Preview

Designing Security for Fabrikam

Powerful Essays
Open Document
Open Document
5277 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Designing Security for Fabrikam
DESIGNING SECURITY FOR FABRIKAM, INC.
This case study is a practical application of all of the knowledge you have acquired from your courses in the networking curriculum over the past two years. It will allow you to demonstrate both your knowledge and experience in networking both academically and hands-on. It will also allow you to draw on what you have learned as you worked your way through the online Microsoft IT Academy Security course. It is intended to be used as first a mid-term examination and then will also be continued as your end of class project and final exam. It presents a thorough review of concepts and applications presented in courses you have taken while at JSRCC. To complete this case study, read the scenario below and perform the tasks that follow. You will perform many of these tasks in teams of two but your final reports will be written individually. In addition to your analysis you are required to submit a formal written proposal that makes specific recommendations. You will be provided additional instructions regarding the format of your project report and other requirements.

Scenario
Fabrikam, Inc. is a midsized company that specializes in the manufacture of industrial fabric and insulating products. Fabrikam is planning an upgrade from its current Microsoft Window 2003 Server and Exchange Server 2003 environment to Windows Server 2008 R2 and Exchange Server 2007. One of the goals of the project to is to improve security over the current standards at Fabrikam. You have been hired as a consultant to work with the upgrade team to help ensure an upgraded Windows Server 2008 R-2 network infrastructure that is both secure and functional. Specifically, you have been asked to create a proposal containing specific recommendations for moving forward with a planned upgrade to Windows Server 2008 R2 and to restructure the network environment to provide enhanced security. You have already collected and compiled information about the company and

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

     Importance • Significant amount of supplemental information IS4799 Information Systems and Cybersecurity Capstone Project © ITT Educational Services, Inc. All rights reserved. Page 4 Key Concepts  Clarification • Additional information to clarify RFP contents…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Better Essays

    Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document.…

    • 6754 Words
    • 32 Pages
    Satisfactory Essays
  • Good Essays

    Mansfield, k. and atonakos, j., 2009.computer networking from lans to wans hardware, software, and security. (online). USA: Cengage Learning…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Apply network management and security techniques using the FCAPS process. IS3120 Network Communications Infrastructure © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Fault management—SNMP alarms  Configuration management—change control board and procedures  Administration management—asset and inventory management  Performance management—WAN bandwidth and capacity planning  Security management—network infrastructure C-I-A IS3120…

    • 599 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    ShortAnswer

    • 544 Words
    • 2 Pages

    NT1210: Introduction to Networking_V1.0 > Week 1 > Submit Short Answer Assessment > Short Answer…

    • 544 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Movies are a special tool that can keep one company when they are in a moody situation. It is a contrivance that is being used almost all over the world by different types of people for a particular purpose. There are diverse film genres like comedy, action, family, musical, and romance that are being produced each year in the twenty-first century but however, the twentieth century has contributed various types of classic films such as King Kong, Annie Hall, which can never be forgotten. Director Nicholas Ray became immersed in the left-wing Theatre of Action which brought him in touch with Elia Kazan, as well as various federal theater programs. He also became a devotee of southern folk music, which led to close associations with Alan Lomax and such singers as Lead belly, Woody Guthrie, and Josh White and a weekly radio show for CBS in the early ’40s that developed into wartime work for the Voice of America under John Houseman (Rosenbaum, par 3). Ray has directed more than one motion picture, but one of the talkie…

    • 1421 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Employing various tools and devices for determining the quality of IT project plans and systems leads to the use of the best practices. Best practices in IT project management summons for various elements and functions that are required and highly instrumental in ensuring the success and development of IT project plans. The best practices approach also requires the review of best practices in order to map out future trends that might are highly appropriate for future situations taking the organization one step ahead of its competitors. Some state that business practices don’t really mean anything anymore. Opinions state that these days it seems like anyone who can pick up a keyboard is issuing best practices. Plus, just because you wrote something doesn’t necessarily mean that it’s always the best of ideas. I think that some of the reasoning behind Arkansas’ ‘Best Practices’ is for the most part stemming from their avid experience. Project Management isn’t just about controlling schedules and costs. Before the execution of any project, an organization must be assured that the project is a wise investment of money and resources, and that it fits with other initiatives. IT departments must be able to deliver each project to the original specifications. Project Management also defines the business controls for delivering within scope. Leading companies launched and maintained successful IT projects by increasing growth and taking advantage of revenue opportunities, improving customer service, gaining strategic advantages over competitors, and becoming better aligned with business needs. Most agencies in Arkansas are required to submit a summation of their project management methodology. All projects are unique and take on different forms that present many degrees of uncertainty. It is important to have a defined formal structure for…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Cisco

    • 2288 Words
    • 10 Pages

    OPRE 6366.502 Cisco Systems Case Study Report Assignment 1 DUE DATE: SUBMISSION DETAILS: MIDNIGHT on Wednesday, December 12, 2012 Your report must be fully contained within one file and submitted through eLearning. Your report will only be accepted through eLearning. Plan accordingly and wisely. Reports submitted after the due date will receive a 10% grade penalty for each day it is late. The time stamp on your eLearning submission will determine the late penalty. 1) This report will be completed in groups. The groups are listed on the last page of this assignment. 2) Read the entire assignment carefully. All the details you need to successfully fulfill the requirements of the assignment are provided. Each group member will be required to submit to the instructor a hand-written Peer-Review Input form for each of the other group members. The Peer-Review Input form will be available on eLearning. Completed forms may be submitted in hard-copy format or as a scanned file emailed to sonialeach@utdallas.edu. The case study report will be graded based upon the following components: quality of information presented; quality of the insights and related discussions; quality of the contingency plans suggested; group size; and, adherence to the instructions provided. Individual grades will be determined on the basis of two components: the case study report grade and the peer-review input from the other group members.…

    • 2288 Words
    • 10 Pages
    Powerful Essays