Preview

Access Control FInal Project

Powerful Essays
Open Document
Open Document
1206 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Access Control FInal Project
ITT Technical institute – isc program
Project: Access Control Proposal
IS3230 - Access Control

Bernard Downing
David Crenshaw
/2014

1 INTRODUCTION
1.1 Title of the project
Access Control Proposal Project for IDI
1.2 Project schedule summary
The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms.
1.3 Project deliverables
• Solutions to the issues that specifies location of IDI is facing
• Plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability
• Assessment of strengths and weaknesses in current IDI systems
• Address remote user and Web site user’s secure access requirements
• Proposed budget for the project—Hardware only
• Prepare detailed network and configuration diagrams outlining the proposed change
1.4 Project Guides
Course Project Access Control Proposal Guide
Juniper Networks Campus LAN Reference Architecture
1.5 Project Members
David Crenshaw, IT Architect and IT Security Specialist
Members of the IT Staff

1.6 Purpose
A proposal for improving IDI’s computer network infrastructure is the purpose for this proposal. This project is intended to be used by IDI’s information security team to developing a plan to improve IDI’s computer network infrastructure at multiple locations.
1.7 Goals and Objectives
Objective 1
To assess the aging infrastructure and then develop a multi-year phased approach to have all sites (except for JV and SA) on the same hardware and software platforms.
Objective 2
The core infrastructure (switches, routers, firewalls, servers and etc.) must capable of withstanding 10 – 15% growth every year for the next seven years with a three-to-four year phased technology refresh cycle.
Objective 3
Solutions to the issues that the specifies location of IDI is facing
Objective 4
Assessment of strengths and weaknesses in current IDI systems
Objective 5
Address remote user and Web site

You May Also Find These Documents Helpful

  • Powerful Essays

    A new independent company has recently purchased Tony’s Chips and the new leadership has decided to move the website to an internally hosted site instead of the current external hosted site. The new leadership is also requiring that a back-up site is available as they are very concerned about redundancy for the site. In addition to the migration of the website from an external host to an internal host the website will need to be redesigned in order to allow customers to order and purchase products online. In order to build the architecture, migrate the existing website along with adding the ability for the customers to place orders online and providing for redundancy of the site the system development life cycle (SDLC) will be used. The SDLC consists of five phases that will be utilized in this project and the five phases are systems planning, systems analysis, systems design, systems implementation, and systems support and security.…

    • 2777 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Bsa 375 Sr-Rm-022 Part 1

    • 1418 Words
    • 6 Pages

    Key stakeholders will include the end users of each system that is in use at this time. This can be organized into a JAD session for each area to acquire the information in a brain storming environment instead of the feeling of an interrogation. The…

    • 1418 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Good Essays

    Assignment 4 Nt2580

    • 485 Words
    • 2 Pages

    1. Secure remote access standard will be strictly controlled. Control will be enforced by a one-time password authentication and minimum 7 character length, special character and 1 numerical character with 1 month expiration.…

    • 485 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cis 210 Research Paper

    • 1323 Words
    • 6 Pages

    Whether you are planning to implement a new site or upgrading an existing site to meet growing needs, the following provides guidelines for meeting the performance and availability demands of today’s online business environment. The mature business site is multi-tiered, with several hardware components,…

    • 1323 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Fast Streaming A collection of techniques that enables Windows Media Player to begin displaying streamed multimedia content more quickly.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    1. Where can you store your public keys or public certificate files in the public domain? Is this the same thing as a Public Key Infrastructure (KI) server?…

    • 943 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Nt2580 Final Project

    • 1848 Words
    • 6 Pages

    Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system.…

    • 1848 Words
    • 6 Pages
    Better Essays
  • Good Essays

    For the recommendations on the tiered architecture I suggest three-tier architecture. This architecture is the most common. It consists of three tiers; a presentation tier, a logic tier, and a data tier…

    • 429 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    With the development of the new system, time is vital in designing of the new program. In addition, developing a whole new system or keeping the current system along with additional new features for Riordan Manufacturing can be costly. Therefore, the IT department would have to propose a system where it can take the current tools and the new features and compile them into a single web-based or dashboard application. The design of the new system can be achieved by taking advantage of a beneficial software system called Rapid Application Development (RAD). RAD "refers to a type of software development life cycle which uses minimal planning in favor of rapid prototyping" (Wikipedia, 2009) The benefits of the software are that during the planning stages, the software writes itself along with providing speed and flexibility. Furthermore, the IT department can review and define with the employees the business requirements for the system by using the Joint Application Development (JAD). JAD is also used in the SDLC that collects business requirements for the system. According to Wikipedia, the JAD process also includes approaches for enhancing user participation, expediting development, and improving the quality of specifications…

    • 1494 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Unit 53 Essay

    • 4323 Words
    • 18 Pages

    scheduled for release in October 2011 to provide the repeatable process for doing solution architecture.…

    • 4323 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Executive summary Introduction and scope Current state assessment Vendor analysis Peer analysis overview Solution options assessment Findings Conclusion Appendix A: Detailed solution options assessment 2 7 10 15 19 21 28 32 34…

    • 13276 Words
    • 54 Pages
    Powerful Essays