Project Deliverable 5: Infrastructure and Security

Project Deliverable 5: Infrastructure and Security

This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one (1) floor to three (3) floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. Additionally, the security of the network should be in the forefront of your design because protecting your data is a primary consideration.

Section 1: Infrastructure Document

  1. Write a four to six (4-6) page infrastructure document in which you:
    • Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.
    • Present the rationale for the logical and physical topographical layout of the planned network.
    • Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
    • Illustrate the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Note: Facility limitations, workstations, databases, printers, routers, switches, bridges, and access points should be considered in the illustration.
    • Create and describe a comprehensive security policy for this data-collection and analysis company that will:
  • Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.
  • Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Your assignment must follow these formatting requirements:

  • This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.

Section 2: Revised Project Plan

Use Microsoft Project to:

  1. Update the project plan from Project Deliverable 4: Analytics, Interfaces, and Cloud Technology, with three to five (3-5) new project tasks each consisting of five to ten (5-10) sub-tasks.

The specific course learning outcomes associated with this assignment are:

  • Develop information systems-related activities to maximize the business value within and outside the organization.
  • Demonstrate an understanding of existing and emerging information technologies, the functions of IS, and its impact on the organizational operations.
  • Evaluate the issues and challenges associated with information systems integration.
  • Use technology and information resources to research issues in information systems.
  • Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions.

 

Project Deliverable 5: Infrastructure and Security 
Criteria  

Unacceptable
Below 60% F

Meets Minimum Expectations
60-69% D
 

Fair
70-79% C

 

Proficient
80-89% B

 

Exemplary
90-100% A

Section 1: Infrastructure Document
1a. Justify and support the relationship between infrastructure and security as it relates to this data- collection and analysis company.
Weight: 15%
Did not submit or incompletely justified and supported the relationship between infrastructure and security as it relates to this data-collection and analysis company. Insufficiently justified and supported the relationship between infrastructure and security as it relates to this data-collection and analysis company. Partially justified and supported the relationship between infrastructure and security as it relates to this data-collection and analysis company. Satisfactorily justified and supported the relationship between infrastructure and security as it relates to this data-collection and analysis company. Thoroughly justified and supported the relationship between infrastructure and security as it relates to this data-collection and analysis company.
1b. Present the rationale for the logical and physical topographical layout of the planned network.
Weight: 20%
Did not submit or incompletely presented the rationale for the logical and physical topographical layout of the planned network. Insufficiently presented the rationale for the logical and physical topographical layout of the planned network. Partially presented the rationale for the logical and physical topographical layout of the planned network. Satisfactorily presented the rationale for the logical and physical topographical layout of the planned network. Thoroughly presented the rationale for the logical and physical topographical layout of the planned network.
1c. Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia.
Weight: 15%
Did not submit or incompletely designed a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Insufficiently designed a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Partially designed a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Satisfactorily designed a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Thoroughly designed a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia.
1d. Illustrate the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls.
Weight: 15%
Did not submit or incompletely illustrated the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Insufficiently illustrated the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Partially illustrated the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Satisfactorily illustrated the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Thoroughly illustrated the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls.
1ei. Create and describe a comprehensive security policy for this data collection and analysis company that will protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA).
Weight: 10%
Did not submit or incompletely created and described a comprehensive security policy for this data collection and analysis company that will protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Insufficiently created and described a comprehensive security policy for this data collection and analysis company that will protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Partially created and described a comprehensive security policy for this data collection and analysis company that will protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Satisfactorily created and described a comprehensive security policy for this data collection and analysis company that will protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Thoroughly created and described a comprehensive security policy for this data collection and analysis company that will protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA).
1eii. Create and describe a comprehensive security policy for this data-collection and analysis company that will address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.
Weight: 10%
Did not submit or incompletely created and described a comprehensive security policy for this data-collection and analysis company that will address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information. Insufficiently created and described a comprehensive security policy for this data-collection and analysis company that will address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information. Partially created and described a comprehensive security policy for this data-collection and analysis company that will address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information. Satisfactorily created and described a comprehensive security policy for this data- collection and analysis company that will address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information. Thoroughly created and described a comprehensive security policy for this data- collection and analysis company that will address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.
Section 2: Revised Project Plan
2. Update the project plan from Project Deliverable 4: Analytics, Interfaces, and Cloud Technology,with three to five (3-5) new project tasks each consisting of five to ten (5-10) sub-tasks.
Weight: 5%
Did not submit or incompletely updated the project plan from Project Deliverable 4: Analytics, Interfaces, and Cloud Technology,with three to five (3-5) newproject tasks each consisting of five to ten (5-10) sub-tasks. Insufficiently updated the project plan from Project Deliverable 4: Analytics, Interfaces, and Cloud Technology,with three to five (3-5) newproject tasks each consisting of five to ten (5-10) sub-tasks. Partially updated the project plan from Project Deliverable 4: Analytics, Interfaces, and Cloud Technology,with three to five (3-5) newproject tasks each consisting of five to ten (5-10) sub-tasks. Satisfactorily updated the project plan from Project Deliverable 4: Analytics, Interfaces, and Cloud Technology,with three to five (3-5) newproject tasks each consisting of five to ten (5-10) sub-tasks. Thoroughly updated the project plan from Project Deliverable 4: Analytics, Interfaces, and Cloud Technology, with three to five (3-5) newproject tasks each consisting of five to ten (5-10) sub-tasks.
3. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 8 errors present 7-8 errors present 5-6 errors present 3-4 errors present 0-2 errors present

 

 

 

 

Sociology Assignment 3a: Presentation on Threats to the Global Environment

 

Congratulations! The members of the United Nations found great value in the two analyses you provided. They are now asking you to develop a PowerPoint presentation that addresses the four most critical threats to the global environment. They are listed in the table below.

 

Energy sources Civil war
Globalization Poor health of entire populations
Lack of educational opportunities Cultural taboos
Inappropriate uses of technology Climate change

 

To complete this task, you must do the following:

 

Step I. Narrow the List from Eight to the Four Most Critical Threats

To complete this step, complete the following tasks in order:

  • Review research on each of the eight threats listed in the table.
  • Determine what you believe to be the current and potential future impacts of each threat on the global environment.
  • Choose the four threats that you see as the most critical by considering which pose the greatest or most immediate risk to us.

 

 

Step II. Create the PowerPoint Presentation

The completed version of this presentation will include a minimum of 19 slides. Your audience consists of the United Nations General Assembly.

 PPT Content and Structure

  1. A Title Slide: Include your name, course title, current date, and the name of your instructor.
  2. An Introduction Slide: List the four threats you chose, and in the Notes section offer a brief narrative justifying these choices
  3. Body Slides:The slide content is listed in the outline below. For each body slide you develop, please include a paragraph in the Notes section explaining how the details you have provided in the slide are pertinent to the United Nations’ discussion on selecting and prioritizing goals.

 

  1. For your first threat(this is the threat you consider to be the greatest risk/highest priority)
  2. One slide on a brief history and assessment of the threat
  3. One slide on the countries most affected by the threat, and how those countries are affected (please give examples)
  4. One slide on the effects of this threat on the world population as a whole
  5. One slide including a chart, graph, or compelling visual that relates to the content you present in body slides a–c
  6. For your second threat (this is the threat you consider to be the second greatest risk/second highest priority)
    1. One slide on a brief history and assessment of the threat
    2. One slide on the countries most affected by the threat, and how those countries are affected (please give examples)
    3. One slide on the effects of this threat on the world population as a whole
    4. One slide including a chart, graph, or compelling visual that relates to the content you present in body slides a–c

 

III.             For your third threat (this is the threat you consider to be the third greatest threat/highest priority)

  1. One slide on a brief history and assessment of the threat
  2. One slide on the countries most affected by the threat, and how those countries are affected (please give examples)
  3. One slide on the effects of this threat on the world population as a whole
  4. One slide including a chart, graph, or compelling visual that relates to the content you present in body slides a–c
  5. For your fourth threat (this is the threat you consider to be the fourth greatest threat/highest priority)
  6. One slide on a brief history and assessment of the threat
  7. One slide on the countries most affected by the threat, and how those countries are affected (please give examples)
  8. One slide on the effects of this threat on the world population as a whole
  9. One slide including a chart, graph, or compelling visual that relates to the content you present in body slides a–c
  10. A Conclusion Slide: Summarize your findings for the Assembly.
  11. Optional – Reference Slide: You can include full-text citations in the Notes section of each slide or provide a reference slide at the end of the presentation with the full citations of your sources.

Note: Please discuss the threats in order of priority as described above, so the threat you consider the greatest should be discussed first in the presentation and so on.

Note: Please use at least five credible sources to back up your discussion

Note: The body slides should summarize your key takeaways, whereas the Notes section of each body slide should discuss the evidence and the details that support your takeaways. The content in both the Notes and body sections requires citations and sources.

Formatting Guidelines

Success Tip: For more information and help in creating a PowerPoint, review the content found in the PowerPoint Essentials course on Lynda.com. (https://www.lynda.com/PowerPoint-tutorials/PowerPoint-2019-Essential-Training/740357-2.html?org=strayer.edu)

The specific course learning outcome associated with this assignment is as follows:

  • Examine the factors that account for why the growth in the world’s population can negatively affect the global society.

 

Grading for this assignment will be based on answer quality, logic/organization of the presentation, and language and writing skills, using the following rubric:

 

Points: 150 Assignment 3a: Presentation on Threats to the Global Environment
Criteria Exemplary

90–100% A

Proficient

80–89% B

Fair

70–79% C

Meets Minimum Expectations
60–69% D
Unacceptable

Below 60% F

From the given list, prioritized four of the eight global threats for the presentation.

Weight: 20%

Selected and prioritized four issues from the given list. Selected and prioritized only three issues from the given list. Selected only two issues from the given list. Selected only one issue from the given list. Did not select any issues from the given list.
Completed a minimum of four slides per threat (minimum of 16 total slides), addressing the following: the threat’s history, affected countries, and effects on the global population.  


Weight: 20%

Compiled 4 or more slides per threat and exceeded expectations explaining the threat’s history, affected countries, and effects on the global population. Compiled 4 slides per issue and proficiently explained the threat’s history, affected countries, and effects on the global population. Compiled 4 slides per issue and briefly addressed all of the required topics: the threat’s history, affected countries, and effects on the global population. Compiled 2–3 slides per issue and did not adequately address all the required topics: the threat’s history, affected countries, and effects on the global population.

 

Compiled fewer than 2 slides per issue.
Incorporated a relevant visual for each threat and explained in the notes how the details provided in the slide are pertinent to the UN’s discussion on selecting and prioritizing goals.

 

Weight: 20%

Exceeded expectations in providing one relevant visual per threat and comprehensive notes that explain how the slide information is pertinent to the UN’s discussion on selecting and prioritizing goals. Met expectations in providing one relevant visual per threat and notes that explain how the slide information is pertinent to the UN’s discussion on selecting and prioritizing goals. Provided visuals for all threats and sufficient notes for most slides that explain how the slide information is pertinent to the UN’s discussion on selecting and prioritizing goals. Provided visuals for 2–3 threats and some notes for most slides that explain how the slide information is pertinent to the UN’s discussion on selecting and prioritizing goals. Provided fewer than 2 visuals and notes for fewer than 50% of the slides.
Met the minimum requirement of five credible sources/citations.

 

Weight: 20%

Met the minimum credible source and proper citation requirement.

 

Used 4 credible sources, with few citation errors.

 

Used at least 3 credible sources and properly cited sources.

 

Used at least 2 sources but did not properly cite sources.

 

Used 1 or fewer sources.

 

Clarity, writing mechanics, and formatting.

 

Weight: 20%

0–2 errors present. 3–4 errors present. 5–6 errors present. 7–8 errors present. More than 8 errors present.

 

 

 

Two discussions (around 200 words each)

 

Discussion 1

“Value” Please respond to the following:

  • Assess BCP as a process that adds business value. Give your opinion on whether or not the argument that states BCP adds value is a credible argument. Explain why or why not.
  • Speculate the strategic values that could be realized by having an effective BCP. Provide a rationale for your answer.

 

Discussion 2

“Cloud Computing” Please respond to the following:

  • Evaluate the benefits of cloud computing for modern and legacy organizations looking to migrate to the cloud. Support the use of cloud computing as a viable option within an organizational business continuity strategy.
  • Identify the drawbacks for using cloud computing in your BCP. Determine the strategies you would use to mitigate the drawbacks if you were the IT manager in charge of the decision. Provide a rationale for your answer.

 

 

 
ORDER THIS PAPER OR A SIMILAR ONE WITH PRO WRITING TUTORS AND GET AN AMAZING DISCOUNT"