Description
This assignment consists of two (2) sections: an infrastructure
document and a revised Gantt chart or project plan. You must submit both
sections as separate files for the completion of this assignment. Label
each file name according to the section of the assignment it is written
for. Additionally, you may create and / or assume all necessary
assumptions needed for the completion of this assignment.
The
infrastructure which encompasses the network solution and security
considerations is a major consideration for your company. Considering
that the company will be expanding from one (1) floor to three (3)
floors in the very near future you, as the CIO, are responsible for the
design of the infrastructure and security protocols. You have been
tasked with designing a network that is stable, redundant, and scalable.
In addition, speed and reliability are important considerations.
Assumptions should be drawn regarding network usage in relationship to
network services and resources. All the established criteria that were
set at the onset should be adhered to within your plan. The network
solution that is chosen should support the conceived information system
and allow for scalability. The network infrastructure will support
organizational operations; therefore, a pictorial view of workstations,
servers, routers, bridges, gateways, and access points should be used.
In addition, access paths for Internet access should be depicted.
Additionally, the security of the network should be in the forefront of
your design because protecting your data is a primary consideration.
Section 1: Infrastructure Document
- Write a four to six (4-6) page infrastructure document in which you:
- Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.
- Present the rationale for the logical and physical topographical layout of the planned network.
- Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
- Illustrate the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Note: Facility limitations, workstations, databases, printers, routers, switches, bridges, and access points should be considered in the illustration.
- Create and describe a comprehensive security policy for this data-collection and analysis company that will:
- Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.
- Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.
- Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
- Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
- Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.
Use Microsoft Project to:
- Update the project plan from Project Deliverable 4: Analytics, Interfaces, and Cloud Technology, with three to five (3-5) new project tasks each consisting of five to ten (5-10) sub-tasks.
- Develop information systems-related activities to maximize the business value within and outside the organization.
- Demonstrate an understanding of existing and emerging information technologies, the functions of IS, and its impact on the organizational operations.
- Evaluate the issues and challenges associated with information systems integration.
- Use technology and information resources to research issues in information systems.
- Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions.
Explanation & Answer
Attached.
Running Head: DEVELOPMENT OF THE INFRASTRUCTURE
Development of the Infrastructure
Student’s Name:
Institutional Affiliation:
Professor:
Course Title:
Date:
1
Development of the infrastructure:
2
The company will host their servers and applications in the data centers. The data center in this
endeavor will, therefore, have an essential function of providing hosting capabilities to the
company. Some of the infrastructure installed in the data center includes surveillance cameras,
onsite security officers, biometric measuring device, fire clampdown system, standby generators
as well as onsite controlling. All the above infrastructure serves to secure the data center to
enable it to disseminate its services effectively. Some of the services provided in the internet data
center include shared web hosting, dedicated server hosting, colocation hosting and application
hosting.
Creating a scalable, robust and secure network is a demanding task that cannot be completed
with a single design. Therefore, I set to describe the new concept in several modules, which will
allow me to evaluate and implement security on an individual module basis. The new design will
have three functional modules as shown in the figure below.
Every module has specific functions and requires specific security measures that agree with his
duties.
Organization and Back-end Procedures
Development of the infrastructure:
3
The organizational and back-end procedures ensure secure management of all the network and
host devices amended in the IDC. The key devices in this module will include the firewall
management support, instruction detection system support, firewall, Network-based IDS, Syslog
server, network management system, TACACS servers, terminal server, and a two layer switch.
The firewall management support helps to manage its firewall as well as the customers’ firewall.
The instruction detection support will manage all IDS in the network as well as the host. It will
also serve as the center for alert notifications. The firewall will have some tunnels left that will
provide some acceptable levels of access. Since hackers can take advantage of the tubes since the
information passing through them goes undetected. Therefore, the system will rely on internal
devices to protect the network. The IDS will be used in this section to support the firewall. The
IDS in the system will be useful in detecting of any unsuccessful attack that may pass through
the firewall. All the network devices, as well as host, will send their logs to the Syslog Server.
TAC...