Premium Essay

Project Deliverable 5 Infrastructure and Security

In: Business and Management

Submitted By APLUSTUTOR
Words 724
Pages 3
Project Deliverable 5: Infrastructure and Security
This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one (1) floor to three (3) floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. Additionally, the security of the network should be in the forefront of your design because protecting your data is a primary consideration.

Section 1: Infrastructure Document 1.Write a four to six (4-6) page infrastructure document in which you: ◦Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.

◦Present the

Similar Documents

Premium Essay

Technical Writing

...Technical Writing Project Cover Sheet Capstone Proposal Project Name: Collaborative Business Intelligence Implementation Student Name: Joseph Thomas Degree Program: BSIT Mentor Name: Jeff Davis Signature Block JOSEPH THOMAS Student’s Signature Joseph Thomas Mentor’s Signature Table of Contents Capstone Proposal Summary 1 Review of Other Work 1 Rationale and Systems Analysis 1 Goals and Objectives 2 Project Deliverables 2 Project Plan and Timelines 2 References 3 Appendix 1: Competency Matrix 4 Appendix 2: 5 Appendix 3: 6 Capstone Proposal Summary The ClientABC has outgrown their existing file server environment, and is looking for a content management system with analytical capabilities. They have provided us with detailed requirements, and we have recommended the implementation of a Microsoft® SharePoint portal leveraging Microsoft® SQL Server for a Business Intelligence solution. The portal will only be required to be accessible from within the organization and not externally. This platform will address the specific needs of each department by allowing users to upload and share department documents, such as polices. The IT department will work with other department managers to develop custom workflows based on their business processes needs. The Administration group will help define the analytical dashboard and reporting needs of the organization, with the focus...

Words: 1566 - Pages: 7

Premium Essay

Test

...______________________________________________________________________________ Project Name NSA Capstone Project Charter ______________________________________________________________________________ Prepared By: [insert name] Date of Publication: [insert date] Revision History Version | Date | Author(s) | Revision Notes | 1.0 | 9-27-14 | Josh | Started Charter | 2.0 | 10-4-14 | All members | Provided each of our parts of charter | | | | | | | | | | | | | Table of Contents Project Description 3 Project Objectives 3 Project Scope 4 In Scope: 4 Out of Scope: 4 Deliverables Produced: 4 Stakeholders: 5 Requirements: 5 Acceptance Criteria:Project Estimated Effort/Cost/Duration 5 Estimated Cost: 6 Estimated Effort Hours: 6 Estimated Duration: 6 Project Assumptions 7 Project Risks 7 Project Constraints 8 Project Dependencies 8 Project Approach 8 Project Organization 9 Communication Plan: 9 Project Guidelines: 9 Project Approvals 10 Project Description Ace’s IT Solutions will design and implement a fully functional network infrastructure for Greenway Bank. The equipment that is currently at all locations is outdated and will be replaced with state-of-the-art compatible systems. There are four branches which are located in: New York, Seattle, Orlando, and Los Angeles. The headquarters will be located in St. Louis. This location will have system capability and capacity to provide data storage...

Words: 1815 - Pages: 8

Premium Essay

Dfhdfh

... |[pic]www.csudh.edu | | |[pic] | |[pic] |College of Natural and Behavioral Sciences | | |Department of Computer Science | | |http://csc.csudh.edu | |Course Title: |Communication Systems Security | |Course Number: |CTC 362 | |Instructor Name: | Mehrdad S. sharbaf, ph.d. msharbaf@csudh.edu, Office: tba, phone: tba, office Hours: tba | |Date: |Spring Semester, 2016 | |Course Length: |_15_ Weeks | |Web Companion |N/A ...

Words: 1433 - Pages: 6

Free Essay

Scope of Service

...[pic] STATE GOVERNMENT DEPARTMENT OF FINANCE AND ADMINISTRATION REQUEST FOR PROPOSALS FOR INFORMATION SECURITY ASSESSMENT SERVICES (ISAS) RFP NUMBER: 427.04-107-08 |CONTENTS | |SECTION | | |1 |INTRODUCTION……………………………………………………………………………….3 | |2 |RFP SCHEDULE OF EVENTS………………………………………………………………..................................6 | |3 |PROPOSAL REQUIREMENTS………………………………………………………………7 | |4 |GENERAL REQUIREMENTS & CONTRACTING INFORMATION………………….…..9 | |5 |PROPOSAL EVALUATION & CONTRACT AWARD…………………………………....13 | | | |RFP ATTACHMENTS: | | ...

Words: 40549 - Pages: 163

Premium Essay

Rfp Templete

...INTRODUCTION AND BACKGROUND 5 PURPOSE OF THE REQUEST FOR PROPOSAL 5 ADMINISTRATIVE 6 TECHNICAL CONTACT 6 CONTRACTUAL CONTACT 6 DUE DATES 6 SCHEDULE OF EVENTS 7 GUIDELINES FOR PROPOSAL PREPARATION 8 PROPOSAL SUBMISSION 8 DETAILED RESPONSE REQUIREMENTS 10 EXECUTIVE SUMMARY 10 SCOPE, APPROACH, AND METHODOLOGY 10 DELIVERABLES 11 PROJECT MANAGEMENT APPROACH 11 DETAILED AND ITEMIZED PRICING 11 APPENDIX: REFERENCES 11 APPENDIX: PROJECT TEAM STAFFING AND BIOGRAPHIES 11 APPENDIX: COMPANY OVERVIEW 12 EVALUATION FACTORS FOR AWARD 13 CRITERIA 13 SCOPE OF WORK 14 REQUIREMENTS 14 DELIVERABLES 14 USING THIS TEMPLATE Savid Technologies has developed this Request For Proposal (“RFP”) template to help organizations identify and select a quality security vendor to perform professional services work. This template is absed off templates provided by Foundstone, Verisign, and other security institutions including countless RFP responses Savid has provided. It also lists questions organizations should consider asking potential vendors to ensure that a thorough and comprehensive approach to the project will be taken. This template should apply for a variety of information security projects including: External Network Vulnerability Assessment and Penetration Testing Internal Network Vulnerability Assessment and Penetration Testing Web Application Penetration Testing Dial-In / RAS Security Testing DMZ or Network...

Words: 2629 - Pages: 11

Premium Essay

Directed Research Project

...Project Deliverable 6: Final Project Plan CIS 590 Directed Research Project 6/15/15 Table of Contents 1. Project Plan Overview 1.1 Background 1.2 Project Description 1.3 Goals and Objectives 1.4 Scope 1.5 Roles and Responsibilities 1.6 Constraints and Assumptions 1.7 Risks 1.8 Project Deliverables 2. Project Work Plan 2.1 Work Breakdown Structure 2.2 Staffing Plan 2.3 Project Schedule 2.4 Project Budget 3. Solution Provider 4. Database and Data warehousing 5. Infrastructure and Security 6. Appendix The Project Plan defines the following: 0 Background 1 Project Description 2 Business and project goals and objectives 3 Scope 4 Roles and responsibilities 5 Assumptions and constraints 6 Project budget 7 Project timeline 8 The conceptual design of new technology 1. Project Plan Overview 1.1 Background Information is a significant component of any trusted business activity. Information is useful across the entire organization for number of purposes and is stored in an assortment of information systems. Modification to any of these information systems must be firmly controlled and managed to evade those loss of important information that cannot be recovered. System...

Words: 4434 - Pages: 18

Premium Essay

Hospital Capstone Charter & Scope

...IP-based Healthcare Data Networks _________________ Project Charter Document with Scope Table of Contents A. General Project Information Page 3. B. Project Objectives -Project Mission Statement -Business Case -Problem Statement -Goal Statement -Definition of Terms Target Project Goals Page 4. Acceptance to Terms of Deliverables Key Project Directives Page 5. C. Project Assumptions Page 6. Telecommunication Location Specification Page 8. Telecommunication Room Specifications Telecommunication Power Requirements Additional Network Requirements Page 9. Project Deliverables Page 12. D. Project Scope Page 14. ScopeAgenda Fulfilling IP Convergence Requirements Network Verification Requirements Page 16. Work Area Designations Infectious Control Requirements Page 17. Cable Run Specifications Page 18. Scope Exclusions Page 20. E. Project Milestones Page 21. F. Impact Statement Page 22. G. Roles & Responsibilities Page 23. H. Resources Page 24. I. Project Risks Page 25. J. Success Measurements Page 26. K. Project Participant Signatures Page 27. A. - General Information Project Title: | St. Catherine Specialty Hospital - Network and Data Infrastructure | Brief Project Description: | New hospital with specialty services offered to the community | Prepared By:...

Words: 8359 - Pages: 34

Premium Essay

Network Design Project

...Project 1 - Network Design Project ------------------------------------------------- Top of Form Bottom of Form Content * Project Details Project Overview High-Power Consultants is a mid-sized business that offers computer and network consulting services to a variety of companies throughout the southeast United States. They have recently been retained by Joe’s Yachts to develop a network design upgrade proposal that follows industry standard guidelines. Joe’s Yachts is a seller of high-end and custom yachts to customers throughout the southeast coastal area. They have 15 stores in four states and all are interconnected. Your instructor will provide you with the current network layout of Joe’s Yachts. Although the current infrastructure provides basic network services and interconnectivity between all stores, it has nonetheless been hampered by older technology and designs. Joe’s Yachts would like to upgrade its network design and components to improve network capacity, provide wireless services at their stores, offer more robust security services, and implement store-to-store VoIP services to replace the existing traditional phone service. As an employee of High-Power Consultants, you will develop a proposal for Joe’s that follows the SDLC process and meets their network design requirements. In this activity, you will need to prepare a proposal for Joe’s that addresses the following topics: * An evaluation of the existing network infrastructure, noting security...

Words: 449 - Pages: 2

Premium Essay

Access Control: Is3230

...Access Control Project Access Control: IS3230 By Andrew Reed November 20, 2012 TABLE OF CONTENTS 1 INTRODUCTION 1.1 Project Title 1.2 Project Schedule Summary 1.3 Project Deliverables 1.4 Project Guides 1.5 Project Team Members 1.6 Purpose 1.7 Goals and Objectives 2 Risks and Vulnerabilities 2.1 Overall 2.2 Billings, Montana 2.3 Warsaw, Poland 3 Proposed Budget 4 IDI Proposed Solution 4.1 Billings, Montana 4.2 Warsaw, Poland 5 Drawings 6 Conclusion 1 INTRODUCTION 1.1 Title of the project Access Control Proposal Project 1.2 Project schedule summary The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms. 1.3 Project deliverables • Solutions to the issues that the specifies location of IDI is facing • Plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability • Assessment of strengths and weaknesses in current IDI systems • Address remote user and Web site user’s secure access requirements • Proposed budget for the project—Hardware only • Prepare detailed network and configuration diagrams outlining the proposed change • Prepare a 5 to 10 minute PowerPoint assisted presentation on important access control infrastructure, and management aspects from each location. 1.4 Project Guides Course Project Access Control Proposal Guide Juniper Networks Campus...

Words: 1198 - Pages: 5

Premium Essay

Student

...Project Deliverable 1: Project Plan Inception Rodney Dexter Grier Information Systems Capstone 499 Professor Gerry Waldrop Project Deliverable 1: Project Plan Inception 2 Background IT has been determined that our Revenues will grow to $25 Million dollars over the next six months. Therefore, the CIO of XYZ has been assigned the challenges of delivering an IT Platform that will support our Internal and External Stakeholders. This wills security our position as the leading Data Collection and Analysis Company with an expected growth of 60% year of year. We are embracing the Information Technological aspects of the future of XYZ Corporation. We are determined to maximize the value to our Stock Holders and Stakeholders. We are projected to grow at a 60% rate over the next 18 months and as your CIO the IT Department is preparing our Infrastructure, Monitoring, Systems, Software, Hardware, Computing and Devices to scale and support our growth. Our company is a key player in the Analytics and Research services and we are positioning our Strategic Alignment gain the competitive edge over our competition. We will be expanding our Data Center along with Office space and the Acquisition and Implementation of New Systems. For example, this Project Plan will include the build out of the expanding from 1 Floor at our Headquarters location to a total of three floors. Our Leadership team feels very strongly that this is a great opportunity for XYZ to leverage...

Words: 731 - Pages: 3

Premium Essay

Project Management

.................................................................................. 4 Main Body .............................................................................................................................................. 5 1.0 Project Charter ......................................................................................................................... 5 Project Vision .................................................................................................................................. 6 Project Objectives/Deliverables ....................................................................................................... 6 Assumptions .................................................................................................................................... 7 Risks and Dependencies................................................................................................................... 7 Actor Catalog .................................................................................................................................. 9 Business Process Flow ................................................................................................................... 10 Project Organization Chart ............................................................................................................. 11 Roles and Responsibility .................................................................................

Words: 8273 - Pages: 34

Premium Essay

Rmgt Task 1

...James Table of Contents GenRay’s hris project management tool Matrix Template 2 RMGT Task 1 - Section Overview 2 GenRay’s hris project management tool Matrix 2 GenRays Project Charter - HRIS project 2 genray HRIS Program Purpose 2 GEnRay HRIS Program Description 2 genray hris target state overview 2 GenRay HRIS PROGRAM BACKGROUND 2 Genray hris Success Criteria 2 GenRay hris Project Objectives 2 Genray estimated Funding 2013-2014 2 genray hris Acceptance Criteria 2 Genray HRIS Approval Requirements 2 Genray HRIS Project Manager 2 Genray HRIS Authorize Authority 2 Accountable Genray HRIS Executive 2 Genray hris goverance and decision bodies 2 genray hris Key External Processes 2 Genray HRIS Milestones and Deliverables 2 genray hris Milestone / Schedule 2 genray hris Charter Expiration 2 genray hris charter/ scope/ project plan Approval 2 GenRays HRIS Project Scope 2 Project Scope Description 2 genray hris target state overview 2 GenRay HRIS Integration Plan 2 Genray hris CUSTOMER REQUIREMENTS 2 Genray hris Statement of Work (sow) 2 genray hris Background 2 Genray hris Tasks and Deliverables 2 SOW Task 1 - Project Management 2 genray hris Project Management Deliverables - sow 2 SOW Task 2- Process Change Management 2 SOW Task 3 - Technical Infrastructure 2 Technical Infrastructure Deliverables 2 SOW Task 4 - Requirements Verification 2 Requirements Verification Deliverables 2 SOW Task E - System Software Configuration...

Words: 20249 - Pages: 81

Premium Essay

Informative

...IS4550 Security Policies and Implementation INSTRUCTOR GUIDE Course Revision Table Change Date | Updated Section | Change Description | Change Rationale | Implementation Quarter | 12/20/2011 | All | New curriculum | | June 2012 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- ------------------------------------------------- Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory, 30 Lab) Prerequisite: IS3110 Risk Management in Information Technology Security or equivalent Corequisite: None Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9: Implementing...

Words: 18421 - Pages: 74

Free Essay

Network Design Project

...Project Overview High-Power Consultants is a mid-sized business that offers computer and network consulting services to a variety of companies throughout the southeast United States. They have recently been retained by Joe’s Yachts to develop a network design upgrade proposal that follows industry standard guidelines. Joe’s Yachts is a seller of high-end and custom yachts to customers throughout the southeast coastal area. They have 15 stores in four states and all are interconnected. Your instructor will provide you with the current network layout of Joe’s Yachts. Although the current infrastructure provides basic network services and interconnectivity between all stores, it has nonetheless been hampered by older technology and designs. Joe’s Yachts would like to upgrade its network design and components to improve network capacity, provide wireless services at their stores, offer more robust security services, and implement store-to-store VoIP services to replace the existing traditional phone service. As an employee of High-Power Consultants, you will develop a proposal for Joe’s that follows the SDLC process and meets their network design requirements. In this activity, you will need to prepare a proposal for Joe’s that addresses the following topics: •An evaluation of the existing network infrastructure, noting security strengths and weaknesses. •A review of the company’s requirements and what will be needed to meet them. Justify your recommendations for...

Words: 347 - Pages: 2

Premium Essay

Hris Implementation Project Scope

...Project Scope Document Template HRIS Implementation Project Project Scope Document Gen-Rays 1/17/2014 Scope Description GenRays has just implemented a centralized finance, purchasing and logistics system. As a result of this implementation, the company realized that it saved cost and improved productivity. The management is now looking for a similar system for HR and is convinced that this implementation will replicate similar success. The following is the current scenario at GenRays HR operations: the HR system is not centralized and each location has its own HR team to carryout payroll and other HR duties. The downside of this setup is that it costs the company great deal of time and money. In order to integrate HR systems within the company, a new HRIS needs to be implemented to improve business functions. HRIS system will centralize employee database, payroll, performance management, career development and other HR operations. With the new system, recruitment process will be automated with a searchable database and capable of accessing opportunities available in the job portal. Customer Requirements: GenRays is looking for a system that would centralize its HR functions. Currently, employees are working from branch locations to support the legacy system – something the new HRIS system is supposed to address and replace. The customer is also looking for cost-effective system that would be able to automate most of the HR services such...

Words: 1038 - Pages: 5