Pd4 this is for a company selling airline partsthis

Assignment Help Basic Computer Science
Reference no: EM13612714

This is for a company selling airline parts: <br/> <br/>This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment. <br/> <br/>The last section of the project plan will present the infrastructure in accordance with the parameters set forth at the outset of the project. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy. CIA is a widely used benchmark for evaluation of information systems security. <br/> <br/> <br/>Section 1: Infrastructure Document <br/> <br/>1. Write a five to ten (5-10) page infrastructure document in which you: <br/> <br/>a. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. <br/> <br/>b. Illustrate the possible placement of servers including access paths to the Internet and firewalls. Note: Facility limitations, workstations, printers, routers, switches, bridges and access points should be considered in the illustration. <br/> <br/>c. Explain the rationale for the logical and physical topographical layout of the planned network. <br/> <br/>d. Create a comprehensive security policy for the company that will: <br/> <br/>i. Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity and availability of information. <br/> <br/>ii. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information. <br/> <br/>Your assignment must follow these formatting requirements: <br/> <br/>Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. <br/>Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. <br/>Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document. <br/> <br/>Section 2: Revised Gantt Chart / Project Plan <br/> <br/>Use Microsoft Project or an open source alternative, such as Open Project, to: <br/> <br/>2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 3: Database and Programming Design, with all the project tasks. <br/> <br/> <br/>The specific course learning outcomes associated with this assignment are: <br/> <br/>Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations. <br/>Evaluate the issues and challenges associated with information technology integration. <br/>Evaluate the ethical concerns that information technology solve or present in a global context. <br/>Use technology and information resources to research issues in information technology. <br/>Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions.

Reference no: EM13612714

Questions Cloud

For supply item mt bluesky company has been ordering 150 : for supply item mt bluesky company has been ordering 150 units based on the recommendation of the salesperson who calls
The blue car division has been unable to meet the demand : motormart company manufactures automobiles. the red car division sells its red cars for 25000 each to the general
Janes medical equipment company manufactures hospital beds : janes medical equipment company manufactures hospital beds. its most popular model deluxe sells for 5000. it has
Logistics extreme hats wanted to bid on a huge festive : extreme hats wanted to bid on a huge festive event of which 6200 large party hats would be needed. the style a hats
Pd4 this is for a company selling airline partsthis : this is for a company selling airline parts ltbrgt ltbrgtthis assignment consists of two 2 sections an infrastructure
Tsee economic espionage and the protection of trade secrets : economic espionage and the protection of trade secrets have become increasingly important as domestic and international
Presidential election assignment 2 presidential : assignment 2 presidential election ltbrgt ltbrgtdespite commonly held beliefs about the popularity of presidents
Kti you expect kt industries kti will have earnings per : you expect kt industries kti will have earnings per share of 3 this year and expect that they will pay out 1.50 of
Lab11 lab11 c : lab11 c

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Dns on a network

DNS on a Network

  How to simulate

Here, each line is a process. First int is ID, second integer is CPU time. CPUunitQ is a queue that stores the index # for available cpu units. How to simulate?

  Structured analysis and object-oriented techniques

A frequently asked question is "Can structured techniques and object-oriented techniques be mixed?

  Write a c++ program that prompts the user for two values

Write a C++ program that prompts the user for two values. The program then prints the two numbers in ascending order. If the two values are identical it prints a single line saying that both numbers are identical.

  What is the addressing mode of the instruction

What is the addressing mode of the instruction

  Statistics about the numbers read

Write a function whose job is to input #'s, non-# to quit, recover from the input failure by calling recover(), and tell main some statistics about the numbers read. . unsigned readA();

  Work with classes as reusable code

Objective: Work with classes as reusable code and random numbers. Instructions: A slot machine is a device that the user inserts money into and then pulls a lever (or presses a button).

  Function whose job is to output some sequence

Write a function whose job is to output some sequence of "interesting" #'s. The numbers should be separated from one another somehow so they don't all run together. This function may need to call another function, where the second function determines..

  How do you add all the elements of an arraylist

how do you add all the elements of an ArrayList favorite? I need help on creating class and client.

  Identify tactical

Conduct research to find examples of the differences between I.T. security controls and countermeasure gap analysis, and identify tactical, strategic, risk mitigation, threats, and vulnerability dimensions and gaps associated with compliance recom..

  Discuss the role of the project manager or team

Summarize how the project manager or team exhibited exceptional and ethical project management practices. 2.Discuss the role of the project manager or team

  What do u get when u type in that subarray and why?

so there is an array called arr2=[ 1 2 3; -2 -3 -4; 3 4 5]; what does it mean to access the subarray arr2(:, 1:2:3)? like what do u get when u type in that subarray and why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd