Description
The design of your research should now be completed, and you are ready for the execution phase. This is a key step in the research process and should result is meaningful, measurable, and useful information that you will use later for analysis purposes. Proper execution of your research plan will play a large role in the success of your project.
For this assignment, you will continue your work on the project with the execution of the research portion of the project. Research identified in Week 2 will be conducted, results will be gathered, and a summary of the research results will be presented as part of the submission for the week. You will also provide a summary of how well the research process achieved the desired goals for the project.
The project deliverables are the following:
- New Content: Project Research Execution
- Research Execution
- Conduct the research identified in the research plan, and document the process as it is performed.
- Gather the research results in an organized format that clearly identifies how the results relate to the identified problem(s) and the benefits that can be expected from solutions that have been found.
- Research Results Summary
- Summarize the results of the research.
- ? Include a discussion of specific project objectives that can now be stated based upon the research. Each objective should be unique and not overlap with other objectives and each objective should be supported by information and measures identified via the research. For example, a potential problem could be a trend of reduced customer satisfaction that is correlated with reduced sales. Research concerning what causes this type of problem and research about solutions, may reveal many issues and solutions. For example, customer service could be slow due to an IT system that has a slow response time when customer service representatives access information. The online sales portal that the customers utilize (if there is one) could be too slow – it could also be confusing. It could be that it is needed to consider using Social Media as part of a new customer relations campaign that will place our company more in touch with each specific customer and allow the identification of trends in what customers want and what they think about our company.
- ? Discuss how tangible and intangible measures are related to each objective and solution. For example, reductions in labor cost due to a proposed change accomplished via a specific IT project, is a tangible measure. An increase in customer satisfaction is less tangible. It can be measured by a validated survey. But what is the monetary value of an increase in customer satisfaction? Company data and other research can show there is a direct correlation between sales and satisfaction and that increases in customer satisfaction are associated with a predictable (within a range) increase in sales.
- ? Provide a discussion of the relative effectiveness of the research and how it might be improved to gain better results. Was there further information that would be helpful that was not found?
- Research Execution
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached.
Individual Project assignment 3
Network design and architecture upgrade
Student’s name:
Institutional affiliation:
1
Individual Project assignment 3
Table of Contents
Project Overview ....................................................................................................................... 3
Project identification .................................................................................................................. 4
Final Topic ............................................................................................................................. 5
Project Plan ................................................................................................................................ 6
Research methodology ........................................................................................................... 6
Hypothesis 1 ........................................................................................................................... 6
Hypothesis 2 ........................................................................................................................... 7
Timelines and Resources ........................................................................................................ 7
Risk Management ................................................................................................................... 9
Project Execution ..................................................................................................................... 11
Research Execution .............................................................................................................. 11
Results of the Research ........................................................................................................ 13
Summary of the Research Results ........................................................................................ 17
Proposed Solution .................................................................................................................... 18
Project plan .............................................................................................................................. 20
Cost benefits analysis ............................................................................................................... 21
References ................................................................................................................................ 22
2
Individual Project assignment 3
Project Overview
City of Cripple Creek is small municipality with an employee count of 150 in the Colorado
State. Under this Municipality there exist various locations which resides several departments
of the municipality like public works. The location city of Hall is one of the major one as it
has seven sub departments under it and it is also considered as the main location for the
network. The seven sub department sunder the city of Hall were like administration, Finance,
Human resources, Development and marketing related departments and all these departments
comprises of complete planning, building and historic preservation of the city . The data
center is also hosted at the city of hall and it is taken care by the IT company which is a third
party consulting firm which also look after the IT needs of the municipality.
In total there exists four server inside the city of hall and were like finance related, water
billing, web and data storage, and the last one is police department server which is used to
store om confidential information and it accommodates the confidentiality requirements of
the police department. All these four locations were possess wireless connections. And all
other external location will have access to the network through VPN connections.
Now the main goals of the organization or municipality is to improvise the existing tourism
industry with n the city by maintaining a historical background and according to the main
goals of the organization, each department of the organization also have some specific goals
and objectives to achieve.
Thus the organization wants to improvise the existing infrastructure within the organization
in two ways. They would lie enhance the architecture of the current network along with
enhancement of the security of the network. it is also noticeable that in the last 5 years, the
network underwent no improvements and thus network is now in condition to exhibit the
signs of the distress.
3
Individual Project assignment 3
Project identification
The organization is in a need of the upgrading of the current network for the purpose of
including the security measures. The current and existing layout of the network in place with
in the organization is not meeting the demands put on the network and it is also encountered
that current network is not scalable for the threats which were upcoming with the emerging of
the cloud computing technology; which Is currently implemented within the police
department.
Budgets in the past was not allocated in sufficient way required for the appropriate upgrades
of the system and thus the current system in place is now became out dated and become more
sluggish.
The project team will now begin by performing the deep review of the network layout in its
current state which will help them in identifying the loopholes with in the current system and
also in identifying the various devices that are in place and can determine what are the
improvements must be implemented for the purpose of improving the network and also
which can help eliminate vulnerabilities ad threats. A deep review over the hardware and
software will also help the team with necessary recommendations for the improvement. It is
true that understanding what is in place currently and where the organization is going will
definitely help the team in providing the appropriate and accurate recommendations.
The second step next to the above will include a review of the security measures that is in
place currently within the organization. These security measures includes security if the
network, policies and procedures along with standards currently in usage. The team will
consider this information during the process of identifying the changes in the network
configuration.
As a final step, the team will now consider all the information gathered so far form the above
steps and use those data in researching regarding the alternatives and the upgrades to the
4
Individual Project assignment 3
existing system within the organization. The team will utilize their past experiences and
knowledge gained for the improvement of the security issues in researching the various tools
and techniques that are available and using their experiences with the different products to
help in producing a layered defense for the organization.
Final Topic
The main and major areas to be focused by the team will include management of the network
and management of the security. Looking at the enterprise architecture, it can be determined
whether there exists any configuration portion problem or not. A thorough review must be
carried over the each and every devices and complete layout of the network to check if there
are any single faults which can be eliminated and can produce a better network layout of the
network which is in place. The aspect t related to the security will have major focus ad certain
res were like application data security, operating system security and overall management of
the security.
This will helps to cover all the aspects of the business among with daily business activities
sin detail. Coming to the security of the data which is gathered and stored, there exist several
tools and techniques for different types of operating systems within the organization and also
for reviewing of the overall security management of the organization.
The project team is with enough confidence that by consuming enough time to understand the
entire organization and the network currently in place, they can be able to yield a better plan
which can helps the organization in all aspects like enhancing its security and increasing it
scalability. Reviewing the needs and daily business activities will also provide the team with
major insights for the prioritizing the risks within the organization.
5
Individual Project assignment 3
Project Plan
In this step, the team is more focused and look deep towards the problem identified and also
discuss regarding how to move forward and this entire process will incudes a plan of research
along with a certain timeline for the problem. Thus, grant chart is provided by the team in
order to represent the details of the project and also timeline of each phase involved in the
project.
Research methodology
The research methodology of this project involves two hypothesis and the team involved will
be responsible for reviewing about the what data to be collected and also involves regular
review of the timelines and processes. Even certain discussions among them also conducted
over the flow of tasks and also regarding the duration o each activity.
Finally,
this
above process also involves a review of the risks associated with the project along with the
suggested risk mitigation strategies.
Hypothesis 1
The organization currently facing issues regarding the internal and external connectivity and
it is because of the using the outdated network components.
The above mentioned first hypothesis will kick started with a the step of collecting the data
through surveys from both external and internal resources of the organization. The team will
collect the required information from the management of the organization, employees of the
organization and also from the consumers of the organization in order to get clearly
understand where the actual problem is starting and also for the purpose of coming up with
any alternative means to fix the problem . The data collected from above mentioned resources
of the organization will actually involves and focuses on what exactly ae the issues these
individuals faced in using the system, the general frequency if those recorded issues, and also
6
Individual Project assignment 3
duration of the each issues resulting in down time. The team will finish the complete layout
diagram of the current network to understand how it is configured and working. Even
inventory of all the network devices and cables is also carried by the team. Tus network
architecture of the organization will become familiar to the team members.
Next to the above steps the team will now gather all the data collected from different surveys
and will compare this o the current system situation and also about the reasonable expectation
for the system.
Hypothesis 2
The current network has some security issues because of the degrades network devices and
the entire network architecture.
The research for the above hypothesis will definitely work in conjunction with the first
mentioned hypothesis statement. The data which is collected before formulating the
hypothesis will be served as the starting point for this hypothesis, but more focus is laid over
the network devices, policies, procedures and the standards of the organization. Feedback
from the management about the issues faced in regarding to the security concerns will be
recorded and documented by the team members. All the devices used in the network were
listed out by the team and also determines regarding the actual security measures currently in
place within the network. Even with this step, the employed software programs like antivirus, anti-malware and certain monitoring systems like IDS or IPS. Risk resulting policies
and procedures were also observed primarily by the team.
Timelines and Resources
The team will next discuss regarding the time line of the entire project for the purpose of
including the phases of the project. One year is allocat...