Preview

IS3230 Access Security Final Project

Good Essays
Open Document
Open Document
991 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3230 Access Security Final Project
Project schedule summary
The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms.
Project deliverables
• Solutions to the issues that the specifies location of IDI is facing
• Plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability
• Assessment of strengths and weaknesses in current IDI systems
• Address remote user and Web site user’s secure access requirements
• Proposed budget for the project—Hardware only
• Prepare detailed network and configuration diagrams outlining the proposed change
• Prepare a 5 to 10 minute PowerPoint assisted presentation on important access control infrastructure, and management aspects from each location.
Project Guides
Course Project Access Control Proposal Guide
Juniper Networks Campus LAN Reference Architecture

Project Members
Members of the Technology Staff
Goals and Objectives
• 1st Objective
To assess the aging infrastructure and then develop a multi-year phased approach to have all sites (except for JV and SA) on the same hardware and software platforms.
• 2nd Objective
The core infrastructure (switches, routers, firewalls, servers and etc.) must capable of withstanding 10 – 15% growth every year for the next seven years with a three-to-four year phased technology refresh cycle.
• 3rd Objective
Solutions to the issues that the specifies location of IDI is facing
• 4th Objective Assessment of strengths and weaknesses in current IDI systems
• 5th Objective
Address remote user and Web site user’s secure access requirements
• 6th Objective
Prepare detailed network and configuration diagrams outlining the proposed change
• 7th Objective1
Prepare a 5 to 10 minute PowerPoint assisted presentation on important access control infrastructure, and management aspects from each location.
• 8th Objective
A comprehensive network design that will incorporate all submitted

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    A new independent company has recently purchased Tony’s Chips and the new leadership has decided to move the website to an internally hosted site instead of the current external hosted site. The new leadership is also requiring that a back-up site is available as they are very concerned about redundancy for the site. In addition to the migration of the website from an external host to an internal host the website will need to be redesigned in order to allow customers to order and purchase products online. In order to build the architecture, migrate the existing website along with adding the ability for the customers to place orders online and providing for redundancy of the site the system development life cycle (SDLC) will be used. The SDLC consists of five phases that will be utilized in this project and the five phases are systems planning, systems analysis, systems design, systems implementation, and systems support and security.…

    • 2777 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Bsa 375 Sr-Rm-022 Part 1

    • 1418 Words
    • 6 Pages

    Key stakeholders will include the end users of each system that is in use at this time. This can be organized into a JAD session for each area to acquire the information in a brain storming environment instead of the feeling of an interrogation. The…

    • 1418 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Tipton, H. F., & Krause, M. (n.d, n.d n.d). Access Control Principles and Objectives. Retrieved November 29, 2013, from cccure.org: https://www.cccure.org/Documents/HISM/003-006.html…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Cis 210 Research Paper

    • 1323 Words
    • 6 Pages

    Choose highly available and manageable system platforms. Make sure that the foundation for the various components is as robust as possible, while creating an operating environment in which you can manage constantly. All of the critical components of the site should be built on platforms that optimize the availability and manageability of the total solution. The combined hardware/software platform should keep downtime of all kinds low – including unplanned failures and planned, administrative downtime. Requirements are a high mean time between failures for all hardware components, fast recovery from outages when they do occur, good administrative tools and policies for system maintenance, and support for online administrative activities where…

    • 1323 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Project Pt 1

    • 338 Words
    • 2 Pages

    1.) User domain proposal: Track and monitor abnormal employee behavior and use of IT infrastructure during off-hours. Begin IT access control lockout procedures based on Acceptable use policy (AUP) monitoring and compliance.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    You work for a large corporation with several branch offices that have varying requirements in regards to security. Your boss has informed you that a new branch office is in need of a…

    • 103696 Words
    • 415 Pages
    Powerful Essays
  • Satisfactory Essays

    o For Local Campus students, these are 20-minute oral presentations accompanied by Microsoft® PowerPoint® presentations.…

    • 454 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Executive summary Introduction and scope Current state assessment Vendor analysis Peer analysis overview Solution options assessment Findings Conclusion Appendix A: Detailed solution options assessment 2 7 10 15 19 21 28 32 34…

    • 13276 Words
    • 54 Pages
    Powerful Essays
  • Satisfactory Essays

    O. Mobile employee needs secure browser access to sales order entry system. (Remote Access 3…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Firewall Security

    • 2313 Words
    • 10 Pages

    This reports looks at what a firewall is, and how it works. It also looks at what security risks can be stopped by a firewall in a computer system.…

    • 2313 Words
    • 10 Pages
    Better Essays
  • Best Essays

    Orange county government-anywhere USA, requested the services of a Home Land Security Specialist to assist in the collaborative, assessment, development and strategic enhancement of it municipality’s Information Technology (IT) and Critical Facilities’ (CF) upgrades and security. Upon the completion of plan, expectations and deliverables, a series of introductions with Directors, Managers and Supervisors, it was apparent the federal dollars associated with the project was indeed the motive for the invitation. In my initial general assessment and development of a strategy, the organization handbook was the first critical reading which uncovered a mission statement, values, ethical guidelines and the organizational cultural premise.…

    • 1793 Words
    • 8 Pages
    Best Essays
  • Powerful Essays

    • Define IT infrastructure and describe its components. • Identify and describe the stages and technology drivers of IT infrastructure evolution. • Assess contemporary computer hardware platform trends.…

    • 2427 Words
    • 22 Pages
    Powerful Essays
  • Good Essays

    This requires the creation of a technological infrastructure plan and an architecture board that sets and manages clear and realistic expectations of what technology can offer in terms of products, services and delivery mechanisms. The plan should be regularly updated and encompasses aspects such as systems architecture, technological direction, acquisitions plans, standards, migration strategies and contingency. This enables timely responses to changes in the competitive environment, economies of scale for information systems staffing and investments as well as improved interoperability of platforms and applications.…

    • 1496 Words
    • 6 Pages
    Good Essays