Preview

IS3230 Access Security Final Project

Good Essays
Open Document
Open Document
991 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3230 Access Security Final Project
Project schedule summary
The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms.
Project deliverables
• Solutions to the issues that the specifies location of IDI is facing
• Plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability
• Assessment of strengths and weaknesses in current IDI systems
• Address remote user and Web site user’s secure access requirements
• Proposed budget for the project—Hardware only
• Prepare detailed network and configuration diagrams outlining the proposed change
• Prepare a 5 to 10 minute PowerPoint assisted presentation on important access control infrastructure, and management aspects from each location.
Project Guides
Course Project Access Control Proposal Guide
Juniper Networks Campus LAN Reference Architecture

Project Members
Members of the Technology Staff
Goals and Objectives
• 1st Objective
To assess the aging infrastructure and then develop a multi-year phased approach to have all sites (except for JV and SA) on the same hardware and software platforms.
• 2nd Objective
The core infrastructure (switches, routers, firewalls, servers and etc.) must capable of withstanding 10 – 15% growth every year for the next seven years with a three-to-four year phased technology refresh cycle.
• 3rd Objective
Solutions to the issues that the specifies location of IDI is facing
• 4th Objective Assessment of strengths and weaknesses in current IDI systems
• 5th Objective
Address remote user and Web site user’s secure access requirements
• 6th Objective
Prepare detailed network and configuration diagrams outlining the proposed change
• 7th Objective1
Prepare a 5 to 10 minute PowerPoint assisted presentation on important access control infrastructure, and management aspects from each location.
• 8th Objective
A comprehensive network design that will incorporate all submitted

You May Also Find These Documents Helpful

  • Powerful Essays

    A new independent company has recently purchased Tony’s Chips and the new leadership has decided to move the website to an internally hosted site instead of the current external hosted site. The new leadership is also requiring that a back-up site is available as they are very concerned about redundancy for the site. In addition to the migration of the website from an external host to an internal host the website will need to be redesigned in order to allow customers to order and purchase products online. In order to build the architecture, migrate the existing website along with adding the ability for the customers to place orders online and providing for redundancy of the site the system development life cycle (SDLC) will be used. The SDLC consists of five phases that will be utilized in this project and the five phases are systems planning, systems analysis, systems design, systems implementation, and systems support and security.…

    • 2777 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Bsa 375 Sr-Rm-022 Part 1

    • 1418 Words
    • 6 Pages

    Key stakeholders will include the end users of each system that is in use at this time. This can be organized into a JAD session for each area to acquire the information in a brain storming environment instead of the feeling of an interrogation. The…

    • 1418 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Tipton, H. F., & Krause, M. (n.d, n.d n.d). Access Control Principles and Objectives. Retrieved November 29, 2013, from cccure.org: https://www.cccure.org/Documents/HISM/003-006.html…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    8. Access control: Focuses on business requirement for access control, user access management, user responsibilities, network access control, operating system access control, application and information access control, and mobile computing and teleworking…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Powerful Essays

    You work for a large corporation with several branch offices that have varying requirements in regards to security. Your boss has informed you that a new branch office is in need of a…

    • 103696 Words
    • 415 Pages
    Powerful Essays
  • Powerful Essays

    Review the chosen exploration and create a 10- to 12-slide PowerPoint® presentation with following items. Online Campus students must submit a 10- to 12-slide PowerPoint® presentation with presenter notes. Be sure to include the following in your presentation.…

    • 2163 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    In order to reduce the risks and vulnerabilities of each location, we must implement access control to ensure confidentiality, integrity, and availability. For the Billing, Montana location we have to consolidate 14 Hewlett Packard Unix servers to 1 UNIX server. Upgrade 75 Microsoft Windows servers to Windows server 2008 R2. Upgrade MS exchange e-mail to latest version. We must find another software vendor to replace Oracle financials for accounting and financial systems, Logisuite 4.2.2, and RouteSim. We have to hire developers to standardize the office automation hardware and software. Convert telecommunications system to a VOIP system. Design and implement a new Acceptable Use Policy (AUP) and upgrade WAN to a T1 MPLS to increase bandwidth. The Warsaw, Poland location, we must…

    • 622 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    o For Local Campus students, these are 20-minute oral presentations accompanied by Microsoft® PowerPoint® presentations.…

    • 454 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Executive summary Introduction and scope Current state assessment Vendor analysis Peer analysis overview Solution options assessment Findings Conclusion Appendix A: Detailed solution options assessment 2 7 10 15 19 21 28 32 34…

    • 13276 Words
    • 54 Pages
    Powerful Essays
  • Satisfactory Essays

    O. Mobile employee needs secure browser access to sales order entry system. (Remote Access 3…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Firewall Security

    • 2313 Words
    • 10 Pages

    This reports looks at what a firewall is, and how it works. It also looks at what security risks can be stopped by a firewall in a computer system.…

    • 2313 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    • Define IT infrastructure and describe its components. • Identify and describe the stages and technology drivers of IT infrastructure evolution. • Assess contemporary computer hardware platform trends.…

    • 2427 Words
    • 22 Pages
    Powerful Essays
  • Best Essays

    Orange county government-anywhere USA, requested the services of a Home Land Security Specialist to assist in the collaborative, assessment, development and strategic enhancement of it municipality’s Information Technology (IT) and Critical Facilities’ (CF) upgrades and security. Upon the completion of plan, expectations and deliverables, a series of introductions with Directors, Managers and Supervisors, it was apparent the federal dollars associated with the project was indeed the motive for the invitation. In my initial general assessment and development of a strategy, the organization handbook was the first critical reading which uncovered a mission statement, values, ethical guidelines and the organizational cultural premise.…

    • 1793 Words
    • 8 Pages
    Best Essays
  • Good Essays

    This requires the creation of a technological infrastructure plan and an architecture board that sets and manages clear and realistic expectations of what technology can offer in terms of products, services and delivery mechanisms. The plan should be regularly updated and encompasses aspects such as systems architecture, technological direction, acquisitions plans, standards, migration strategies and contingency. This enables timely responses to changes in the competitive environment, economies of scale for information systems staffing and investments as well as improved interoperability of platforms and applications.…

    • 1496 Words
    • 6 Pages
    Good Essays