Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Is strayer university any good

17/11/2021 Client: muhammad11 Deadline: 2 Day

This assignment consists of three (3) sections: a written project plan, a revised Gantt chart or project plan, and a project plan PowerPoint presentation. You must submit the three (3) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

While taking all business and project parameters into consideration, make quality assumptions to support the following requirements.

Section 1: Written Project Plan

You are now in the final stage of the project plan development. All previous documentation will be combined into one (1) document that will serve as the statement of work for the project. Your goal is to have the project approved by the executive team and the venture capital group. The project plan is very detailed which is appropriate to accomplish the monumental task of implementation. However, the executive team is only interested in a ten (10) minute summation. Therefore, you also must create a compelling executive summary that is supported by your detail that convinces the executive group that your solution is optimal.

1. Write an eight to ten (8-10) page executive summary in which you provide a high-level technical overview of your project where you address the following:

Describe the scope of the project and control measures.
Describe the goals and objectives of the project.
Give a detailed, realistically estimated cost analysis of the entire project.
Relate the value of the project plan solution to the competitive advantage that information technology will afford your organization.
Provide all aspects of the information technology implementation into the project plan.
Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:

This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Include charts or diagrams created in MS Visio and MS Project as appendix of the Word document. Make reference of these files in the body of the Word document.
Section 2: Revised Gantt Chart / Project Plan

Use Microsoft Project or an open source alternative, such as Open Project, to:

2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 4: Infrastructure and Security, with all the project tasks.

Section 3: Project Plan PowerPoint Presentation

Additional to your detailed executive summary you must present your findings to the executive team and the venture capital group that, along with the executive summary, will convince the group that your solution is optimal.

3. Create a ten to fifteen (10-15) slide PowerPoint presentation in which you:

a. Illustrate the concepts from your written report in Section 1 of this assignment.

b. Create bulleted speaking notes for your presentation to the executive board in the Notes section of the PowerPoint. Note: You may create or assume any fictitious names, data, or scenarios that have not been established in this assignment for a realistic flow of communication.

c. Use a professional technically written style to graphically convey the information.

The specific course learning outcomes associated with this assignment are:

Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations.
Evaluate the issues and challenges associated with information technology integration.
Summarize the competitive advantage that information technology affords to organizations.
Use technology and information resources to research issues in information technology.
Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions.

Project Deliverable 4: Infrastructure and Security

Introduction

The network of a company is the backbone of its day to day activities that comprise of their business operations, this is because all computer systems and network devices are connected together through it, which enables workers to conduct their tasks more effectively and efficiently across the company (LeCun, 1989). Therefore, in order for the employers to do this tasks more efficiently, the network need to be designed and set up properly.

The following is a network infrastructure design of the planned network;

D:\Learn With Chris\Work\Strayer\Project Deliverable 4 Infrastructure And Security\Project Deliverable Network Design.png

Figure 1: Network Infrastructure Design

The design above is part of the planning stage of the infrastructure of the organization before the actual implementation. In addition, understanding and evaluation of network components such as a server, router, laptop/desktops, gateway, Network Bridge, firewall and other elements are linked together and the ways they can be implemented to work more effective and efficient. Higher efficiency in terms of operations can be achieved by a network that is designed well (LeCun, 1989).

The network design entails a couple of details that are required in an efficient network and this includes the following;

· The processes and network security infrastructure details

· Location, type and numbers of all the network devices

· The cabling done on the company network

· A clear network map

Some of the best practices involved in the design of the network are; observing the actual design phase, design a network that accommodates future changes, implementing security in the design and network monitoring (LeCun, 1989).

Furthermore, the network infrastructure comprises of various network devices which includes; firewalls, routers, switches, switches, wireless access points, various workstations, a gateway, a network bridge and various servers such as database server, mail server, web server and file server.

Firewalls

Firewalls in this design have been implemented mostly at the entries into different networks. This is done so in order to filter out packets that are not allowed to get inside those networks. This prevents most attacks from attackers outside the network which could compromise the security of systems in the organization (Jiang et al, 2013).

The key design points that have been put into consideration include;

· Security policy development

· Implementation of simple solutions

· Correct use of devices

Routers

In this design they are main implemented in order to;

i. Process protocols that have been routed.

ii. Determining the best path by the use of routing protocols

In addition, all the devices or systems connected to the network have assigned IP addresses which helps them to communicate effectively with each other.

Bridge

A network bridge is among network devices that can be connected at the layer 2 (data link layer) of the OSI model. They must be connected just like the Local Area Protocols are connected and network packets are passed by the bridges networks (Jiang et al, 2013).

Wireless access points

They enable workers with portable devices to work more efficiently as they are constantly connected to the network wherever they are. Wireless access points also enable users to be able to access shared resources from any place (Jiang et al, 2013).

Gateways

This is placed between different networks in the design because it forms a passage between those networks that are also operating with different transmission protocols.

Switches

Switches offer connection points for most of the network devices such as firewalls, routers, servers and other network devices that can be connected to them.

There are various workstations for the users that are connected to the network which makes it convenient in accessing the shared resources or management of those systems.

Servers

There are various servers in the network design with different roles such as mail servers are used for storage and incorporation of the organization’s corporate mails. Two, file servers are used in the storage of company’s important files such as documents and making them available to the users. A web server stores important page files of company’s website and finally the database server which stores data on the employees and other resources.

Company security policy

This policy is very helpful in providing necessary steps or guidelines to be followed by the organization’s employees in order to effectively carry out their tasks or implement anything that is related to the network or computer systems.

The core principal that is mostly advisable to be applicable is C.I.A which stands for confidentiality, integrity and availability of information or other network resources.

Confidentiality of the organization’s information can be achieved by secure storage of this information through the use of passwords on the computer systems, on the network devices, servers and other connected appliances that could be having sensitive information on the company. Confidentiality which is safeguarding the information against unauthorized access and this can also be achieved through encryption which protects information in transit from attackers who tend to intercept the link and other man in the middle attacks. This can be highly achieved if organization’s employers follow these laid guidelines that ensure confidentiality (Burns et al, 2001).

Integrity of information exchanged within the organization is paramount as it ensures company’s operations are carried out more efficiently. There are various mechanisms that can be put in place to achieve this, one them is hashing. Hashing helps in determining that the information received has not been modified by any other party. Consequently, this helps the organization to make necessary decision based on whether the information is compromised or not. In case the information is compromised, the organization may tend to take necessary steps to handle the situation.

Finally, availability is another principal that is very crucial in any organization. Availability implies that the information of the company should always be accessible whenever it is required at any time and more efficiently. Availability can be achieved through the implementation of more reliable systems such as more powerful servers that are able to accommodate changes. This can also be achieved through securing the systems from virus that could cause a system crush and the important information can be lost. The system should also be protected from attackers in order to preserve system availability, this is because most hackers tend to steal and delete the company’s information once they get access to it (Burns et al, 2001).

Therefore, the principals stated above can only be highly achieved when employees of the organization follow necessary laid policies that helps in the protection of the systems which helps administrators in effective management of the network.

Employee ethical aspects

Employee behavior

The behaviors of employees is very important especially when it comes to management of the network because it makes manning of network systems easier and effective. Therefore when there is good behavior among employees these rules will be followed and therefore the network is more strengthened. Contractors and other external stakeholders should also observe good behavior so as to ensure that the network of the organization is not compromised.

Password usage

Furthermore, various guidelines should be followed in order to ensure that the passwords used adhere to the policy of the organization. Some of the guidelines to be observed include the following (Gaw et al, 2006);

i. Passwords should not be shared especially with persons outside the organization.

ii. Passwords used by employees should observe the length policy of the company such as at least 8 characters or special symbols should be applied in passwords, in other words every system should use strong passwords.

iii. Passwords should be changed after a certain period of time, mostly 3 or 6 months.

iv. Use of different passwords on different accounts, systems or sites.

v. Passwords should not be written down as unauthorized persons could get access.

vi. All the organization’s system should be at least password-protected.

Access to networked resources and information

Shared resources should be accessed through secure means such as the use of VPNs which protects the information against unauthorized access. In addition, information being exchanged unsecure channels should be encrypted in order to protect it from being accessed by attackers who might modify or even delete it. Networked resources should also be stored in secure systems or servers such as be password-protected.

Furthermore, shared information should also be well protected in such a way that it should at least ask for password authentication from users before the resources are accessed, this ensures that only authorized persons or those who have access passwords are able to view the information.

In conclusion, network-shared folders, systems and other resources on the network should only be shared with authorized persons.

References

LeCun, Y. 1989. Generalization and network design strategies. Connectionism in perspective, 19, 143-155.

Jiang, N., Becker, D. U., Michelogiannakis, G., Balfour, J., Towles, B., Shaw, D. E., ... & Dally, W. J. 2013, April. A detailed and flexible cycle-accurate network-on-chip simulator. In 2013 IEEE international symposium on performance analysis of systems and software (ISPASS) (pp. 86-96). IEEE.

Burns, J., Cheng, A., Gurung, P., Rajagopalan, S., Rao, P., Rosenbluth, D., ... & Martin, D. M. 2001, June. Automatic management of network security policy. In Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01 (Vol. 2, pp. 12-26). IEEE.

Gaw, S., & Felten, E. W. 2006, July. Password management strategies for online accounts. In Proceedings of the second symposium on Usable privacy and security (pp. 44-55).

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Professor Smith
Top Academic Tutor
Helping Engineer
Instant Assignment Writer
George M.
24/7 Assignment Help
Writer Writer Name Offer Chat
Professor Smith

ONLINE

Professor Smith

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$34 Chat With Writer
Top Academic Tutor

ONLINE

Top Academic Tutor

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$19 Chat With Writer
Helping Engineer

ONLINE

Helping Engineer

I am an elite class writer with more than 6 years of experience as an academic writer. I will provide you the 100 percent original and plagiarism-free content.

$50 Chat With Writer
Instant Assignment Writer

ONLINE

Instant Assignment Writer

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$21 Chat With Writer
George M.

ONLINE

George M.

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$43 Chat With Writer
24/7 Assignment Help

ONLINE

24/7 Assignment Help

I will provide you with the well organized and well research papers from different primary and secondary sources will write the content that will support your points.

$24 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Chapter 5 accounting for merchandising operations test bank - When does daylight savings finish in new south wales - CHRISTIAN SERVANT LEADERS - Poweredge vrtx technical guide - One smooth stone organizational structure - Acrostic poem on book - Written assignment - Ariba punchout implementation guide - Environmental Factors and Health Promotion Presentation: Accident Prevention and Safety Promotion for Parents and Caregivers of Infants - Discussion 7 - Departmentalization in elementary school ppt - Hr discussion - Strategic goals of coca cola company - Business model canvas format from osterwalder & pigneur 2010 - Manageability commander tool mesh edition - Scientific merit example - 10 ways to irritate a telemarketer - Miercoles - 6 aristida close kemps creek - Biology of osmosis jones worksheet answer key - Canvas chaffey - The tell tale heart pdf - Solar system diorama instructions - Mermaid gatekeepers sea of thieves - How does race shape your relationships with people close to you? - Gauri nanda clocky - Animal cell song lyrics - Things fall apart study guide questions and answers - Open innovation in evs a case study of tesla motors - Living with major depression - The shallows chapter 6 summary - Canine companions rescue center - Dr kate stern melbourne ivf - Why are patients with pheochromocytoma often hyperglycemic - Reid chocolates is considering a third layout - What helps contribute to the violence seen in chéri samba’s calvary? - Reflection - Does bj's accept american express - Power point presentation - Ionization of ethylamine in water - Transformer oil dehydration machine - Tree trimming project - Discussion, APA 6, 2 References, Similarities Less 5% - Patient Education and Ethical Issues in Today’s Health Care - How does iscsi handle the process of authentication - Aviary plans free download - Employment separation certificate centrelink - Cobit 5 goals cascade - Kmart state of origin merchandise - Jessica the merchant of venice - The alaska gold mine case answer - Rfs bushfire prone land - R v wilson 1996 - Professional behaviors - North penn school district - Feast watson tung oil - What is results leadership - Strategic Plan - Physics equations gcse aqa - Working capital management is relatively unimportant for a small business. - Telstra nrl app on laptop - Georgia pacific a manufacturer incurs the following costs - Read the following sentence. Mariah’s voice shook and her hands fluttered as she floundered helplessly to answer the difficult questions Steven was asking her. Choose the denotation for the word floundered. restored struggled succeeded maintained - Writing a speech outline template - Dna the double helix coloring worksheet answers - Project 4 - How does wemmick treat the butcher - Managerial Accounting: CLA2 - Software asset and configuration management - Multicountry competition exists when - Suicide - The big trip up yonder answers - Using information technology for strategic advantage - Assignment week 6, - Kanopy - Southampton vts planned movements - Song of st patrick marty haugen - Oh dear sound effect - Mountain view realty excel assignment answers - Reciprocity law in radiography definition - Melton borough council housing - Free vark questionnaire - International financial management madura 13th edition pdf - Unit 8 discussion 1 - Where do squids live in the ocean - Incomplete combustion of butane equation - Compute chavez company's current ratio using the above information. - 5 pebble pl commack ny 11725 - Southwestern university a large state college in stephenville - Watashi wa in hiragana - What is wacc and why is it important - Beowulf and the dragon parallels and analogues - Is this a question philosophy exam - Http www npr org series 4538138 this i believe - Prompt 6 - 100 information literacy success 2nd edition - Emergency medicine pico questions - Rene magritte egg and bird - Investors are rewarded for assuming - Discussion #1