Develop a technical proposal that best addresses stakeholder

Assignment Help Computer Engineering
Reference no: EM133628331

Homework: Alternate Processing Site Proposal

Overview

R&D Media, LLC has asked you to develop a proposal for an Alternate Processing Site. Your task is to:

1) Conduct research on the latest technologies and strategies for Alternate Processing Sites (feel free to use your teamwork for this part of the homework).

2) Determine who the company's stakeholders are. You can adopt the role of an internal or external consultant for your perspective.

3) Using the results of your research, develop a technical proposal that best addresses the stakeholder's requirements and incorporates innovative technologies in the recommendation.

4) Within your proposal you must also consider cost and what R&D Media, LLC can afford.

5) Develop and document the requirements for R&D Media, LLC's alternate processing site building upon the concepts addressed in class materials and discussion topics.

Homework Checklist - Be sure that you capture the following eleven sections in your report:

The needs of R&D Media, LLC's stakeholders are considered within the plan.

List of mission critical applications/list of non-critical functions that can be dropped and describe how data will be protected through encryption and other means.

New technologies for Alternate Processing Sites are utilized.

A plan for updating alternate processing site software during normal operation.

Documentation showing a simple rack diagram and a network diagram.

A network configuration overview (IP, DNS, etc.).

Information security architecture (firewalls, VPNs).

Network bandwidth estimates.

Power consumption estimates.

Plan for cutting over to the alternate plan during a recovery scenario.

Plan for cutting back to the main site (a.k.a. hand back) to resume normal operations.

Scenario:

R&D Media, LLC

R&D Media, LLC is a small 100-person business that produces short animation movies for advertiser clients. Their clients are located worldwide and need to communicate securely with R&D Media, LLC as they collaborate on their advertising shorts. R&D Media, LLC uses its high- speed Internet connection both to support the exchange of movie shorts as well as for email and general Internet web connectivity.

Local Area Network and Workstation Description

The business occupies one floor in an office building which is supported by a LAN. Everybody has a work computer on his or her desk, which can contain unshared work. There are also servers to support web, file and print sharing, email, database services. Additionally, a small 3D render farm (consisting of a rack of 20 quad processor Xeon servers running Red Hat Linux) generates high-resolution video animations that R&D Media, LLC produces for its clients.

The desktop systems consist of Apple Mac Pro desktops running the latest version of the Mac OS for the creative staff, and the latest version of Windows on computers for general use. The servers are running the latest version of Windows Server running Microsoft Exchange, web server, and file and print service.

Remote Devices and External Network Connectivity

Ethernet and the network hardware are a mixture from Cisco and Hewlett-Packard. Employees, business partners, and clients may visit R&D Media, LLC's office with laptop computers in order to collaborate on projects that connect with LAN. The laptops will obtain their IP configuration from the DHCP server at R&D Media, LLC.

R&D Media, LLC has 10 megabit/second Internet access and uses a SOHO firewall that doubles as a DHCP server. This firewall filters out Internet-based attempts to access R&D Media, LLC's servers and desktop computers, but admits email, web, and SFTP (Secure FTP) traffic destined for specifically hardened servers.

The network has the following additional specifications:

The network is all TCP/IP based using Cisco routers and switches.

All desktop computers include email, web, database access, and office productivity software.

All server and critical network equipment are in a secure server room, with some connected peripheral devices (e.g., printers) located throughout the office.

The multimedia department uses high-end workstations for video rendering and animation with authoring software installed.

A load-balancing dual firewall connects the network to the Internet.

Security Policy Details

All email must be secured so it cannot be inadvertently sent to the wrong party or intercepted, including use of encryption for confidential information.

All network resources and equipment must be password protected.

Company equipment may not be used for personal business and only limited personal use.

All Windows-based PCs must run approved anti-malware programs.

Clients may use the Secure FTP (SFTP) server to send or receive multimedia files, but under no circumstances should one client be able to view the files of any other client.

The mail server must be configured not to forward email that originated on the Internet.

Password aging must be enforced on all servers and desktops.

All server configurations must be readily available to rebuild a failed system.

Offsite backup is required, with 24/7 access to that location.

All employees will demonstrate they understand the security policy as set by a security officer who reports to company leadership.

Reference no: EM133628331

Questions Cloud

What have researchers learned about security vulnerabilities : What have researchers learned about the security vulnerabilities in social media platforms and what strategies can be employed to mitigate these vulnerabilities
Course for teaching english language state : Select three interesting pieces of information of the text Course for Teaching English Language state the information provide a citation
Comparison or contrast on three points to develop : you will not have a topic for the third body paragraph. Rather base the comparison or contrast on three points to develop.
How being rewarded a computer from your university can help : Write 500 words essay on how being rewarded a computer from your university can help you achieve success in your pursuit of a degree.
Develop a technical proposal that best addresses stakeholder : Develop a technical proposal that best addresses the stakeholder's requirements and incorporates innovative technologies in the recommendation.
Nonverbal behavior clothing deliberate vs unintentional : How is the nonverbal behavior clothing deliberate vs unintentional? How do gender and cultural factors shape the nonverbal behavior displayed clothing?
How would you go about delivering person-centered care : How can cultural change be implemented in our modern-day long-term care facilities? How would you go about delivering person-centered care?
Share detailed recommendations from your feasibility study : Share detailed recommendations from your feasibility study regarding the global expansion of your product or service. Include any issues that may arise.
Analyzing visual rhetoric : Analyzing Visual Rhetoric. The one is all about expressing and exploring ideas, use the textbook Critical Thinking,

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd