Review the attached case study and
a systems analysis based on the company in the case study.
2. Provide a description of the
"as-is" state of the company and their computing assets
(networks, servers, systems, etc.).
3. Conduct a complete analysis of the
architecture of the client's IT environment. This report provides a gap analysis that lists and explains the
assets along with their value and utility.
4. If you identify a
vulnerability, include its potential or real effects. Do not
include recommendations addressing the risks at this time. The audience for this report is your
client's executives and staff. Therefore, stick to just the facts as
presented in the case.
In a Word document, develop
a network diagram, physical
description of the facilities, documentation of the policies, standards, and procedures
you've identified from the case study. It should also include a listing of the most critical