Reference no: EM132333012
Linux Implementation Proposal
Linx, LLC has a new research and development group called LSDG. All systems in LSDG will run the Linux operating system and will access resources, as well as share resources, with Linx, LLC's Microsoft Active Directory domain. The domain consists of several Windows Server 2012 R2 servers running various services (Microsoft Active Directory, DNS, DHCP, web services, printing and file services).
Linx, LLC also has around 500 client operating system desktops/laptops that run Windows 7 and Windows XP. There is a mix of desktop and laptop systems.
Current Desktop/Laptop Configuration for Windows 7:
Processor: Intel Core i3 Second Generation
Memory: 4GB RAM
Hard Drive: 350GB
Network Card: 10/100/1000 Mbps
USB Ports: 4 USB 2.0
Monitor: 20inch LCD
Current Desktop/Laptop Configuration for Windows XP:
Processor: Intel Core 2
Memory: 2GB RAM
Hard Drive: 80GB
Network Card: 10/100 Mbps
USB Ports: 4 USB 2.0
Monitor: 15inch LCD
Your boss wants you to come up with a proposal to replace all Windows XP systems with Linux. You will implement the Linux variant specified by your instructor.
Requirements
The final submission should contain at least 5 to 7 pages' worth of text written by the student (not counting title page, images, diagrams, tables, or quotations that may be used). It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required.
You must turn this assignment in to both the assignment area within our LEO classroom as well as to the TurnItIn website. Failure to do so may result in point deductions. Follow the TurnItIn instructions provided within the class.
You must address the following in your proposal and may make any assumptions which are not specified:
- Research and justify whether LSDG will use existing computer hardware that is being used with the Windows XP systems, or if new hardware will be required.
- Plan for migration from Windows XP to Linux.
- Determine the hardware to be used and the installation options.
- How will users log onto the systems? Explain.
- How will systems receive IP addresses? Explain.
- How will DNS be accessed by the LSDG systems? Explain.
- Explain how files on the network may be accessed by LSDG.
- Explain how LSDG can securely share files within their group and other selected groups/users in the company.
- How will printing be handled? Explain.
- What, if any, data will be encrypted? Explain.
Scientific management and stakeholder or sustainability
: Centralization, contingency, decentralization, efficiency, mechanistic, organic, organizational behavior, scientific management, stakeholder, or sustainability
|
Describe various industry certifications in cybersecurity
: Describe the various industry certifications in cybersecurity where this course may help in obtaining. Describe at least two certifications
|
Aircraft communications addressing and reporting system
: Aircraft Communications Addressing and Reporting System. you are expected to cite at least two scholarly sources to support your opinion or assertions.
|
KLM Airlines-support your opinion or assertions
: KLM Airlines-To receive full credit for this case assignment, you are expected to cite at least two scholarly sources to support your opinion or assertions.
|
Linux implementation proposal
: Linx, LLC has a new research and development group called LSDG. All systems in LSDG will run the Linux operating system and will access resources,
|
Traditional risk management and enterprise risk management
: What do you think is the difference between traditional risk management and enterprise risk management?
|
Is non-repudiation an important property for SCADA
: Is non-repudiation an important property for SCADA?
|
Does this represent an effective risk management program
: What represents the key success factors of the program? Does this represent an effective risk management program? If not, what is missing?
|
User password definitions to maximize confidentiality
: To enhance the strength of user passwords, what are some of the best practices to implement for user password definitions to maximize confidentiality?
|