Best practices for securing the laptops and tablets

Assignment Help Computer Network Security
Reference no: EM13805182

Assignment: Preparing for a Company-Wide Migration to Windows 8

Crescent Manufacturing Inc. (CMI) is a luxury leader in crafted and customized home furnishings. The corporate headquarters and a production facility are located in Texas, with additional manufacturing facilities located in Nebraska and Maryland. 

There are 250 employees in the Texas location, 175 in Maryland, and 25 in Nebraska. All locations use Windows 7 as the primary client operating system. The systems at the Maryland location are over five (5) years old. CMI's Information Technology (IT) department upgraded the computer systems with new hardware within the past year at all other company locations. These upgraded computer systems are capable of running Windows 8. CMI recently upgraded all of its servers to run Windows Server 2012 in an Active-Directory-based environment.

The Operations, Marketing, Administration, IT Support, and Finance departments are located in the Texas location. Nebraska is primarily a manufacturing location that is staffed by production line employees, a line supervisor, and a plant manager. The Maryland office also includes an operations component (i.e., production line employees, line supervisor, and plant manager), a small IT department, and the company's human resources department. 

The current IT support staff comprises a seasoned group of individuals that collectively have over ten (10) years of experience in network administration and working with Microsoft operating systems. Many of the IT staff have recently completed training on the Windows 8 operating system and are well-versed in supporting Windows Server 2008 and 2012. The remainder of the company's employees has only a basic knowledge of Windows 7 and relies on the company's help desk to solve a majority of its computer problems. CMI has a team of 50 salespeople who use laptops and tablets while working from their home offices. These employees, who travel extensively with their laptops, must have their systems secured in case of loss or theft. The laptops, purchased over five (5) years ago, run the Windows 7 operating system. The tablets, used only by a subset of the sales staff, are iPads running iOS 7.

The Chief Information Officer (CIO) is concerned about employees installing non-standard company applications downloaded from the Windows Store both while at work and when they have their devices at home. The CIO also wants to ensure that those persons on the IT staff are the only individuals authorized to update Windows Store apps. The CIO has an IT support staff of ten (10) employees and does not want to increase the number of applications that need to be supported via the company's help desk. The help desk is currently staffed by three (3) employees from 8:00 a.m. - 5:00 p.m. (CST).

Hardware and software compatibility issues experienced during the upgrade to Windows 7 several years earlier resulted in the company going over budget by several thousands of dollars. The CFO stated that the reason for going over budget was directly related to problems with their business critical applications not being fully compatible with Windows 7. The applications are used by the Operations department to track inventory, schedule production runs, handle purchase orders, and track product shipments. Senior management wants to address software compatibility testing prior to moving the entire company to Windows 8. They are also concerned about the time it might take to migrate user settings and applications over to the new Windows 8 operating system, the time to train employees on using the new interface, the overall impact on the company's help desk, and day-to-day operations.

The CIO and Chief Financial Officer (CFO) want more information before making the decision to upgrade to Windows 8 and have asked you to write a report that addresses their concerns and also includes your recommendations on how best to proceed, should the project be approved.

Write an eight to ten (8-10) page paper in which you:

1. Develop a SWOT analysis on the viability of upgrading to Windows 8 for the organization as a whole. 

2. Provide a detailed upgrade plan for the organization, including the sales staff. At a minimum:

a. Identify the number of systems, by location and / or departments that IT must replace with new or compatible hardware.

b. Recommend whether the organization should use a phased-in approach (i.e., upgrades are sequenced by departments and / or locations) or a flash-cut approach (i.e., all at once) in order to upgrade to Windows 8. If a phased-in approach is recommended, identify the departments and / or locations you would upgrade, and describe the preferred upgrade sequence. Support your recommendations.

c. Address the length of time in which the upgrade should occur, and identify the main issues which could impact the specified time frame.

d. Describe one (1) approach that IT could use in order to ensure that they thoroughly test business critical applications.

3. Describe three (3) best practices for securing the laptops and tablets for the sales staff after the upgrade is complete.

4. Examine the pros and cons of configuring AppLocker to standardize the software used by employees across the organization.

5. Explain the process and options available for managing application installations and updates via the Windows Store, and thus addressing the concerns voiced by the CIO. 

6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13805182

Questions Cloud

Global warming-declining biodiversity : Identify and describe how one business in your community is addressing at least one of the four (4) environmental issues presented...ozone depletion, global warming, declining biodiversity, and threats to our marine ecosystem.
Write a review paper about the paper gun law. : Write a review paper about the paper "DOES THE IMPLEMENTATION OF TIGHTER GUN LAWS PLAY A ROLE IN REDUCING GUN RELATED DEATHS IN THE UNITED STATES OF AMERICA".
The standard error of the sample mean : What would your decision be in this case using a 5% significance level?
Delivery of human services : Delivery of Human Services
Best practices for securing the laptops and tablets : Describe one (1) approach that IT could use in order to ensure that they thoroughly test business critical applications. Describe three (3) best practices for securing the laptops and tablets for the sales staff after the upgrade is complete
Describes the relationship between mass and energy : What famous equation describes the relationship between mass and energy - Distinguish between the terms solar energy and solar power.
Diversity and special populations : Diversity and Special Populations
What are the major functions of a national security strategy : What are the major functions of a National Security Strategy. Use lecture slide to answer & discuss. Who actually reads this document and why.
Return on investment-education funding : Develop a three- to five-page analysis (excluding the title and reference pages) on the projected return on investment for your college education and projected future employment. This analysis will consist of two parts.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Prepare a diagram using rationale

Analyse the article/case study from the perspective of at least two different classical ethical theories and present well reasoned arguments for your assessments and recommendations.

  What is 128-bit encryption

Most Web browsers now use "128-bit encryption" to exchange data with secure Web sites. But what does this mean. What is "128-bit encryption". In terms of software available to the general public, is "128-bit encryption" the strongest.

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  What are the most significant threats to your data

What is cyber security, and what are some of its key concepts and what are the most significant threats to your data, and what are some of the root causes of those threats - are cyber criminals a real danger to your enterprise? Why or why not?

  Denial of service and distributed denial of service attacks

US cryptography export restrictions: past, present, and future and biometrics for authentication: security and privacy implications.

  Calculate an rsa signature on a long message

Would it be reasonable to compute an RSA signature on a long message by ?rst computing what the message equals mod n, for some ?xed n and then signing this computed value only. Why or why not?

  Various methods of implementing rsa

Technical Guidelines: Study various methods of implementing RSA, a public-key cryptographic algorithm. Write time functions to help you conduct timing measurements for RSA.

  Primary steps to database design

We explored the 2-primary steps to database design - conceptual design and physical design. We discussed importance of having representatives from all key stakeholders in conceptual design to ensure accuracy of the design.

  Nmap application and how it can be used

Write a one papge paper APA FORMAT about NMAP application and how it can be used to find vulnerabilities

  Create an overview of the hipaa security rule

Analyze how a hospital is similar to and different from other organizations in regards to HIPAA compliance. List the IT audit steps that need to be included in the organization's overall IT audit plan to ensure compliance with HIPAA rules and regul..

  What was the digital crime and who was the subject or what

select a real world event related to digital forensics. this could be a crime a well documented breach or intrusion or

  Find the checksum at the sender site

This problem shows a special case in checksum handling. A sender has two data items to send: Ox4567 and OxBA98. What is the value of the checksum?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd