Advanced Info Systems Design Discussion: "Project Proposal"

User Generated

ZbqreaXengbf

Computer Science

Description

Hello

I need help with creating a discussion post for the following:

Discuss with your peers the progress on your project proposal. Elaborate on your Module One discussion on the critical elements comprising the project proposal.

  • What system design methodologies and techniques will you use?
  • What potential risks do you see that may prevent successful completion of your solution design?

I have attached the discussion rubric, my mod1 discussion, and a draft of my project proposal to help assist with this assignment.

Thank you


Unformatted Attachment Preview

Discussion Rubric: Undergraduate Your active participation in the discussion topics is essential to your overall success this term. Discussion questions are designed to help you make meaningful connections between the course content and the larger concepts and goals of the course. These discussions offer you the opportunity to express your own thoughts, ask questions for clarification, and gain insight from your classmates’ responses and instructor’s guidance. Requirements for Discussion Topic Assignments Students are required to post one initial post and to follow up with at least two response posts for each discussion topic assignment. For your initial post (1), you must do the following: Compose a post of one to two paragraphs. In Module One, complete the initial post by Thursday at 11:59 p.m. Eastern Time. In Modules Two through Eight, complete the initial post by Thursday at 11:59 p.m. of your local time zone. Take into consideration material such as course content and other discussion topics from the current module and previous modules, when appropriate (make sure you are using proper citation methods for your discipline when referencing scholarly or popular resources). For your response posts (2), you must do the following: Reply to at least two different classmates outside of your own initial post thread. In Module One, complete the two response posts by Sunday at 11:59 p.m. Eastern Time. In Modules Two through Eight, complete the two response posts by Sunday at 11:59 p.m. of your local time zone. Demonstrate more depth and thought than simply stating that “I agree” or “You are wrong.” Guidance is provided for you in each discussion prompt. Rubric Critical Elements Comprehension Exemplary (100%) Develops an initial post with an organized, clear point of view or idea using rich and significant detail Timeliness Engagement Proficient (85%) Develops an initial post with a point of view or idea using adequate organization and detail Submits initial post on time Provides relevant and meaningful response posts with clarifying explanation and detail Provides relevant response posts with some explanation and detail Needs Improvement (55%) Develops an initial post with a point of view or idea but with some gaps in organization and detail Submits initial post one day late Provides somewhat relevant response posts with some explanation and detail Not Evident (0%) Does not develop an initial post with an organized point of view or idea Value 40 Submits initial post two or more days late Provides response posts that are generic with little explanation or detail 10 30 Writing (Mechanics) Writes posts that are easily understood, clear, and concise using proper citation methods where applicable with no errors in citations Writes posts that are easily understood using proper citation methods where applicable with few errors in citations Writes posts that are understandable using proper citation methods where applicable with a number of errors in citations Writes posts that others are not able to understand and does not use proper citation methods where applicable Total 20 100% Introduction ABC Health Care is a new startup company with 50 employees, which is having difficulty with their IT department and network security. The problem that ABC Health Care is facing is that the network administrator has very limited experience prior to joining ABC. This has caused the network of the company to be very limited with no security network, policies, or guidelines in place. This allows for intruders to easily enter systems to be able steal all the health records of all of ABC’s customers. The significance of security is extremely important to all companies that want to avoid data breaches. What makes this even more important for this company is that with the current set up it is easy for any person to connect to the network. This can be done through the company emails, internet browsing, or phishing. With ABC being a small startup company if just one data breach occurs it will ruin the company. The amount of money required to fix the breach and the loss of capability shown will be too much for the company. The solution that I am proposing is the use of a verity of F-Secure business level products. F-Secure is one of the top cyber security companies whose products and services will provide the necessary improvements to the security of the company. The main goal of this project is to use F-Secure to improve the security of the company to a level where it can be considered high level. The scope of this project will involve the IT department for the network and the entire company with the policies and guidelines. The timeline will be set to around a month depending on how the schedule proceeds with or without any unforeseen incidences. Verification Plan Feedback Plan At the end of the project when all the necessary F-secure products have been implemented the system will take two tests to ensure security. These tests are the red teaming stress test and the cyber security assessment test, both will test the security strength of the network and will report all weaknesses found through these tests. Criteria All feedback provided by the F-Secure red teaming stress test and cyber security assessments will be relevant and actionable until the completion of the tests without any issues. This will ensure that the network security system will be as secure as possible. Test Cases The implementation of this project will be tested with the trial and error method. After the tests feedback information is reported the necessary measures will be taken to fix the problems presented. When the fixes are made, the tests will be taken again and if there are still problem’s in the system this will repeat until the tests are completed without any issues. Hi Class My name is Mark and I have been working in Information Technology for almost ten years. Throughout the majority of my career, I have been an IT Support Specialist with the department of defense and department of treasury. The issue I am about to discuss does not only exist within my current organization but organizations in general. The primary problem that organizations of today face is network security, which is commonly referred to as data security which is a critical issue due to the fact they face the risk of being hacked. Smaller businesses are at a higher risk of being hacked because they fail to acquire security policies. Complacency should not be used as a defense, but companies should use adequate measures to eradicate this vice. An excellent example of such include Network monitoring. Network monitoring is used by most expertise and cash-strapped SMBs to enhance protection to prevent cybercrimes (Yates, 2016). Several advantages are associated with network monitoring in various organizations. One such advantage includes enhancement of early detection of threats. That is because monitoring provides an individual with an opportunity of identifying any suspicious actions through the acquisition of specific event logs. Moreover, network monitoring enhances internal security policies through monitoring of various policies and being alerted when something wrong happens. Efficient track records are yet another advantage associated with network monitoring because it helps to evaluate the actual financial position of the business (Yates, 016). As such, the provision of network monitoring will enhance the growth of the company and increase data security while at the same time complying with the federal government laws. REFERENCE Yates, C. (2016). The Importance of Network Monitoring. Compass Cyber Security. Discussion Post Feedbacks Mark, That's certainly a problem, but you may want to narrow it down a bit. It's up to you, but perhaps you may want to tackle a specific aspect of security. Thanks, Alex Nice Post Mark! Network security is a major issue. And a LARGE one at that. The process of keeping a local network security or more so a large network can be a daunting task that doesn't just require IT know-how but an understanding of Human Resources and how to motivate people to take security seriously. Security for small business is a great topic as a lot of cyber security is essentially making yourself too annoying of a target to be bothered with. I would be interested in what it takes to shore up the defenses of a local business quickly and efficiently Good Work and Good Luck with the Course! -Sam W.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

...


Anonymous
Just what I needed. Studypool is a lifesaver!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags