Sunday, May 26, 2019
Final Exam Essay
INTRODUCTION1.1 Title of the projectAccess Control final cause Project1.2 Project schedule compendThe project will be a multi-year phased approach to have altogether sites (except JV and SA) on the same hardware and software platforms. 1.3 Project deliverables Solutions to the issues that the specifies location of IDI is face up Plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability sagacity of strengths and weaknesses in current IDI clays Address remote user and Web site users secure access requirements Proposed budget for the projectHardware only Prepare detailed web and constellation diagrams outlining the proposed change Prepare a 5 to 10 minute PowerPoint assisted presentation on important access control infrastructure, and management aspects from each location.1.4 Project GuidesCourse Project Access Control Proposal GuideJuniper Networks Campus LAN Reference Architecture1.5 Project MembersMembers of the Techn ology StaffPhil Kurutz, IT Architect and IT Security SpecialistNathan Gleed, Chief Information Officer (CIO)1.6 single-valued functionThis project is done as a part of fulfillment of the course IS404 (Access Control, Authentication, and Public Key Infrastructure). It is a proposal for improving IDIs estimator engagement infrastructure. This project is intended to be used by IDIs information security team to developing a plan to improve IDIs computer network infrastructure at multiple locations.1.7 Goals and quarrys 1st ObjectiveTo assess the aging infrastructure and then develop a multi-year phased approach to have all sites (except for JV and SA) on the same hardware and software platforms. 2nd ObjectiveThe core infrastructure (switches, routers, firewalls, servers and etc.) must capable of withstanding 10 15% growth all(prenominal) year for the next seven years with a three-to-four year phased technology refresh cycle. 3rd ObjectiveSolutions to the issues that the specifies location of IDI is facing 4th ObjectiveAssessment of strengths and weaknesses in current IDI systems 5th ObjectiveAddress remote user and Web site users secure access requirements 6th ObjectivePrepare detailed network and configuration diagrams outlining the proposed change 7th ObjectivePrepare a 5 to 10 minute PowerPoint assisted presentation on important access control infrastructure, and management aspects from each location. 8th ObjectiveA comprehensive network design that will incorporate all submitted requirements and release for projected growth. 9th ObjectiveFinal testing of all installed hardware, software, and network connectivity. 10th (Final) ObjectiveInitialization of the entire network and any last minute configuration adjustments to have the network up and operating within all specified ranges.2 Risks and Vulnerabilities2.1 OverallThere is a hodgepodge of servers, switches, routers, and internal hardware firewalls. from each one of the organizations locations is ope rating with different information technologies and infrastructureIT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their several(prenominal) locations. The information technology infrastructure is aging and many locations are running on outdated hardware and software. Also, the infrastructure is woefully out-of-dated in terms of patches and upgrades which greatly increase the risk to the network in terms of confidentiality, integrity, and availability.2.2 Billings, MontanaLogisuite 4.2.2 has non been upgraded in almost 10 years. Also, over 350 modifications have been made to the core locomotive and the license agreement has expired. Progressive upgrading to the current version will be required. As a result, re brisking this product will be extremely bell and time-prohibitive. RouteSim is a destination delivery program used to simulate routes, costs, and profits. It is not integrated into Logisui te or Oracle financials to take advantage of the databases for real-time currency military rating and profit or loss projections. IDIs office automation hardware and software has not been standardized. Managers have too much liberty to buy what they involve according to personal preferences. Other software problems include early versions of MS Office 5, WordPerfect7.0, and PC-Write that are not compatible. Telecommunications has not been since the company moved its current home 15 years ago. This has left manyof the new features for telecommunications lacking and not integrated with the customer service database to improve call management efficiency. The generic system was acquired from a service provider who is now out of business. Policies for personal devices are being ignored by many of the executives who have local administrators install the clients on their unsupported, non-standard personal laptop computers and workstations that interface with the internet. These devices Th e original WAN was designed by in the early 2000s and has not been upgraded. During peak periods, usually between kinsfolk and March, the capacity is insufficient for the organization resulting in lost internet customers which further reduces growth and revenue. Telecommunications works through a limited Mitel SX-2000 private automatic first exchange (PABX) that only provides voice mail and call forwarding.2.3 Warsaw, PolandThis is the largest office based on number of employees, strategically located to assist IDI for major growth in the Middle East and Asia, and the home portal for expansion and geographical client development, yet there is insufficient computing power to stay afloat on a day-to-day basis.The primary freight forwarding application is almost 10 years old and does not interface with the McCormack dodge accounting and finance system There are 6 Web servers (4 are primary and 2 fail during clustered load balancing)The cafeteria sponsors a public wireless network run ning WPA (Wi-Fi Protected Access) with no password protection. Telecommunications is an 8 year old Siemens Saturn series PBX, some of whose features have become faulty.The desktop phones have not been replaced or upgraded during this time. There is a lack of separation of duties between the network operations and the accounts receivable department and there is evidence of nepotism and embezzlement.3 Proposed Budget4 IDI Proposed Solutions4.1 Billings, MontanaConsolidate 14 Hewitt-Packard (HP) UNIX servers to 1 UNIX serverUpgrade 75 Microsoft (MS) Windows servers to Windows server 2008 R2Upgrade MS exchange e-mail to latest version surface another software vendor to replace Oracle financials for accountingand financial systems, Logisuite 4.2.2, RouteSimHire developers to standardize the office automation hardware and software.Convert telecommunications system to a VOIP systemDesign and implement a new Acceptable Use Policy (AUP)Upgrade WAN to a T1 MPLS to increase bandwidth4.2 Warsaw , PolandFind a new proxy server to replace the IBM Infinity hardened servedHire a new in-house application developerConvert the Siemens Saturn series PBX telecommunications system with desktop phones to a VOIP systemEnforce the current Acceptable Use Policy (AUP)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.