Explain rationale for physical topographical layout

Assignment Help Management Information Sys
Reference no: EM131740444

Project Assignment: Infrastructure and Security

This assignment consists of two sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

The last section of the project plan will present the infrastructure in accordance with the parameters set forth at the outset of the project. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy. CIA is a widely used benchmark for evaluation of information systems security.

Section 1: Infrastructure Document

1. Write a five to ten page infrastructure document in which you:

a. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

b. Illustrate the possible placement of servers including access paths to the Internet and firewalls. Note: Facility limitations, workstations, printers, routers, switches, bridges and access points should be considered in the illustration.

c. Explain the rationale for the logical and physical topographical layout of the planned network.

d. Create a comprehensive security policy for the company that will:

i. Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity and availability of information.

ii. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.

Section 2: Revised Gantt Chart / Project Plan

Use Microsoft Project or an open source alternative, such as Open Project, to:

2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 3: Database and Programming Design, with all the project tasks.

The specific course learning outcomes associated with this assignment are:

• Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations.
• Evaluate the issues and challenges associated with information technology integration.
• Evaluate the ethical concerns that information technology solve or present in a global context.
• Use technology and information resources to research issues in information technology.
• Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions.

Reference no: EM131740444

Questions Cloud

Review problem-minimum wages and maximum hours : What federal law establishes the minimum wage and the hours in a work week? What is required regarding overtime compensation or time off?
A particle on a circle through points that have been marked : A particle on a circle through points that have been marked, moving one point counterclockwise
Increased focus on values such as sustainability : Considering the increased focus on values such as sustainability, environmental rights, human rights, and social responsibility
How do you see ccss impacting the future of curriculum : One of the more ambitious and controversial curriculum development projects in recent times has been the development of the Common Core State Standards.
Explain rationale for physical topographical layout : Project Assignment: Infrastructure and Security. Explain the rationale for the logical and physical topographical layout of the planned network.
What format is required for a warn notice : The WARN Act To show your understanding of the WARN notice, answer these questions: (a) Who are the covered employers?
What is dividend per share : What would happen to pay out ratio and DPS if the net income were decrease to 90 million and increase to 160 million.
Discuss educational philosophy : Discuss the various philosophies, differences in those philosophies as related to education, and their impact on curriculum theory and design.
Problen on the family and medical leave act : The Family and Medical Leave Act In the sixth month of her pregnancy, Suzanne was advised by her doctors to slow down the hectic pace of her consulting career.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Why is important for team members to know their roles

Case One: ElectriGov, answer the following questions: Why is it important for an organization to have a mission? Why is it important for team members to know their roles on a team

  Explain about capacity requirement planning

PPQ Parts Manufacturing: Best Software for MRP, CRP and ERP Needs - Justify your recommendations by analyzing the pros and cons of each of the six software systems you evaluated to perform materials requirements planning (MRP), capacity requirement..

  Explain the host base security system

Host Base Security System (HBSS) is a scalable commercial of the shelf (COTS) software suite based application created by McAfee (McAfee 2003).

  Explanation of first mover advantage

This posting shows you a step-by-step explanation of first mover advantage. The response also contains the sources used

  Explain project management as a discipline

Describe the industries in which project managers are in high demand. Provide evidence to support your response. Describe the general role of a project manager, and explain the primary ways in which it differs across different industries. Compare the..

  Doctorondemand app

Create a sample inventory of five main information assets in the company.

  Determine the certifications that you believe would prove

Next, explain whether or not you believe obtaining certifications would help you in the position in question. If so, determine the certifications that you believe would prove to be helpful. Provide a rationale for your response.

  How extensive does their corporation train their employees

identify yourself as a student of a sales class. Ask the salesperson about their product and sales training process. In other words, how extensive does their corporation train their employees? Remember to obtain a business card.

  Information management and allied professional issues

Analyze the primary problems associated with information management, and analyze the primary issues associated with patient confidentiality. Determine the major ways in which these overlapping responsibilities play a part in enforcing Health Insur..

  Design a security and risk management solution

ISIT437/ ISIT937 Information Technology Security and Risk Management Autumn 2017 Group Report. Your task is to design a security and risk management solution

  Describe what functions should it perform for the company

In what ways can the business benefit from a Web site? What functions should it perform for the company (e.g., marketing, sales, customer support, internal communications, etc.)?

  Why is technology potentially important to the banking

Why is technology potentially important to the banking industry? What consumer needs does it fulfill?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd