Access Control FInal Project

Topics: Computer network, Access control, Security Pages: 8 (1206 words) Published: November 17, 2014
ITT Technical institute – isc program
Project: Access Control Proposal
IS3230 - Access Control

Bernard Downing
David Crenshaw
/2014

1 INTRODUCTION
1.1 Title of the project
Access Control Proposal Project for IDI
1.2 Project schedule summary
The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms. 1.3 Project deliverables
• Solutions to the issues that specifies location of IDI is facing • Plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability • Assessment of strengths and weaknesses in current IDI systems • Address remote user and Web site user’s secure access requirements • Proposed budget for the project—Hardware only

• Prepare detailed network and configuration diagrams outlining the proposed change 1.4 Project Guides
Course Project Access Control Proposal Guide
Juniper Networks Campus LAN Reference Architecture
1.5 Project Members
David Crenshaw, IT Architect and IT Security Specialist
Members of the IT Staff

1.6 Purpose
A proposal for improving IDI’s computer network infrastructure is the purpose for this proposal. This project is intended to be used by IDI’s information security team to developing a plan to improve IDI’s computer network infrastructure at multiple locations. 1.7 Goals and Objectives

Objective 1
To assess the aging infrastructure and then develop a multi-year phased approach to have all sites (except for JV and SA) on the same hardware and software platforms. Objective 2
The core infrastructure (switches, routers, firewalls, servers and etc.) must capable of withstanding 10 – 15% growth every year for the next seven years with a three-to-four year phased technology refresh cycle. Objective 3

Solutions to the issues that the specifies location of IDI is facing Objective 4
Assessment of strengths and weaknesses in current IDI systems Objective 5
Address remote user and Web site user’s secure access requirements Objective 6
Prepare detailed network and configuration diagrams outlining the proposed change Objective 7
Prepare a 5 to 10 minute PowerPoint assisted presentation on important access control infrastructure, and management aspects from each location. Objective 8
A comprehensive network design that will incorporate all submitted requirements and allow for projected growth. Objective 9
Final testing of all installed hardware, software, and network connectivity. Objective 10
Initialization of the entire network and any last minute configuration adjustments to have the network up and operating within all specified ranges.

2 Current Environment
2.1 Overall:
There are a variety of servers, switches, routers, and internal hardware firewalls. Each of the organization’s locations is operating with different information technologies and infrastructure—IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations. The information technology infrastructure is old and many locations are running on outdated hardware and software. Also, the infrastructure is out dated in terms of patches and upgrades which greatly increase the risk to the network in terms of confidentiality, integrity, and availability. 2.2 Data Center:

Logisuite 4.2.2 has not been upgraded in almost 10 years. Also, numerous modifications have been made to the core engine and the license agreement has expired. Progressive upgrading to the current version will be required. As a result, renewing this product will be extremely cost and time-prohibitive.

RouteSim is a destination delivery program used to simulate routes, costs, and profits. It is not integrated into Logisuite or Oracle financials to take advantage of the databases for real-time currency evaluation and profit or loss projections.

IDI’s office automation...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • IS3230 Access Security Final Project Essay
  • lab 8 Access Controls Essay
  • Access Control Policy Essay
  • Essay about Access Control Policy
  • Access Control Policy Essay
  • remote access control policy Essay
  • Access Control Policy Essay
  • FINAL Project IS3230 Essay

Become a StudyMode Member

Sign Up - It's Free