ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 3 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 02 May 2017 My Price 11.00

Project Deliverable 5: Infrastructure and Security

I could really use some help with this assignment. It contains two parts. For the second assignment which requires a Microsoft Project file; I'll attach the one mine from this class. Please add the required information to it. I've also included the grading rubric as well. In advance thank you so much for the help. 

 

Project Deliverable 5: Infrastructure and Security

Due Week 8 and worth 110 points

 

This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

 

The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one (1) floor to three (3) floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. Additionally, the security of the network should be in the forefront of your design because protecting your data is a primary consideration.

 

Section 1: Infrastructure Document

  1. Write a four to six (4-6) page infrastructure document in which you:
    • Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.
    • Present the rationale for the logical and physical topographical layout of the planned network.
    • Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
    • Illustrate the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Note: Facility limitations, workstations, databases, printers, routers, switches, bridges, and access points should be considered in the illustration.
    • Create and describe a comprehensive security policy for this data-collection and analysis company that will:
  • Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information. 
  • Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.

Section 2: Revised Project Plan

 

Use Microsoft Project to:

  1. Update the project plan from Project Deliverable 4: Analytics, Interfaces, and Cloud Technology, with three to five (3-5) new project tasks each consisting of five to ten (5-10) sub-tasks.

The specific course learning outcomes associated with this assignment are:

  • Develop information systems-related activities to maximize the business value within and outside the organization.
  • Demonstrate an understanding of existing and emerging information technologies, the functions of IS, and its impact on the organizational operations.
  • Evaluate the issues and challenges associated with information systems integration.
  • Use technology and information resources to research issues in information systems.
  • Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions.

 

Points: 110 Criteria Project Deliverable 5: Infrastructure and Security Meets
Unacceptabl Minimum
e
Expectation
Below 60%
s
Fair
F
60-69% D 70-79% C Exemplar
y
Proficient 90-100%
80-89% B
A Section 1: Infrastructure Document 1a. Justify Did not
Insufficientl Partially
Satisfactorily Thoroughl
and support submit or
y justified justified and justified and y justified
the
incompletely and
supported
supported and
relationship justified and supported the
the
supported
between
supported
the
relationship relationship the
infrastructur the
relationship between
between
relationshi
e and
relationship between
infrastructur infrastructur p between
security as it between
infrastructur e and
e and
infrastructu
relates to this infrastructur e and
security as it security as it re and
datae and
security as it relates to this relates to this security as
collection
security as it relates to this datadatait relates to
and analysis relates to this datacollection
collection
this datacompany.
datacollection and analysis and analysis collection
Weight: 15% collection
and analysis company.
company.
and
and analysis company.
analysis
company.
company. 1b. Present Did not
Insufficientl Partially
Satisfactorily Thoroughl
the rationale submit or
y presented presented the presented the y presented
for the
incompletely the rationale rationale for rationale for the
logical and presented the for the
the logical the logical rationale
physical
rationale for logical and and physical and physical for the
topographica the logical physical
topographica topographica logical and
l layout of and physical topographica l layout of l layout of physical
the planned topographica l layout of the planned the planned topographi
network.
l layout of the planned network.
network.
cal layout
Weight: 20% the planned network.
of the
network.
planned
network. 1c. Design a Did not
Insufficientl Partially
Satisfactorily Thoroughl
logical and submit or
y designed a designed a designed a y designed
physical
incompletely logical and logical and logical and a logical
topographica designed a physical
physical
physical
and
l layout of logical and topographica topographica topographica physical
the current physical
l layout of l layout of l layout of topographi
and planned topographica the current the current the current cal layout
network
l layout of and planned and planned and planned of the
through the the current network
network
network
current and
use of
and planned through the through the through the planned
graphical
network
use of
use of
use of
network
tools in
through the graphical
graphical
graphical
through the
Microsoft use of
tools in
tools in
tools in
use of
Word or
graphical
Microsoft Microsoft Microsoft graphical
Visio, or an tools in
Word or
Word or
Word or
tools in
open source Microsoft Visio, or an Visio, or an Visio, or an Microsoft
alternative Word or
open source open source open source Word or
such as Dia. Visio, or an alternative alternative alternative Visio, or
Weight: 15% open source such as Dia. such as Dia. such as Dia. an open
alternative
source
such as Dia.
alternative
such as
Dia. 1d. Illustrate Did not
Insufficientl Partially
Satisfactorily Thoroughl
the possible submit or
y illustrated illustrated illustrated y
placement of incompletely the possible the possible the possible illustrated
servers
illustrated placement of placement of placement of the
including
the possible servers
servers
servers
possible
access paths placement of including
including
including
placement
to the
servers
access paths access paths access paths of servers
Internet,
including
to the
to the
to the
including
intrusion
access paths Internet,
Internet,
Internet,
access
detection
to the
intrusion
intrusion
intrusion
paths to the
systems
Internet,
detection
detection
detection
Internet,
(IDS), and intrusion
systems
systems
systems
intrusion
firewalls.
detection
(IDS), and (IDS), and (IDS), and detection
Weight: 15% systems
firewalls.
firewalls.
firewalls.
systems
(IDS), and
(IDS), and
firewalls.
firewalls. 1ei. Create Did not
and describe submit or Insufficientl Partially
Satisfactorily Thoroughl
y created and created and created and y created a
incompletely described a described a described a and
comprehensi created and comprehensi comprehensi comprehensi described a
ve security described a ve security ve security ve security comprehen
policy for
comprehensi policy for
policy for
policy for
sive
this data
ve security this data
this data
this data
security
collection
policy for
collection collection
collection
policy for
and analysis this data
and analysis and analysis and analysis this data
company
collection
company
company
company
collection
that will
and analysis that will
that will
that will
and
protect the company
protect the protect the protect the analysis
company
that will
company
company
company
company
infrastructur protect the infrastructur infrastructur infrastructur that will
e and assets company
e and assets e and assets e and assets protect the
by applying infrastructur by applying by applying by applying company
the
e and assets the
the
the
infrastructu
principals of by applying principals of principals of principals of re and
confidentialit the
confidentialit confidentialit confidentialit assets by
y, integrity, principals of y, integrity, y, integrity, y, integrity, applying
and
confidentialit and
and
and
the
availability y, integrity, availability availability availability principals
(CIA).
and
(CIA).
(CIA).
(CIA).
of
Weight: 10% availability
confidentia
(CIA).
lity,
integrity,
and
availability
(CIA). 1eii. Create
and describe
a
comprehensi
ve security
policy for
this datacollection
and analysis
company
that will
address
ethical
aspects
related to
employee Did not
Insufficientl Partially
submit or
y created and created and
incompletely described a described a
created and comprehensi comprehensi
described a ve security ve security
comprehensi policy for
policy for
ve security this datathis datapolicy for
collection collection
this dataand analysis and analysis
collection
company
company
and analysis that will
that will
company
address
address
that will
ethical
ethical
address
aspects
aspects
ethical
related to
related to
aspects
employee
employee Satisfactorily Thoroughl
created and y created
described a and
comprehensi described a
ve security comprehen
policy for
sive
this datasecurity
collection
policy for
and analysis this datacompany
collection
that will
and
address
analysis
ethical
company
aspects
that will
related to
address
employee
ethical behavior,
related to
contractors, employee
password
behavior,
usage, and contractors,
access to
password
networked usage, and
resources
access to
and
networked
information. resources
Weight: 10% and
information. behavior,
contractors,
password
usage, and
access to
networked
resources
and
information. behavior,
contractors,
password
usage, and
access to
networked
resources
and
information. behavior,
contractors,
password
usage, and
access to
networked
resources
and
information. aspects
related to
employee
behavior,
contractors
, password
usage, and
access to
networked
resources
and
informatio
n. Section 2: Revised Project Plan 2. Update
the project
plan from
Project
Deliverable
4: Analytics,
Interfaces,
and Cloud
Technology,
with three to
five (35) new proje
ct tasks each
consisting of
five to ten
(5-10) subtasks.
Weight: 5% Did not
Insufficientl Partially
submit or
y updated
updated the
incompletely the project project plan
updated the plan from
from Project
project plan Project
Deliverable
from Project Deliverable 4: Analytics,
Deliverable 4: Analytics, Interfaces,
4: Analytics, Interfaces, and Cloud
Interfaces, and Cloud Technology,
and Cloud Technology, with three to
Technology, with three to five (3with three to five (35) new proje
five (35) new proje ct tasks each
5) new proje ct tasks each consisting of
ct tasks each consisting of five to ten
consisting of five to ten (5-10) subfive to ten (5-10) sub- tasks.
(5-10) sub- tasks.
tasks. 3. Clarity, More than 8 7-8 errors
writing
errors
present
mechanics, present
and 5-6 errors
present Satisfactorily Thoroughl
updated the y updated
project plan the project
from Project plan from
Deliverable Project
4: Analytics, Deliverabl
Interfaces, e 4:
and Cloud Analytics,
Technology, Interfaces,
with three to and Cloud
five (3Technolog
5) new proje y, with
ct tasks each three to
consisting of five (3five to ten 5) new proj
(5-10) sub- ect tasks
tasks.
each
consisting
of five to
ten (5-10)
sub-tasks. 3-4 errors
present 0-2 errors
present formatting
requirements
Weight: 10%

Attachments:

Answers

(11)
Status NEW Posted 02 May 2017 07:05 AM My Price 11.00

-----------

Attachments

file 1493709282-Solutions file 2.docx preview (51 words )
H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly -----------onl-----------ine----------- an-----------d g-----------ive----------- yo-----------u e-----------xac-----------t f-----------ile----------- an-----------d t-----------he -----------sam-----------e f-----------ile----------- is----------- al-----------so -----------sen-----------t t-----------o y-----------our----------- em-----------ail----------- th-----------at -----------is -----------reg-----------ist-----------ere-----------d o-----------n -----------THI-----------S W-----------EBS-----------ITE-----------. ----------- Th-----------ank----------- yo-----------u -----------
Not Rated(0)