Preview

Access Control FInal Project

Powerful Essays
Open Document
Open Document
1206 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Access Control FInal Project
ITT Technical institute – isc program
Project: Access Control Proposal
IS3230 - Access Control

Bernard Downing
David Crenshaw
/2014

1 INTRODUCTION
1.1 Title of the project
Access Control Proposal Project for IDI
1.2 Project schedule summary
The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms.
1.3 Project deliverables
• Solutions to the issues that specifies location of IDI is facing
• Plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability
• Assessment of strengths and weaknesses in current IDI systems
• Address remote user and Web site user’s secure access requirements
• Proposed budget for the project—Hardware only
• Prepare detailed network and configuration diagrams outlining the proposed change
1.4 Project Guides
Course Project Access Control Proposal Guide
Juniper Networks Campus LAN Reference Architecture
1.5 Project Members
David Crenshaw, IT Architect and IT Security Specialist
Members of the IT Staff

1.6 Purpose
A proposal for improving IDI’s computer network infrastructure is the purpose for this proposal. This project is intended to be used by IDI’s information security team to developing a plan to improve IDI’s computer network infrastructure at multiple locations.
1.7 Goals and Objectives
Objective 1
To assess the aging infrastructure and then develop a multi-year phased approach to have all sites (except for JV and SA) on the same hardware and software platforms.
Objective 2
The core infrastructure (switches, routers, firewalls, servers and etc.) must capable of withstanding 10 – 15% growth every year for the next seven years with a three-to-four year phased technology refresh cycle.
Objective 3
Solutions to the issues that the specifies location of IDI is facing
Objective 4
Assessment of strengths and weaknesses in current IDI systems
Objective 5
Address remote user and Web site

You May Also Find These Documents Helpful

  • Powerful Essays

    A new independent company has recently purchased Tony’s Chips and the new leadership has decided to move the website to an internally hosted site instead of the current external hosted site. The new leadership is also requiring that a back-up site is available as they are very concerned about redundancy for the site. In addition to the migration of the website from an external host to an internal host the website will need to be redesigned in order to allow customers to order and purchase products online. In order to build the architecture, migrate the existing website along with adding the ability for the customers to place orders online and providing for redundancy of the site the system development life cycle (SDLC) will be used. The SDLC consists of five phases that will be utilized in this project and the five phases are systems planning, systems analysis, systems design, systems implementation, and systems support and security.…

    • 2777 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Bsa 375 Sr-Rm-022 Part 1

    • 1418 Words
    • 6 Pages

    Key stakeholders will include the end users of each system that is in use at this time. This can be organized into a JAD session for each area to acquire the information in a brain storming environment instead of the feeling of an interrogation. The…

    • 1418 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Good Essays

    Assignment 4 Nt2580

    • 485 Words
    • 2 Pages

    1. Secure remote access standard will be strictly controlled. Control will be enforced by a one-time password authentication and minimum 7 character length, special character and 1 numerical character with 1 month expiration.…

    • 485 Words
    • 2 Pages
    Good Essays
  • Good Essays

    For the recommendations on the tiered architecture I suggest three-tier architecture. This architecture is the most common. It consists of three tiers; a presentation tier, a logic tier, and a data tier…

    • 429 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cis 210 Research Paper

    • 1323 Words
    • 6 Pages

    Whether you are planning to implement a new site or upgrading an existing site to meet growing needs, the following provides guidelines for meeting the performance and availability demands of today’s online business environment. The mature business site is multi-tiered, with several hardware components,…

    • 1323 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Fast Streaming A collection of techniques that enables Windows Media Player to begin displaying streamed multimedia content more quickly.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    1. Where can you store your public keys or public certificate files in the public domain? Is this the same thing as a Public Key Infrastructure (KI) server?…

    • 943 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Nt2580 Final Project

    • 1848 Words
    • 6 Pages

    Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system.…

    • 1848 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Access Control Simulation

    • 698 Words
    • 3 Pages

    Upon entry the door was locked and a key card was required for this single point of entry. There were security cameras outside of the building. There was a dumpster outside that was not secured, which could allow anyone access to sensitive information. Locking the dumpster or placing it in a secured location would mitigate this risk. The receptionist did not ask me to verify my identity. The receptionist should be required to verify the identity of everyone entering building to prevent a person from entering the building that isn’t authorized. There was a security room with security personnel viewing the monitors. Office 1-1 had a post it note taped to computer monitor with names that could be passwords. Increased password security should be implemented to reduce the risk of someone hacking into a system. Both office 1-1 and 1-2 had fingerprint scanners, which increases access control. In office 1-2 there was an unattended paper shredder, which should be secured due to sensitive information. In the hallway there was a security camera and a utility box but the wire cabinet was not locked. As such, anyone can access the hardware inside. A lock should be installed to prevent unauthorized access to the hardware. Also in the hallway there was an Ethernet jack which allowed access to the internet. Controls should be put in place to require security access to logon to the network.…

    • 698 Words
    • 3 Pages
    Good Essays
  • Better Essays

    With the development of the new system, time is vital in designing of the new program. In addition, developing a whole new system or keeping the current system along with additional new features for Riordan Manufacturing can be costly. Therefore, the IT department would have to propose a system where it can take the current tools and the new features and compile them into a single web-based or dashboard application. The design of the new system can be achieved by taking advantage of a beneficial software system called Rapid Application Development (RAD). RAD "refers to a type of software development life cycle which uses minimal planning in favor of rapid prototyping" (Wikipedia, 2009) The benefits of the software are that during the planning stages, the software writes itself along with providing speed and flexibility. Furthermore, the IT department can review and define with the employees the business requirements for the system by using the Joint Application Development (JAD). JAD is also used in the SDLC that collects business requirements for the system. According to Wikipedia, the JAD process also includes approaches for enhancing user participation, expediting development, and improving the quality of specifications…

    • 1494 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Unit 53 Essay

    • 4323 Words
    • 18 Pages

    scheduled for release in October 2011 to provide the repeatable process for doing solution architecture.…

    • 4323 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Executive summary Introduction and scope Current state assessment Vendor analysis Peer analysis overview Solution options assessment Findings Conclusion Appendix A: Detailed solution options assessment 2 7 10 15 19 21 28 32 34…

    • 13276 Words
    • 54 Pages
    Powerful Essays