Preview

Proposal

Powerful Essays
Open Document
Open Document
1277 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Proposal
Introduction

Bluesky Systems is a software development company that builds software components for a variety of private and government clients. Their current infrastructure is outdated and has been prone to being attacked by hackers that have exploited vulnerabilities in their current DNS causing serious down time. In the last 4 years Bluesky has had to recover from numerous disasters due to a lack of any good business continuity planning. Remote access to the two existing sites is allowed using Cisco VPN technology. This has caused numerous security issues because of missing security patches, outdated AV signatures and missing OS patches and updates.

Bluesky currently has 45 employees in their Tucson location and 15 in their Phoenix location. Bluesky is preparing to add another remote site in Sierra Vista to support their military contracts scheduled to be awarded in 2014. The Sierra Vista location will add another 12 employees to the network. Bluesky needs to bring their current infrastructure into strict compliance with government security as a trusted network with access to government data. Bluesky Systems needs to upgrade their current infrastructure of Windows Server 2003 to Windows Server 2008. The move is designed to improve over all server performance, security, application and data provisioning, monitoring, and business continuity. This is will also begin the process of bringing Bluesky into compliance as a trusted government network.

Current Infrastructure:

Bluesky has a main site located in Tucson Arizona with one remote site located Phoenix, Arizona. Another remote site is proposed for 2014 for Sierra Vista, Arizona which add an additional 12 employees. The three sites will be connected via a VPN connection built between their three ASA firewalls. The existing two sites are configured as follows.

The Blue Sky internal domain located in Tucson, called bluesky.local has two domain controllers. All servers run Microsoft Windows Server

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    All of the servers will be virtual, and a backup of each server will be refreshed weekly and saved to cloud storage. All company data will be backed up and saved to cloud storage daily. All users requiring remote access will have a VPN set up with strict login requirements. These users will also have their laptops checked by the IT department on a monthly basis to ensure that they are in compliance with company security policy.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    | * Patch history * VPN * Firewall * Stateful Inspection * Whitelists-Blacklists * Boundary Encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    IS3230 Final Project

    • 687 Words
    • 2 Pages

    The entirety of the network will have to be protected with Barracuda Firewalls as the threat to intrusion is rather high judging the frequency of the preceding attacks. The company will need to do a cost management analysis to this, however from my understanding, with the increased efficiency; we will be looking to come out on top after a three year return of investment on this purchase. I fully recommend we look at putting a honeypot somewhere in the DMZ so we can monitor how hackers attempt to gain access and thwart their efforts in the future. The Warsaw, Poland location, we must find a new proxy server to replace the IBM Infinity hardened server.…

    • 687 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix D IT244

    • 827 Words
    • 4 Pages

    The Mission Critical business systems that need protection the most in the event of a disaster are first going to be the computers in each branch, followed by the servers in the central hub for intranet finances, web, inventory as well as HR services. Customers are the life blood of Sunica Music and if we cannot provide our service to them then critical business has stopped, for this our central financial software has to be running in order to record finances and communicate to the new inventory system which orders alongside the financial system.…

    • 827 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Update all anti-virus software Security Policy needs to be documented and implemented Weak user passwords need to be strengthened Proper security personnel Wrong building fire protection needs corrected Remote access needs to be hardened with VPN restrictions II. No Plan…

    • 186 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Riordan Manufacturing performs an information systems security analysis over its physical and network security. Several elements of the IT system require revisions, such as restrictions to physical access to vital IT systems and upgrades to outdated systems within the network.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Aircraft Solution

    • 1151 Words
    • 5 Pages

    It is very curious that there is no firewall implemented between the
commercial division and the Internet. The Defense Department must be routed through
Headquarters, but the Commercial department is connected straight to the Internet. This is a
significant vulnerability. The second weakness that will be examined is the security policy
stating router and firewall rule sets should be evaluated every two years. Such a time span
between rule-set evaluations is also a substantial liability to the continued and unimpeded
 success of the organization. Further elaboration of the identified security vulnerabilities is 
presented.…

    • 1151 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Blue Sky is a fifteen year old software-consulting firm, however, has some obstacle to overcome. As the consultant, I will respond to four outlined questions pertaining to the case study. This analysis will provide areas of improvement for Blue Sky Software and the necessary management techniques to make for their organization to run functional and efficient.…

    • 2111 Words
    • 9 Pages
    Better Essays
  • Best Essays

    Proposal

    • 3044 Words
    • 13 Pages

    Stock Market (SM) is a health centric food outlet located within the University of New South Wales, upper campus in Mathews Food Court (MFC). SM entered the UNSW market in February 2008 simultaneously to its’ neighbouring competitors in MFC. In order to attain a competitive advantage SM management’s stated focal objective is to enhance its ‘customer value for money’ offering through the continual evolution of its products, services, and layout.…

    • 3044 Words
    • 13 Pages
    Best Essays
  • Better Essays

    proposal

    • 1111 Words
    • 5 Pages

    Will Bury, an enterprising inventor, is convinced that soon everyone will be reading or listening to everything digitally, including books that have been mostly available in hard copy. He knows that there are books on CD, but these are relatively expensive and have been recorded using human readers. He also knows that there is technology that can transform the printed word into audio, but the sound is somewhat inhuman. Will plans on speeding up the transformation with a proprietary technology he has developed and patented. This technology takes the printed word for text materials and creates a file with the option of reading it digitally or listening to it with a realistic synthetic voice. Will knows that he has free access to books no longer under copyright protection, and he figures he can pay a royalty fee of $5 per title for copyrighted books that will greatly expand his catalog. So far, he has limited himself to English-language books but is working on a language translation option as well.…

    • 1111 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Proposal

    • 1378 Words
    • 6 Pages

    With the Simulation software, it is relatively easy to change the features or price point of a product and have the simulation software predict the market share that the product would attain in the market. This I hope to achieve by using the computer to emulate a real world situation. It is time based, and takes into account all the resources and constraints involved, as well as the way these things interacts with each other as time passes. Simulation also builds in the randomness that would be seen in real life. For instance, it doesn’t always take exactly 5-minutes for a customer to be served and a customer don’t always arrive every 15-minutes. This means that the simulation really can match reality, so when one make changes to the simulation; it will demonstrate exactly how the system would behave in real life.…

    • 1378 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    In order to reduce the risks and vulnerabilities of each location, we must implement access control to ensure confidentiality, integrity, and availability. For the Billing, Montana location we have to consolidate 14 Hewlett Packard Unix servers to 1 UNIX server. Upgrade 75 Microsoft Windows servers to Windows server 2008 R2. Upgrade MS exchange e-mail to latest version. We must find another software vendor to replace Oracle financials for accounting and financial systems, Logisuite 4.2.2, and RouteSim. We have to hire developers to standardize the office automation hardware and software. Convert telecommunications system to a VOIP system. Design and implement a new Acceptable Use Policy (AUP) and upgrade WAN to a T1 MPLS to increase bandwidth. The Warsaw, Poland location, we must…

    • 622 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Businesses today must manage growing risks to their mission critical networks from attacks such as spyware, rogue wireless LANs, compromised remote/VPN users, DDOS attacks, system misconfigurations, and unpatched OS 's, all of which increase the risk of a network breach and interruption to both sales and business operations.…

    • 1280 Words
    • 6 Pages
    Better Essays