Free Essay

Project Part 3 Task 2

In: Computers and Technology

Submitted By mozurjus
Words 963
Pages 4
Project Part 3 Task 2: Recommend a Software Management Plan
Scenario
The original task team at First World Bank Savings and Loan has concerns about the support and software management of the organization’s Linux-based infrastructure. The team wants you to recommend a software management plan keeping in mind the various servers and the cost.
Tasks
You need to: * Make a recommendation for a software management plan. Consider options available from the open source community and from vendors. If you select a vendor, specify the software it will support and how it will support. * Explain the need to install anti-virus software on Linux servers providing a rationale in support of your answer. * Summarize a plan for applying patches and security updates to the Linux system.
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 1–2 pages
Due By:Unit 9
Self-Assessment Checklist * I have recommended a suitable software management plan. * I have explained the need to install anti-virus software on Linux servers. * I have explained how to manage critical and noncritical security-related updates.
The recommendation for a software management plan is to use RPM. RPM is a software management tool originally created by Red Hat, and later GNU’ed and given to the public at http://www.rpm.org/. It forms the core of administration on most systems, since one of the major tasks for any administrator is installing and keeping software up to date. Various estimates place most of the blame for security break-ins on bad passwords, and old software with known vulnerabilities. This isn’t exactly surprising on would think, but while the average server contains 200-400 software packages on average, on begins to see why keeping software up to date can be a major task.
The main page for RPM leaves something-to-be-desired, but the book “Maximum RPM” on the other hand is really wonderful and freely available (http://www.rpm.org/). This book is suggested for any Red Hat administrator, and can say safely that it is required reading if you plan to build RPM packages. The basics of RPM are pretty self-explanatory; packages come in an rpm format, with a simple filename convention (package_name-package_version-rpm_build_version-architecture.rpm or nfs-server-2.2beta29-5.i386.rpm)
All computer systems can suffer from malware and viruses, including Linux. Thankfully, very few viruses exist for Linux, so users typically do not install antivirus software. It is still recommended that Linux users have antivirus software installed on Linux systems that are on a network or that have files being transferred to the device. Some users may argue that antivirus software uses up too much resource. Thankfully, low-footprint software exists for Linux. To better understand antivirus programs, it may be beneficial to understand malware itself.
In order to manage critical and noncritical security-related updates, there are some things that are recommended. The first of which is to turn off any unused services. Services which you don't enable can't be attacked from the outside. If you don't provide access to a service, it doesn't matter if there are any vulnerabilities in the daemon which would provide that service. So disable anything you don't need to use.
Some daemons are started when the system boots, and remain active as long as the system remains up. For these persistent daemons, you need to look at the initialization scripts or programs used to start services when the system boots. Other services are not started at boot time, but instead are managed by either inetd or xinetd. If your system is configured with inetd, look at /etc/inetd.conf, and remove, or simply prefix with a "#" character to make it a comment, any entry providing a service you don't need.
The second step would be where available, install IP filter or firewall rules. While restricting network access helps, it is no guarantee that you won't be attacked. If you allow itt-tech.edu, you can be attacked from another itt-tech.edu system. But restricting access to a smaller group of systems will reduce the number of attempts you see made against you.
You would configure IPtables or IPchains. You can use one of these to define whose IP addresses you will accept or reject. The rules can be different for incoming and outgoing packets. There are model configurations or scripts which can be installed on a Linux system to define the rules such that only packets originating inside the itt-tech.edu domain are accepted.
The next step involves installing ssh and tcpd. SSH (Secure Shell) is a protocol which supports logging into a remote system or executing commands on a remote system, using an encrypted communication between the two systems. Session encryption protects you from unscrupulous packet sniffers who may have access to one of the networks through which the packets between the two hosts may have to travel.

The tcp wrapper daemon, tcpd, comes as a part of recent Linux installations.
Finally you would need to configure hosts.allow and hosts.deny files for tcpd and sshd. Both ssh and the tcp wrapper tcpd use a pair of configuration files to define what hosts are allowed to make connections to specific TCP services on your machine. Use these to limit access to those services and prevent unwanted intrusion attempts.

References:
Johnson, D. (2014). RPM: Commands and Management. Retrieved from http://www.linux.org/threads/rpm-commands-and-management.5338/ Miscellaneous (2013). Does Linux Need Anti-Virus Software? Retrieved from http://www.futurehosting.com/blog/does-linux-need-anti-virus-software/

Morris, J. (2013). Overview of Linux Kernel Security Features. Retrieved from http://www.linux.com/learn/docs/727873-overview-of-linux-kernel-security- features/

Similar Documents

Premium Essay

Project Wbs

...Diploma of Project Management Manage Project Time Assessment Activities & Exercises Candidate Details Assessment – BSB51407 - Time Please complete the following activities and hand in to your trainer for review. This forms part of your assessment. Name: _____________________________________________________________ Address: _____________________________________________________________ _____________________________________________________________ Email: _____________________________________________________________ Employer: _____________________________________________________________ Declaration I declare that no part of this assessment has been copied from another person’s work with the exception of where I have listed or referenced documents or work and that no part of this assessment has been written for me by another person. Signed: ____________________________________________________________ Date: ____________________________________________________________ If activities have been completed as part of a small group or in pairs, details of the learners involved should be provided below; This activity workbook has been completed by the following persons and we acknowledge that it was a fair team effort where everyone contributed equally to the work completed. We declare that no part of this assessment has been copied from another person’s work with the exception of where we have listed or referenced documents or work and that no part of......

Words: 1504 - Pages: 7

Premium Essay

None

...Course Project Introduction | | In this course, you will have one course project and will require two different assignments – Course Project Part I and Course Project Part II.  This project will test your knowledge of all of the project management tools and techniques that we'll cover in this course.  Before you begin, please review the PM 586 Course Project Tour. [You'll find the link above.]  This audio/visual tool will take you on a "tour" of the project and will highlight many of the logistics and "need to know" information to successfully complete the two parts of the project. In addition, this course project does require use of Microsoft Project.  If you are not familiar with the software or just need a "refresher," please run through the tutorials above or look at the end of the chapters in the textbook for a mini-lesson of the software.  Course Project Description | | Johann Seitz founded the SEITZ Corporation in 1982. The main products of the firm were small- to medium-sized plastic bottles and containers, used mainly in the food and dairy industries. By 1985, the annual sales of the corporation had reached $31 million and the firm enjoyed a dominant market position in the upper Midwest. In 1998, Walter and Teri Seitz, Johann’s grandchildren, assumed the day-to-day operation of the business. Teri Seitz was a somewhat unstructured, but diligent, student of the latest business school theory and decided that in order to meet increased competition,......

Words: 3297 - Pages: 14

Premium Essay

Intl Business

... |Project Management | | |Teaching Location: |(Insert Teaching Location) | | |Program(s): |Bachelor of Applied Management | | |Author: |Alan Labas | | |Level: |Advanced | | | | | | |Semester: |3 , 2013 ...

Words: 3271 - Pages: 14

Premium Essay

Pert Cpm

...Excel worksheet. PERT/CPM TECHNIQUES Task: A. Use the estimates for Company A in Table 1.1 to do each of the following: 1. Determine the expected completion time for each of the ten project activities, showing all of your work. Task Optimistic Time to Complete (weeks) Probable Time to Complete (weeks) Pessimistic Time to Complete (weeks) Expected Time to Complete (weeks) A 2 3 4 3.00 B 5 6 13 7.00 C 3 4 8 4.50 D 10 11 15 11.50 E 4 5 6 5.00 F 8 10 12 10.00 G 4 6 11 6.50 H 8 10 18 11.00 I 3 6 12 6.50 J 2 3 7 3.50 a. Determine the variance for each project activity, showing all of your work. Task Optimistic Time to Complete (weeks) Probable Time to Complete (weeks) Pessimistic Time to Complete (weeks) Variance (weeks) A 2 3 4 0.11 B 5 6 13 1.78 C 3 4 8 0.69 D 10 11 15 0.69 E 4 5 6 0.11 F 8 10 12 0.44 G 4 6 11 1.36 H 8 10 18 2.78 I 3 6 12 2.25 J 2 3 7 0.69 2. Prepare a PERT chart (network diagram) to identify the critical path for project completion. From the above diagram, you will observe that the critical path (a critical path has slack of zero) is shown by Start-B-F-G-I-J-End. 3. Determine each of the following, showing all of your work or reasoning: a. Expected duration of the entire project The expected project duration is the sum total of all critical path activities. B 7.00 F 10.00 G 6.50 I 6.50 J 3.50 Project Duration 33.50 b. Slack for project task A ACTIVITY Earliest Start Earliest......

Words: 1410 - Pages: 6

Premium Essay

Finnish Project Management Championships 2010

...Finnish Project Management Championships 2010 Technical case Case OleanTek: scheduling, resourcing and costs for a new service business launch project OleanTek is a medium-sized technology-based firm with its core business in equipment and system deliveries for large engineering industry clients. Its three strategic customers have increasingly requested maintenance services after the actual equipment and system deliveries, and these services have so far been carried out by the side of other duties by the technical staff. OleanTek’s leaders have noticed that maintenance could be implemented also in the form of more strategic service business that could complement the company’s offering and generate important benefits to other customers, too. OleanTek has decided to invest in a new service business launch project to plan and test four basic service concepts concurrently: corrective maintenance, preventive maintenance, spare parts service, and modernization. The project starts with delimiting the service offering and ends with planning the broader service launch process; the actual marketing and broader launch of new services are excluded from the project. Paul Lander, the maintenance manager, has been selected as project manager for the project. He is well acquainted with OleanTek and its clientele already. Paul has noticed that it is very difficult to plan the project with detail as most of the tasks include a lot of uncertainty due to their ambiguous content and novelty......

Words: 1075 - Pages: 5

Premium Essay

Microsoft Project Tutorial

...CS 587 Software Project Management Instructor: Dr. Atef Bader MS Project Tutorial MS MS Project in Labs: Available in Siegal Hall Lab in Main Campus Available in Room 210 Rice Campus Prepared by Milton Hurtado How to get MS Project ? How Download MS project from following link http://www.microsoft.com/office/project/ Embarking new Project Embarking Go to file, select new. This will open a screen for blank project click ok. You can now enter your project information viz. start date, finish date and also how would you like to schedule the project from either start or finish date. You can also chose selection if you will be using night shifts. Gantt Chart Gantt Select Gantt Chart view from the view menu. You’ll have a spreadsheet where you can now enter information of all the activities i.e. task name, duration, start date, end date, predecessors and various other fields. You can enter required information in two ways, in spreadsheet or when you double click on cell you get pop up window in which you can enter all the information of that particular activity. For predecessor activity you need to write activity number. The SW itself will calculate start and end date. Now the Gantt Chart is complete. Adding tasks and milestones to a Project File Adding 1. 2. 3. 4. 5. 6. On the View menu, click Gantt Chart. In the Task Name field, type a task name, and then press TAB. (Microsoft Project enters an......

Words: 2605 - Pages: 11

Premium Essay

Green Computing Research Project

...EBM680 Q1-2016 Green Computing Research Project Introduction: The purpose of this research project (50% of final grade) is to use a structured approach to project management by practicing and executing a series of project related activities throughout the course. You will execute a series of project tasks that fall within the five major phases of a project. These are individual assignments, be sure to show all work and document references. Instructions and grading parameters are detailed below and under each task. You must follow instructions and formatting requirements as listed below and under task assignment  Submit using MS Office Products (Word, Excel, PowerPoint, Project) as instructed  Include a cover page (where indicated) containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date.  Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; properly document any references used  All Assignments are Uploaded via Moodle Site to correct assignment folder  Must submit each case study by the assignment due date – or points will be deducted  Must be of high quality  These are individual assignments – do your own work The specific course learning outcomes associated with these case studies are:  Apply the concepts, knowledge and process areas of project management in accordance to the Project Management Institute Project Management Body of......

Words: 2228 - Pages: 9

Premium Essay

A&D High Tech

...Case #3 A&D High Tech (A): Managing Projects for Success: A Negative View 1. What is the estimated project completion date? (Assume there are no holidays and ignore the sunk cost of the planning team’s effort) The estimated project completion date is TUE 11/13/13 with duration of 127 days. After leveling and re-allocating work along the project line, the project got delayed for 3 days so that the completion day moved up to FRI 11/21/13 (total duration of 130 days). (MS Project 2007) 2. What is the total cost? How much of the total cost are labor costs? Capital costs? Total Cost: $98,500 + $844,980 = $943,480 Labor Cost: $ 844,980 (given result of project) Capital Cost: (12 Windows 2000 workstations*$3,000) + (5 Window 2000 servers*$12,500) = $98,500 3. What is (are) the critical path(s) in the project? What is the level of risk in completing tasks on the critical path(s)? Explain. The critical path is added to the appendix of this case report. As shown in Figure 1 and 2, many tasks are correlated so that one critical phase can affect the other. Here, we divided the entire process into three parts: namely by “Detailed Design” part (on the left hand of the network diagram), “Create Functional Requirements (upper side),” and “Development & Unit Test (bottom left side).” Even though, we leveled the resource referring on automated re-allocation methods, except for 7 phases in this project, most of the critical stages remained still......

Words: 1284 - Pages: 6

Premium Essay

Manage Your Health Chapter 4-6

...Chapter 4 Task 1. Summarize each of the above-proposed projects in a simple table format suitable for presentation to top management. Include the name for each project, identify how each one supports business strategies, assess the potential financial benefits and other benefits of each project, and provide your initial assessment of the value of each project. Project 1 | Recreation and Wellness Intranet Project | Project goal description | Allow employees to register for company-sponsored recreational programs, such as soccer, softball, bowling, jogging, walking and other sports.Allow employees to register for company-sponsored classes and programs to help them manage their weight, reduce stress, stop smoking, and manage other health related issues.Track data on employee involvement in these recreational and health-management programs.Offer incentive for people to join the programs and do well in them. | Business strategy compliance | This project should contribute to reducing internal costs of the company, as one of the strategic key goals.MYH, Inc. pays 20% more that industry average for employer health care preniums.This add-on to the existing Intranet will help employees improve their health and at the same time, lead to lower health insurance preniums. | Benifits | Net savings of at least $30/employee/year for full-time employees over the next for years.Total financial benefit for 20,000 full-time employees, with $30 saving per employee per year, for 4...

Words: 5320 - Pages: 22

Free Essay

Network

...Textbook/Workbook Assignments • Complete the following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching on page 3 VLSM Subnetting a Subnet Exercises on pages 9-11 VLSM Addressing Design Scenarios 1-6 on pages 15-20 Summary Route Exercises on pages 21-24 Concept Questions on pages 25-27 VLSM Case Study on page 27 Internet Research on page 29 (Use the ITT Tech Virtual Library.) • Complete Chapter 9 Review Questions 2-7, 10, 14, 20-22 on pages 258-259 of Introduction to Telecommunications. Submit your written answers to your instructor at the beginning of Unit 2. . Assignment 1.2: Virtual Labs • Complete Virtual Labs 6, 7, and 8 from the CCNA 640-802 CCNA Simulator, which you can find by clicking through these paths: ICND1 Troubleshooting Scenarios Lab 6: IP Addressing and Routing. ICND1 Troubleshooting Scenarios ICND1 Part 4: Troubleshooting Labs Lab 7: IP Routing I ICND 2 Troubleshooting Scenarios Lab 13: IP Routing II Submit your written answers to your instructor at the beginning of Unit 2. ©ITT Educational Services, Inc: Date: 03/13/09 Network Technology and Service Integration Unit 2 Homework The following homework is designed to cover the course objectives for this unit. Assignment 2.1: Textbook/Workbook Assignments • Complete the following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching on page 70 Vocabulary Exercise: Completion on......

Words: 2825 - Pages: 12

Premium Essay

Nomad

...cmgt 410 PROJECT PLANNING & IMPLEMENTATION [pic] CONTRIBUTORS THE UNIVERSITY GRATEFULLY ACKNOWLEDGES THE CONTRIBUTION OF THE FOLLOWING PROFESSIONALS TO THE COMPLETION OF THIS COURSE. 1. Stephen Northam, MA, Faculty Member, University of Phoenix. 2. Kenneth Sardoni, MCIS, Faculty Member, University of Phoenix. 3. Blair Smith, MBA, Associate Dean, College of Information Systems and Technology. 4. Claudia Avila, BSBA, Curriculum Development Manager, College of Information Systems and Technology. 5. Adam Honea, Ph.D., Dean, College of Information Systems and Technology. Copyright ( 2001 by the University of Phoenix. All rights reserved. The University of Phoenix® and UniModuleTM are marks of Apollo Group, Inc. in the United States and/or other countries. Edited in accordance with University of PhoenixSM editorial standards and practices. (Template U1.0) Overview COURSE DESCRIPTION This course provides the foundation for understanding the broad concepts of successful planning, organization, and implementation within the realm of information technology. This course uses real-world examples and identifies common mistakes and pitfalls in project management. Topics covered include project scoping, estimating, budgeting, scheduling, tracking and controlling. TOPICS AND OBJECTIVES Project Management and the Organization • Define Project Life Cycle. • Identify roles in project management. • Identify project manager's skills. •......

Words: 3448 - Pages: 14

Premium Essay

Case Study

...4 A-1 Use Parts 1, 2 and 3 of the case study in Appendix B, Topic A, named Billing System Conversion Project to develop a communication plan for the conversion project. Identify at least three audiences. Identify all audiences who have an interest in the project (sponsor, team members, and so on). For each audience, describe the type of information that should be communicated (progress, scope changes, costs, and so on) and the level of detail needed. List the frequency of each communication (weekly, monthly, as needed, and so on). Audience: Team Type(s) of information: presentation of project progress Frequency: as needed Audience: client/customer Type(s) of information: report of overall progress, formal briefing Frequency: as needed Audience: Team Type(s) of information: team meeting, group interaction for project Frequency: weekly B-1 Use Parts 1, 2 and 3 of the case study named Billing System Conversion Project, to determine which tasks or deliverables can be purchased from sellers and then determine which ones, if any, you would recommend for seller purchase. The tasks and deliverables that could be outsourced include the training of the team, the update of the system, software install, and the purchase of the new PCs. The only thing I would recommend outsourcing or buying from an external seller would be the PCs so that a price comparison can be done and the company could make the best financial decision. C-1 1. Use Parts 1 and 2 of the......

Words: 465 - Pages: 2

Premium Essay

Service Request Sr-Ht-001

...Graham Grove, 3/22/04 , on Health Insurance Benefits. This memo is located on the Huffman Trucking Intranet site under Human Resources - Communications tab. Expected Results/Impact when completed: Creation of a project plan in Microsoft Project that will be used to manage, track and report the progress of this software development to the management team. Facts About Huffman Trucking Huffman's primary customers include: • U.S. Government • Automotive parts suppliers to major manufacturers • Electronic consumer products • Raw materials (polymer) for manufacturers of plastic products • Any customer requiring special accommodations, such as wine, computers, munitions, etc. Huffman has facilities in: • Cleveland, OH • Los Angeles, CA • St. Louis, MO • Bayonne, NJ Huffman employs: • 925 drivers • 425 support personnel Huffman owns and operates: • 800 road tractors • 2,100 45' trailers • 260 "roll-on/roll-off" units SR-ht-001: Create a Benefits Election System Define Problem 5 days Analyze Situation 15 days Design Solution 10 days Implement Design 20 days Support Product 10 days Define Problem - Understand Organizational Context of Huffman Trucking HR Department - Understand the history of the problem with Benefits tracking System - Identify the team to work on the Implementation project - Discuss Implementation Budget and Schedule - Develop a benefits Implementation Project Charter - "Approval from the Project Sponsors (HR,......

Words: 1123 - Pages: 5

Premium Essay

Red Zuma 2 (Resource Allocation)

...PROJECT MEMO Project Name: Red Zuma Project ------------------------------------------------- Subject: Red Zuma Project Resources and Resource Assignments Introduction: This part of the project deals with identifying and assigning resources and resolving over allocation of resources. Details: Part A 1. Over-allocated Resources As per the resource sheet, resources that are over-allocated are as follows: * 4 Marketing Specialist * 4 Design Engineers * 4 Industrial Engineers 2. Resolve Over-allocation of Resources Assuming that the project is time constrained, resolving over allocation by leveling slack leads to following changes: * Slack time from following tasks is used up for resource leveling. WBS | Task Name | Original Total Slack | Slack after Resource Leveling | 1.3 | Manufacturing Study | 10 | 0 | 1.5 | Detailed Marketing Plan | 179 | 134 | 1.6 | Manufacturing Process | 55 | 0 | 1.9 | Lab Test Prototypes | 9 | 0 | * The four Marketing Specialists are no more over-allocated. * All the tasks having slack (in the initial schedule) have been re-scheduled for resource leveling. 3. Impact of leveling within slack The ‘Manufacturing Process task’ and ‘Lab Test Prototype task’ do not have slack and are now on the critical path. Since more tasks are on the critical path as compared to the earlier network, it has become more sensitive due to leveling within slack. 4. Resource......

Words: 574 - Pages: 3

Premium Essay

Loyality Card

...Loyalty Card Program for IGA Supermarket Chain Submitted to: Dr Frank Moisiadis Name: Karan Singh, Unit name: Project management Jaspreet Chauhan, And Information technology Amrit Singh, Manpreet Singh, Narinder Kaur Student No:-4534788, 4534822, 4534666, 4535158, 4523360 Submitted to: Dr Frank Moisiadis Name: Karan Singh, Unit name: Project management Jaspreet Chauhan, And Information technology Amrit Singh, Manpreet Singh, Narinder Kaur Student No:-4534788, 4534822, 4534666, 4535158, 4523360 Content 1.1 Introduction and Executive Summary 1.2 Scope 1.3 Aims and objective 2. Methodology 3. Work Break down Structure 3.1 Advertisement 4. Organization breakdown structure 5. Responsibility Matrix 6. Project duration and Calendar 7. Gantt Chart 8. Cost and budget for the project according to WBS 9. Risk register 10. Conclusion 1.1 Introduction and Executive Summary Independent Grocers of Australia (IGA) is a chain of supermarkets in Australia. It is the local variant of the international American-based Independent Grocers Association. Its main competitors are Woolworths, Coles, Foodland, Aldi. With concerned that IGA have been losing market share to Woolworths, Aldi and Coles, the IGA supermarket......

Words: 2402 - Pages: 10