Preview

IS3230 Final Project

Satisfactory Essays
Open Document
Open Document
687 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3230 Final Project
Sheldon Cooper
IS3230
Final Project

Integrated Distributors Incorporated is facing a lot of challenges. The IT infrastructure has a lot of outdated hardware and software in multiple locations. This greatly increases security risks and exposes confidentiality, integrity, and availability. Some network compromises have ensued due to the outdated hardware and software. Sensitive and strategic information has been leaked to the public and it is time we put an end to this.
End users are the number one security risk and must be dealt with first. In order to accomplish this goal, the company will need to replace the old, outdated systems with new, up-to-date systems. Dell is the optimal company to pursue these systems as they have a full support system that comes with the workstations.
All networking components will need to be upgraded next as the current system is not very secure or reliable. I suggest going with a full cisco infrastructure and maintaining physical security by putting all of the switches in racks. Upgrading the infrastructure to a unified cisco presence will also scale into phone systems as well with VOIP options. This will also allow a unified presence with instant messenger and meetings online as well. A Cisco VPN will also be installed for remote access controls.
The entirety of the network will have to be protected with Barracuda Firewalls as the threat to intrusion is rather high judging the frequency of the preceding attacks. The company will need to do a cost management analysis to this, however from my understanding, with the increased efficiency; we will be looking to come out on top after a three year return of investment on this purchase. I fully recommend we look at putting a honeypot somewhere in the DMZ so we can monitor how hackers attempt to gain access and thwart their efforts in the future. The Warsaw, Poland location, we must find a new proxy server to replace the IBM Infinity hardened server.
The decentralization of

You May Also Find These Documents Helpful

  • Good Essays

    Is3110 Unit 4

    • 406 Words
    • 2 Pages

    If the project is completed on time then there is no risk for completion. All of the regular risks that apply to a project built on time apply to this one regardless of whether you are building a new infrastructure or modifying an older one. If the project is finished one month early, the quantitative risk really does not exist. It is basically comparable to completing the project on time. Since the project is quoted at 3 million dollars it will stay the same regardless of how fast the project is finished. However, you may see differences. When you rush a project this large you could possibly cut corners or receive poor quality results. If the project is finished two months late there are additional risks. If the company expects to make $20 million dollars annually, and assuming that the 4% penalty is levied against this yearly figure and not within smaller period of time, one month late means that US Industries Incorporated loses $800,000 annually. There doesn't appear to be any additional risk, however, further penalties and the possible eventual loss of the contract to a competitor could result in a poor product. There again appears to be no real quantitative risk involved if the project is finished a month early with the security requirements. If the originally quoted $3 million dollars remains the same regardless of how fast the project is finished and not coupled with hourly or daily wages, then there is nothing to lose financially. However the companies go beyond the required 1.5% completion benchmarks that the contract demands. Rushing a project of this scale also comes with rushed results possibly cut corners or poor quality. The credibility of the company is at stake with such a high profile, high income project such as this, and it is important to use all of the time available to ensure the best product is on display for any customer. The finished project should meet both the time and security requirements but not the service agreement. There does not…

    • 406 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Mutandum Corporation Case

    • 963 Words
    • 4 Pages

    There are numerous reasons to retire our computer technology. Some systems become obsolete due to current technological advances. Some are replaced because they become infected with viruses or otherwise no longer function properly. And others simply just don’t meet the requirements of our business. In order to retire these systems in an efficient, safe and economical manner, we must take into consideration numerous factors that would otherwise but our business at risk. The following policy includes the implementation of recommendations that will keep sensitive information secure while ensuring that we remain in compliance with federal regulations all the while keeping to our business model centering on efficiency.…

    • 963 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    | * Patch history * VPN * Firewall * Stateful Inspection * Whitelists-Blacklists * Boundary Encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    upgrade its IT infrastructure to ensure it is capable of handling the requirements of the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Better Essays

    These standards and procedures apply to all information systems and resources under the control of Corporation Tech, including all computers connecting to the Corporation Tech network and all Corporation Tech System employees, contractors, and any other individuals who use and/or administer those systems and computers, particularly those involved with information system management.…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms.…

    • 991 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Com 135 Week 5 Analysis

    • 678 Words
    • 3 Pages

    Both companies have experienced data breaches in the past and do not want to have them in the future. A2Z has hired you to do a security analysis of its new network and to recommend how it can be set up in a secure manner. It has budgeted for a capital expenditure (outside of man hours) of $250,000 for hardware and software and $25,000 every year for additional security…

    • 678 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    This policy applies to all IDI Stakeholders, Committees, Departments, Partners, Employees of IDI (including system support staff with access to privileged administrative passwords), contractual third parties and agents of the Council with any form of access to IDI’s information and information systems.…

    • 1356 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Update all anti-virus software Security Policy needs to be documented and implemented Weak user passwords need to be strengthened Proper security personnel Wrong building fire protection needs corrected Remote access needs to be hardened with VPN restrictions II. No Plan…

    • 186 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Final Project EN3220

    • 2234 Words
    • 7 Pages

    Methamphetamines (Meth) cause a wide array of problems with its users, a lot of which are permanent. Meth’s affects range from neurological issues, alertness, paranoia, and aggression. It also leads to psychological and physical disorders. Because Meth is a stimulant, it can cause the user to be up for days and even weeks at a time causing stress to the body and can result in over exerting oneself and inevitably something will give. Personal problems from users will be talked about, as well as scientific studies on the Meth epidemic.…

    • 2234 Words
    • 7 Pages
    Better Essays
  • Good Essays

    As far as the network goes I would first suggest switching it to a LAN or local area network. This type of network is far more beneficial than the current setup as it gives you room to expand without too much of a hassle. By upgrading to this type of network you will also save money as you will be able to share hardware such as printers through multiple stations. As far as security goes, all computers will be more secure, as they will be a client of a main host on the server which will be hard to break through its firewalls. Communication will very time efficient through an Instant Messaging program through the network, your co-workers will be able to chat quickly through this. The system monitor will be able to monitor the chat to make sure its appropriate for work as well. Storage back up is another great thing on this network, from the main computer you will be able to back up all computers on the network with a click of the mouse. This makes it easy for the System Administrator to keep all the systems running efficiently. Now let’s talk about the wiring (Dean, 2010).…

    • 623 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The first change I would suggest would be to setup a client/server network in which all 20 computers are connected to the main the computer. In this case, we would add another computer to use as the main workstation and central server so we would actually have 21 computers. We could just connect them all with cat 5 cables since there are only 20 clients but if the company could afford it, I would advise them to go with fiber optic cables to reduce noise and interference from the outside. It is important to move away from the peer to peer network that Ocper, Inc. currently has to a centrally controlled network. This will provide more security and better efficiency.…

    • 703 Words
    • 3 Pages
    Satisfactory Essays