Describe three best practices for securing the laptops

Assignment Help Management Information Sys
Reference no: EM131198682

Assignment 1: Preparing for a Company-Wide Migration to Windows 8

Crescent Manufacturing Inc. (CMI) is a luxury leader in crafted and customized home furnishings. The corporate headquarters and a production facility are located in Texas, with additional manufacturing facilities located in Nebraska and Maryland.

There are 250 employees in the Texas location, 175 in Maryland, and 25 in Nebraska. All locations use Windows 7 as the primary client operating system. The systems at the Maryland location are over five (5) years old. CMI's Information Technology (IT) department upgraded the computer systems with new hardware within the past year at all other company locations. These upgraded computer systems are capable of running Windows 8. CMI recently upgraded all of its servers to run Windows Server 2012 in an Active-Directory-based environment.

The Operations, Marketing, Administration, IT Support, and Finance departments are located in the Texas location. Nebraska is primarily a manufacturing location that is staffed by production line employees, a line supervisor, and a plant manager. The Maryland office also includes an operations component (i.e., production line employees, line supervisor, and plant manager), a small IT department, and the company's human resources department.

The current IT support staff comprises a seasoned group of individuals that collectively have over ten (10) years of experience in network administration and working with Microsoft operating systems. Many of the IT staff have recently completed training on the Windows 8 operating system and are well-versed in supporting Windows Server 2008 and 2012. The remainder of the company's employees has only a basic knowledge of Windows 7 and relies on the company's help desk to solve a majority of its computer problems. CMI has a team of 50 salespeople who use laptops and tablets while working from their home offices. These employees, who travel extensively with their laptops, must have their systems secured in case of loss or theft. The laptops, purchased over five (5) years ago, run the Windows 7 operating system. The tablets, used only by a subset of the sales staff, are iPads running iOS 7.

The Chief Information Officer (CIO) is concerned about employees installing non-standard company applications downloaded from the Windows Store both while at work and when they have their devices at home. The CIO also wants to ensure that those persons on the IT staff are the only individuals authorized to update Windows Store apps. The CIO has an IT support staff of ten (10) employees and does not want to increase the number of applications that need to be supported via the company's help desk. The help desk is currently staffed by three (3) employees from 8:00 a.m. - 5:00 p.m. (CST).

Hardware and software compatibility issues experienced during the upgrade to Windows 7 several years earlier resulted in the company going over budget by several thousands of dollars. The CFO stated that the reason for going over budget was directly related to problems with their business critical applications not being fully compatible with Windows 7. The applications are used by the Operations department to track inventory, schedule production runs, handle purchase orders, and track product shipments. Senior management wants to address software compatibility testing prior to moving the entire company to Windows 8. They are also concerned about the time it might take to migrate user settings and applications over to the new Windows 8 operating system, the time to train employees on using the new interface, the overall impact on the company's help desk, and day-to-day operations.

The CIO and Chief Financial Officer (CFO) want more information before making the decision to upgrade to Windows 8 and have asked you to write a report that addresses their concerns and also includes your recommendations on how best to proceed, should the project be approved.

Write an eight to ten (8-10) page paper in which you:

1. Develop a SWOT analysis on the viability of upgrading to Windows 8 for the organization as a whole.

2. Provide a detailed upgrade plan for the organization, including the sales staff. At a minimum:

a. Identify the number of systems, by location and / or departments that IT must replace with new or compatible hardware.

b. Recommend whether the organization should use a phased-in approach (i.e., upgrades are sequenced by departments and / or locations) or a flash-cut approach (i.e., all at once) in order to upgrade to Windows 8. If a phased-in approach is recommended, identify the departments and / or locations you would upgrade, and describe the preferred upgrade sequence. Support your recommendations.

c. Address the length of time in which the upgrade should occur, and identify the main issues which could impact the specified time frame.

d. Describe one (1) approach that IT could use in order to ensure that they thoroughly test business critical applications.

3. Describe three (3) best practices for securing the laptops and tablets for the sales staff after the upgrade is complete.

4. Examine the pros and cons of configuring AppLocker to standardize the software used by employees across the organization.

5. Explain the process and options available for managing application installations and updates via the Windows Store, and thus addressing the concerns voiced by the CIO.

6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Demonstrate the ability to install and configure a client operating system, applications, and associated updates as well as designing a client operating system installation strategy.

Validate and successfully install a computer client operating system.

Demonstrate the ability to discuss the migration phases and considerations in a client operating system installation to include virtual machines and the cloud infrastructure.

Demonstrate the ability to apply technology tools to monitor and configure applications and network performance.

Use technology and information resources to research issues in operating system environments.

Write clearly and concisely about desktop administration and operating system topics using proper writing mechanics and technical style conventions.

Reference no: EM131198682

Questions Cloud

Prepare throughout the class should be prepared using apa : Milestone One-The project document you will prepare throughout the class should be prepared using APA guidelines. The paper should be double-spaced, using Arial or equivalent, 12-point font.
Warner-lambert guilty of fraud : Is Warner-Lambert guilty of Fraud? If so, what remedies should the court have imposed on the company?
Is the tax position of the taxpayer likely to change : In the given independent situations, is the tax position of the taxpayer likely to change? -- Explain why or why not.
International financial reporting standards : International Financial Reporting Standards (IFRS): Requires that receivables with different characteristics should be reported as one un-segregated amount.
Describe three best practices for securing the laptops : Demonstrate the ability to discuss the migration phases and considerations in a client operating system installation to include virtual machines and the cloud infrastructure.
What is the after tax cost of the common stock : What is the after-tax cost of the mortgage bonds? - What is the after-tax cost of the common stock? - What is the weighted average cost of capital for Schipper?
Develop the identity management and security awareness plan : Utilizing your comprehensive security plan outline as a guide, develop the identity management and security awareness training plan strategy for the organization. Upload the assignment in Microsoft Word format.
What would be expected as a registered nurse : Thinking about what would be expected as a registered nurse working in a secure dementia care facility, you are planning care for Mrs M who is now in the middle to later stages of dementia.
Prevent optical damage to the windows of the cell : what is the minimum value of the laser pulse energy per unit area that can be used to excite SBS? (SBS is often excited by tightly focused laser beams rather than by collimated beams to prevent optical damage to the windows of the cell

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  Sales tracking and customer relations analysesaimsto

sales tracking and customer relations analysesaimsto analyse a set of data in microsoft excel and write a brief report

  Data on individuals into comprehensive databases

Collecting Data on Individuals into Comprehensive Databases - individuals into comprehensive databases.

  Explain what management strategies may be adopted

In addition to technical instruments, what management strategies may be adopted in order to prevent employees from compromising information security?

  Describe the security breach of customer information

Describe the security breach of customer's information at the company you researched. Explain how the lessons learned may apply to other companies, both large and small. Put special emphasis on how such a security breach can affect small companies..

  What mobile operating systems will you design your app

Discuss the following ideas: How will you attract current and new customers to your mobile app by using social media? What mobile operating systems will you design your app for and why

  Security and privacy in technology in health care

security and privacy in technology in health care industrywhat would you want your health care provider to do in order

  Why are shares a source of system vulnerabilities

How does Microsoft Baseline Security Analyzer (MBSA) differ from Windows Update? Why are Shares a source of system vulnerabilities

  Describe the decision-making and problem-solving processes

Describe the decision-making and problem-solving processes and Provide at least two examples of the types of decisions that are made by DSS

  Explain what are major forms of computer crime

What are major forms of computer crime and What are some of the current ways that police and other officials are using to track the criminals and enforce the laws?

  What will you recommend that larita change

Your coworker LaRita has asked you to review her slide presentation You notice that it is difficult to recognize and process the most important ideas and information. To help her fix this, what will you recommend that she change?

  Research wearables technologies and mobile apps

Research wearables technologies, mobile apps and hardware projects currently under development; feel free to use crowdsourcing websites, such as Kickstarter, Indiegogo, RocketHub, or Circet.

  Bcp versus drp revisited

BCP versus DRP Revisited-Take a position on whether BC or DR can survive without the other. Use a real-world example to support your position

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd