. Dr. Bouaffo Kouame CIS 502 – Theories of Security Management May 17, 2015 The Department of Homeland Security’s vison is to ensure a homeland that is safe, secure, and resilient against terrorism and other hazards (DHS, 2015). To achieve this vision there are three key concepts that creates the foundation of our national homeland security strategy. They are security, resilience, and customs and exchange (DHS, 2015). These key concepts drive wide-ranging areas of action that the Quadrennial Homeland Security Review process describes as homeland security missions. These missions are not restricted to the Department of Homeland Security. These objectives and goals says what it means to prevent, to protect, to respond, and to recover. They also shows how build in security, to ensure resilience, and to facilitate customs and exchange (DHS, 2015). There are thousands of people from across the all over the country who are responsible for executing these missions. These are the people who interact with the public, are responsible for security and public safety, operate our country’s critical services and infrastructures, develop technology, perform research, watch, prepare for, and respond to emerging disasters and threats (DHS, 2015). The five homeland security core missions are to prevent terrorism and enhancing security; secure and manage our borders; enforce and administer our immigration laws;......

Words: 1124 - Pages: 5

Premium Essay

United Parcel Service’s It Infrastructure

...United Parcel Service’s IT Infrastructure: A Case Analysis Russell Baker, Jacksonville University Brian Wm. Dudley, Jacksonville University Sean Holt, Jacksonville University Chris Stockton, Jacksonville University Vanja Vukota, Jacksonville University ABSTRACT This analysis of the information technology infrastructure at United Parcel Service (UPS) begins with a general overview of the company’s information technology (IT) environment to establish awareness of the size and complexity of this corporation. It includes a macro-level breakdown of the technology infrastructure of UPS ranging from the data centers to the PCs currently in operation. The study also more closely analyzes the software and database structure of UPS along with an analysis of the company’s E-commerce activities. It includes an interview with Tom Creech, the North Florida District E-commerce manager at UPS. Finally, research was conducted to evaluate the emerging technologies that UPS is implementing and employing to support the business strategy and maintain its competitive edge. OVERVIEW nfrastructure, data and proprietary e-commerce software elements are the foundation of UPS’s technology success. These tools work together to support its e-commerce strategy, which in turn supports the company’s business strategy. The company’s ongoing investment and research in emerging technologies gives UPS its competitive advantage according to Tom Creech, North Florida District E-commerce Manager.......

Words: 3557 - Pages: 15

Premium Essay

It Infrastructure

...partnership to develop a new set of information technology (IT) infrastructure capabilities which enabled the company to provide the necessary services for its large customers while at the same time reducing costs at Johnson & Johnson [Weill & Broadbent, 1998]. In the late 1990s, Charles Schwab focused on delivering customized information to its investors in a timely manner. Using the company's IT infrastructure and applications aligned with its business focus, Schwab became a full service brokerage firm. The firm was able to provide information and process transactions in meeting its business objectives. Customers could retrieve stock quotes and place orders via Schwab's Web site. As a result, the corporation continues to be an industry leader. These two examples demonstrate that an organization’s IT infrastructure can provide tangible benefits and a continuity of business practices [Kettinger, Grover, Subanish, & Segars, 1994]. A particularly important characteristic of IT infrastructure is flexibility [Byrd & Turner, 2000]. Researchers have stated that IT infrastructure flexibility should be viewed as an organizational core competency and that IT infrastructure flexibility is necessary to handle increased customer demands without increased costs [Davenport & Linder, 1994; Weill, 1993]. As we discuss next in developing the theoretical framework for our study, two important aspects of IT infrastructure flexibility emerge from previous research: the core......

Words: 328 - Pages: 2