Develop a technical proposal that best addresses stakeholder

Assignment Help Computer Engineering
Reference no: EM133628331

Homework: Alternate Processing Site Proposal

Overview

R&D Media, LLC has asked you to develop a proposal for an Alternate Processing Site. Your task is to:

1) Conduct research on the latest technologies and strategies for Alternate Processing Sites (feel free to use your teamwork for this part of the homework).

2) Determine who the company's stakeholders are. You can adopt the role of an internal or external consultant for your perspective.

3) Using the results of your research, develop a technical proposal that best addresses the stakeholder's requirements and incorporates innovative technologies in the recommendation.

4) Within your proposal you must also consider cost and what R&D Media, LLC can afford.

5) Develop and document the requirements for R&D Media, LLC's alternate processing site building upon the concepts addressed in class materials and discussion topics.

Homework Checklist - Be sure that you capture the following eleven sections in your report:

The needs of R&D Media, LLC's stakeholders are considered within the plan.

List of mission critical applications/list of non-critical functions that can be dropped and describe how data will be protected through encryption and other means.

New technologies for Alternate Processing Sites are utilized.

A plan for updating alternate processing site software during normal operation.

Documentation showing a simple rack diagram and a network diagram.

A network configuration overview (IP, DNS, etc.).

Information security architecture (firewalls, VPNs).

Network bandwidth estimates.

Power consumption estimates.

Plan for cutting over to the alternate plan during a recovery scenario.

Plan for cutting back to the main site (a.k.a. hand back) to resume normal operations.

Scenario:

R&D Media, LLC

R&D Media, LLC is a small 100-person business that produces short animation movies for advertiser clients. Their clients are located worldwide and need to communicate securely with R&D Media, LLC as they collaborate on their advertising shorts. R&D Media, LLC uses its high- speed Internet connection both to support the exchange of movie shorts as well as for email and general Internet web connectivity.

Local Area Network and Workstation Description

The business occupies one floor in an office building which is supported by a LAN. Everybody has a work computer on his or her desk, which can contain unshared work. There are also servers to support web, file and print sharing, email, database services. Additionally, a small 3D render farm (consisting of a rack of 20 quad processor Xeon servers running Red Hat Linux) generates high-resolution video animations that R&D Media, LLC produces for its clients.

The desktop systems consist of Apple Mac Pro desktops running the latest version of the Mac OS for the creative staff, and the latest version of Windows on computers for general use. The servers are running the latest version of Windows Server running Microsoft Exchange, web server, and file and print service.

Remote Devices and External Network Connectivity

Ethernet and the network hardware are a mixture from Cisco and Hewlett-Packard. Employees, business partners, and clients may visit R&D Media, LLC's office with laptop computers in order to collaborate on projects that connect with LAN. The laptops will obtain their IP configuration from the DHCP server at R&D Media, LLC.

R&D Media, LLC has 10 megabit/second Internet access and uses a SOHO firewall that doubles as a DHCP server. This firewall filters out Internet-based attempts to access R&D Media, LLC's servers and desktop computers, but admits email, web, and SFTP (Secure FTP) traffic destined for specifically hardened servers.

The network has the following additional specifications:

The network is all TCP/IP based using Cisco routers and switches.

All desktop computers include email, web, database access, and office productivity software.

All server and critical network equipment are in a secure server room, with some connected peripheral devices (e.g., printers) located throughout the office.

The multimedia department uses high-end workstations for video rendering and animation with authoring software installed.

A load-balancing dual firewall connects the network to the Internet.

Security Policy Details

All email must be secured so it cannot be inadvertently sent to the wrong party or intercepted, including use of encryption for confidential information.

All network resources and equipment must be password protected.

Company equipment may not be used for personal business and only limited personal use.

All Windows-based PCs must run approved anti-malware programs.

Clients may use the Secure FTP (SFTP) server to send or receive multimedia files, but under no circumstances should one client be able to view the files of any other client.

The mail server must be configured not to forward email that originated on the Internet.

Password aging must be enforced on all servers and desktops.

All server configurations must be readily available to rebuild a failed system.

Offsite backup is required, with 24/7 access to that location.

All employees will demonstrate they understand the security policy as set by a security officer who reports to company leadership.

Reference no: EM133628331

Questions Cloud

What have researchers learned about security vulnerabilities : What have researchers learned about the security vulnerabilities in social media platforms and what strategies can be employed to mitigate these vulnerabilities
Course for teaching english language state : Select three interesting pieces of information of the text Course for Teaching English Language state the information provide a citation
Comparison or contrast on three points to develop : you will not have a topic for the third body paragraph. Rather base the comparison or contrast on three points to develop.
How being rewarded a computer from your university can help : Write 500 words essay on how being rewarded a computer from your university can help you achieve success in your pursuit of a degree.
Develop a technical proposal that best addresses stakeholder : Develop a technical proposal that best addresses the stakeholder's requirements and incorporates innovative technologies in the recommendation.
Nonverbal behavior clothing deliberate vs unintentional : How is the nonverbal behavior clothing deliberate vs unintentional? How do gender and cultural factors shape the nonverbal behavior displayed clothing?
How would you go about delivering person-centered care : How can cultural change be implemented in our modern-day long-term care facilities? How would you go about delivering person-centered care?
Share detailed recommendations from your feasibility study : Share detailed recommendations from your feasibility study regarding the global expansion of your product or service. Include any issues that may arise.
Analyzing visual rhetoric : Analyzing Visual Rhetoric. The one is all about expressing and exploring ideas, use the textbook Critical Thinking,

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe ecosystem of the cloud and the ever-present threats

In the following scenario you are the CISSO of a Major E-commerce Organization. The organization has decided to migrate their entire IT infrastructure.

  How the final web page must include

The final Web page should include the following HTML elements and formatting.

  Class definition for objects that receive notifications

The interface requires that the method be implemented, The class definition for objects that receive notifications of user operations on controls

  Design a verilog module to convert a 64-bit data signal

Design a Verilog module to convert a 64-bit data signal with periodic timing (eight-cycle period) into a series of eight-bit signals with periodic timing.

  What are the cyber intelligence activities

Cyberspace is a unique operating domain, which permeates to every level of humanity to include our personal lives. What challenges to the legal issues.

  Develop a boundary-layer integral equation

Develop a momentum integral equation for steady flow without blowing or suction for use in the entry region of a circular tube.

  Which state requires greater duties of the tenant

Write a minimum of two (2) pages comparing and contrasting the tenant rights and duties of two states; one state should be your home state and the other is a state of your choosing. Identify which state is your home state and answer the followign q..

  Write about development of an effective approach

Write about development of an effective approach to integration of cryptography for your project organization.

  Define top rated digital asset management software products

Do research online to identify the capabilities of digital asset management software. What are the top rated digital asset management software products?

  What is the difference between composition and aggregation

What is the difference between composition and aggregation? Draw class diagram based on the code below. What is composition and what symbol is used to represent it?

  How many bits are used for the byte offset

Design a 64KB 8-way set associative cache that has 32 words per blocks and 4 bytes per word (MIPS type).

  How it governance will improve effectiveness of it division

Assess how IT governance will improve the effectiveness of the IT Division to attain regulatory compliance. Develop a broad vision, an architecture.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd