The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
I could really use some help with this assignment. It contains two parts. For the second assignment which requires a Microsoft Project file; I'll attach the one mine from this class. Please add the required information to it. I've also included the grading rubric as well. In advance thank you so much for the help.Â
Â
Project Deliverable 5: Infrastructure and Security
Due Week 8 and worth 110 points
Â
This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
Â
The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one (1) floor to three (3) floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. Additionally, the security of the network should be in the forefront of your design because protecting your data is a primary consideration.
Â
Section 1: Infrastructure Document
Â
Your assignment must follow these formatting requirements:
Section 2: Revised Project Plan
Â
Use Microsoft Project to:
The specific course learning outcomes associated with this assignment are:
Â
Points: 110 Criteria Project Deliverable 5: Infrastructure and Security Meets
Unacceptabl Minimum
e
Expectation
Below 60%
s
Fair
F
60-69% D 70-79% C Exemplar
y
Proficient 90-100%
80-89% B
A Section 1: Infrastructure Document 1a. Justify Did not
Insufficientl Partially
Satisfactorily Thoroughl
and support submit or
y justified justified and justified and y justified
the
incompletely and
supported
supported and
relationship justified and supported the
the
supported
between
supported
the
relationship relationship the
infrastructur the
relationship between
between
relationshi
e and
relationship between
infrastructur infrastructur p between
security as it between
infrastructur e and
e and
infrastructu
relates to this infrastructur e and
security as it security as it re and
datae and
security as it relates to this relates to this security as
collection
security as it relates to this datadatait relates to
and analysis relates to this datacollection
collection
this datacompany.
datacollection and analysis and analysis collection
Weight: 15% collection
and analysis company.
company.
and
and analysis company.
analysis
company.
company. 1b. Present Did not
Insufficientl Partially
Satisfactorily Thoroughl
the rationale submit or
y presented presented the presented the y presented
for the
incompletely the rationale rationale for rationale for the
logical and presented the for the
the logical the logical rationale
physical
rationale for logical and and physical and physical for the
topographica the logical physical
topographica topographica logical and
l layout of and physical topographica l layout of l layout of physical
the planned topographica l layout of the planned the planned topographi
network.
l layout of the planned network.
network.
cal layout
Weight: 20% the planned network.
of the
network.
planned
network. 1c. Design a Did not
Insufficientl Partially
Satisfactorily Thoroughl
logical and submit or
y designed a designed a designed a y designed
physical
incompletely logical and logical and logical and a logical
topographica designed a physical
physical
physical
and
l layout of logical and topographica topographica topographica physical
the current physical
l layout of l layout of l layout of topographi
and planned topographica the current the current the current cal layout
network
l layout of and planned and planned and planned of the
through the the current network
network
network
current and
use of
and planned through the through the through the planned
graphical
network
use of
use of
use of
network
tools in
through the graphical
graphical
graphical
through the
Microsoft use of
tools in
tools in
tools in
use of
Word or
graphical
Microsoft Microsoft Microsoft graphical
Visio, or an tools in
Word or
Word or
Word or
tools in
open source Microsoft Visio, or an Visio, or an Visio, or an Microsoft
alternative Word or
open source open source open source Word or
such as Dia. Visio, or an alternative alternative alternative Visio, or
Weight: 15% open source such as Dia. such as Dia. such as Dia. an open
alternative
source
such as Dia.
alternative
such as
Dia. 1d. Illustrate Did not
Insufficientl Partially
Satisfactorily Thoroughl
the possible submit or
y illustrated illustrated illustrated y
placement of incompletely the possible the possible the possible illustrated
servers
illustrated placement of placement of placement of the
including
the possible servers
servers
servers
possible
access paths placement of including
including
including
placement
to the
servers
access paths access paths access paths of servers
Internet,
including
to the
to the
to the
including
intrusion
access paths Internet,
Internet,
Internet,
access
detection
to the
intrusion
intrusion
intrusion
paths to the
systems
Internet,
detection
detection
detection
Internet,
(IDS), and intrusion
systems
systems
systems
intrusion
firewalls.
detection
(IDS), and (IDS), and (IDS), and detection
Weight: 15% systems
firewalls.
firewalls.
firewalls.
systems
(IDS), and
(IDS), and
firewalls.
firewalls. 1ei. Create Did not
and describe submit or Insufficientl Partially
Satisfactorily Thoroughl
y created and created and created and y created a
incompletely described a described a described a and
comprehensi created and comprehensi comprehensi comprehensi described a
ve security described a ve security ve security ve security comprehen
policy for
comprehensi policy for
policy for
policy for
sive
this data
ve security this data
this data
this data
security
collection
policy for
collection collection
collection
policy for
and analysis this data
and analysis and analysis and analysis this data
company
collection
company
company
company
collection
that will
and analysis that will
that will
that will
and
protect the company
protect the protect the protect the analysis
company
that will
company
company
company
company
infrastructur protect the infrastructur infrastructur infrastructur that will
e and assets company
e and assets e and assets e and assets protect the
by applying infrastructur by applying by applying by applying company
the
e and assets the
the
the
infrastructu
principals of by applying principals of principals of principals of re and
confidentialit the
confidentialit confidentialit confidentialit assets by
y, integrity, principals of y, integrity, y, integrity, y, integrity, applying
and
confidentialit and
and
and
the
availability y, integrity, availability availability availability principals
(CIA).
and
(CIA).
(CIA).
(CIA).
of
Weight: 10% availability
confidentia
(CIA).
lity,
integrity,
and
availability
(CIA). 1eii. Create
and describe
a
comprehensi
ve security
policy for
this datacollection
and analysis
company
that will
address
ethical
aspects
related to
employee Did not
Insufficientl Partially
submit or
y created and created and
incompletely described a described a
created and comprehensi comprehensi
described a ve security ve security
comprehensi policy for
policy for
ve security this datathis datapolicy for
collection collection
this dataand analysis and analysis
collection
company
company
and analysis that will
that will
company
address
address
that will
ethical
ethical
address
aspects
aspects
ethical
related to
related to
aspects
employee
employee Satisfactorily Thoroughl
created and y created
described a and
comprehensi described a
ve security comprehen
policy for
sive
this datasecurity
collection
policy for
and analysis this datacompany
collection
that will
and
address
analysis
ethical
company
aspects
that will
related to
address
employee
ethical behavior,
related to
contractors, employee
password
behavior,
usage, and contractors,
access to
password
networked usage, and
resources
access to
and
networked
information. resources
Weight: 10% and
information. behavior,
contractors,
password
usage, and
access to
networked
resources
and
information. behavior,
contractors,
password
usage, and
access to
networked
resources
and
information. behavior,
contractors,
password
usage, and
access to
networked
resources
and
information. aspects
related to
employee
behavior,
contractors
, password
usage, and
access to
networked
resources
and
informatio
n. Section 2: Revised Project Plan 2. Update
the project
plan from
Project
Deliverable
4: Analytics,
Interfaces,
and Cloud
Technology,
with three to
five (35) new proje
ct tasks each
consisting of
five to ten
(5-10) subtasks.
Weight: 5% Did not
Insufficientl Partially
submit or
y updated
updated the
incompletely the project project plan
updated the plan from
from Project
project plan Project
Deliverable
from Project Deliverable 4: Analytics,
Deliverable 4: Analytics, Interfaces,
4: Analytics, Interfaces, and Cloud
Interfaces, and Cloud Technology,
and Cloud Technology, with three to
Technology, with three to five (3with three to five (35) new proje
five (35) new proje ct tasks each
5) new proje ct tasks each consisting of
ct tasks each consisting of five to ten
consisting of five to ten (5-10) subfive to ten (5-10) sub- tasks.
(5-10) sub- tasks.
tasks. 3. Clarity, More than 8 7-8 errors
writing
errors
present
mechanics, present
and 5-6 errors
present Satisfactorily Thoroughl
updated the y updated
project plan the project
from Project plan from
Deliverable Project
4: Analytics, Deliverabl
Interfaces, e 4:
and Cloud Analytics,
Technology, Interfaces,
with three to and Cloud
five (3Technolog
5) new proje y, with
ct tasks each three to
consisting of five (3five to ten 5) new proj
(5-10) sub- ect tasks
tasks.
each
consisting
of five to
ten (5-10)
sub-tasks. 3-4 errors
present 0-2 errors
present formatting
requirements
Weight: 10%
-----------