Develop a proposed budget for the project

Assignment Help Computer Engineering
Reference no: EM131724434

Purpose

This course project is intended to assess your ability to comprehend and apply the basic concepts related to information security management, such as the following:

The ability to discern when a risk assessment should be performed and carrying out the task.

Understanding user or customer access requirements, whether remote or local.

Using a layered security approach to establish and maintain access controls.

Working with other departments, such as the human resources department, to identify and implement methods to prevent unwarranted exposure to information by inappropriate personnel.

Your ability to execute the tasks within these information security domains and others will be evaluated against the learning objectives as identified and described in previous lessons of instruction for this course.

Introduction to the Project

User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security. The basic function of an information system security framework is to ensure the confidentiality and the integrity, as well as the availability of systems, applications, and data. Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators.

Project Scenario

You are presented a complete scenario that is contained in the document, Scenario.pdf. You must read and understand this document to complete this project. You play the dual role of an IT architect and IT security specialist working for Integrated Distributors Incorporated (IDI), a multi-national organization with offices in several countries. Your instructor for this course plays the role of the chief information officer (CIO). Your peers play the role of selected technology staff. Each of the organization's locations is operating with different information technologies and infrastructure - IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations.

Goals of the Project (Tasks)

Your goals as the IT architect and IT security specialist are to:

Develop solutions to the issues that the specified location of IDI is facing.

Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability.

Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods.

Analyze the strengths and weaknesses in the current systems of IDI.

Address remote user and Web site user's secure access requirements.

Develop a proposed budget for theproject - considerhardware, software, upgrades/replacements, and consulting services.

Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management.

Develop and submit a comprehensive 8-page report (Word document) addressing the learning objectives and your solutions to the issues within the scenario.

Prepare a 10 -15 slidePowerPointpresentation that addresses important access control, infrastructure, and management aspects from each location.

Reference no: EM131724434

Questions Cloud

Discuss how do policies communicate corporate culture : Define the security term "integrity". Provide two examples of a business situation in which the loss of integrity could result
Estimate the margin of error for a survey of students : Suppose that a survey of 400 students at your school is conducted to assess student opinion about a new academic honesty policy.
Development methods of growing various invertebrates : Aquaculturists (people who farm marine resources, typically in semi-enclosed areas off the coast) have development methods of growing various invertebrates
Assess the various types of personality measurements : Determine what type of job within the human services sector related to personality psychology is of interest to you.
Develop a proposed budget for the project : Develop a proposed budget for the project - consider hardware, software, upgrades/replacements, and consulting services
Calculate the missing costs : Question - High-low method-missing amounts. Calculate the cost formula for mixed cost using the high-low method
Discuss employees access the essential resources : How do you think employees access the essential resources at the office when they are at a conference or a seminar
Construct a contingency table of counts : Construct a contingency table of counts for the relationship between the SalEst test result and the time of delivery.
When would it be unwise to use either of these methodologies : Would you consider using an Agile methodology such as Scrum or XP in one of your projects

Reviews

Write a Review

Computer Engineering Questions & Answers

  Determining the vulnerability in product

Specify the ethical considerations included when the security professional contacts the vendor regarding vulnerability in their product.

  Describe the disaster plan you would set up for the bank

Describe the disaster plan you would set up for the bank. The bank's corporate office has just been hit by a devastating hurricane.

  Discuss lan connectivity device facts

Complete the following Lab Sections and write a 1-paragraph summary for each section topic

  What is difference between bitmapped fonts and outline fonts

What is the difference between Bitmapped fonts and Outline fonts or Speech recognition and Speech synthesis. Explain what is an authoring software? And give some examples of the authoring software that you may use?

  Implement a multilayer perceptron classifier

Using this dataset, implement a Multilayer Perceptron Classifier (MLP) to predict whether an article is popular or not

  What other skills are employers seeking

Beyond the technical skills your degree does/will provide, what other skills are employers seeking? Have a look at job advertisments such as those in CareerOne. Other than technical skills, which skills are employers seeking? (seek.com.au)

  Make a visual studio 2008 asp .net web site

make a Visual Studio 2008 ASP .NET Web Site with two Web Forms. Add a DropDownList server control and a Label server control to the first Web Form.

  Demonstrate how this search would go

assume an algorithm that processes a data set of size 8 has a runtime of 72, and the same algorithm on a data set of size 20 has a runtime of 420. Using big-O notation, state runtime for this algorithm for the general case of a data set of size n.

  Questionprepare a complete tutorial including an analogy to

questionprepare a complete tutorial including an analogy to describe the mechanics and a graphic to support your

  Develop a gantt chart illustrating the project tasks

Develop a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).

  How would investigte the likely behaviour of such a system

Consider a 68000 system with n peripherals capable of generating a vectored interrupt. Suppose the ith peripheral generates a level /, interrupt request.

  Explain how to compile and run a standalone java application

Write a simple Java program that incorporates as a minimum three best practices for making your code readable and understandable by yourself and others.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd