Problem regarding the website migration project

Assignment Help Computer Network Security
Reference no: EM13915858

Term Paper: Website Migration Project

Tony's Chips has recently been sold to a new independent company. The new company has hired you to manage a project that will move the old Website from an externally hosted solution to an internal one. The company's leadership is very concerned about redundancy for their site, insisting that a back-up site be available as a failover in case the main site goes down. In addition, they want the site redesigned to allow customers to order products online.

As part of your job, you must complete a 10-to-15 page paper that follows this project through the system development life cycle (SDLC). This assignment will require you to do the following:
Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure the site is always available.

The Web architecture should describe and justify operating system choices (i.e., Linux, Apache, MYSQL, PHP, Windows, IIS, SQL, etc.).

Evaluate alternatives to the company self-hosting the site.

Build a Gantt chart using Microsoft Project or equivalent software, showing all tasks associated with implementing the Website.

The chart should include a minimum of five (5) tasks, each with three (3) sub-tasks.

Explain and justify the system architecture you have selected.

Illustrate the system architecture using Visio or equivalent software.

Create a use case that documents the event of a customer ordering a bag of chips from the new Website.

The use case should include a graphical representation using Visio or equivalent software and a text description of the events.

Discuss the support operations that the internally hosted Website will require after implementation.

Explain how you will evaluate the performance of the new site and the success of your project.

The specific Course Learning Outcomes associated with this assignment are:

Design high-level logical system characteristics (user interface design, design of data, and information requirements).

Use contemporary CASE tools in process and data modeling.

Use technology and information resources to research issues in systems analysis and development.

Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Reference no: EM13915858

Questions Cloud

Interpret the ß coefficients in the model : Write a main efforts model for E(y) as a function of gender and expert testimony. Interpret the β coefficients in the model.
Variable expenses : Kendall Company has sales of 1,600 units at $50 a unit. Variable expenses are 30% of the selling price.
System development life cycle : As part of your job, you must complete a 10-to-15 page paper that follows this project through the system development life cycle (SDLC). This assignment will require you to do the following:
Innovation and small business : Evaluate how networking can mitigate the issues small-business owners face regarding isolation so they can become more innovative.
Problem regarding the website migration project : Tony's Chips has recently been sold to a new independent company. The new company has hired you to manage a project that will move the old Website from an externally hosted solution to an internal one.
Identify two sites with sample business proposals : Identify two sites with sample business proposals. Outline the parts of each proposal. Compare the strengths and weaknesses of each proposal.
Statistical releases of data : Make sure to select articles (300 words or more) that address all of the needed information below. Short articles will often not provide you with enough detail to write about. In addition, purely statistical releases of data are not wise selection..
Develop a letter proposal outlining your plan and staffing : As a team, develop a letter proposal outlining your plan, staffing, and budget. Use persuasion to show why contracting your services is better than hiring in-house employees.
Confidence interval for the proportion of individuals : Construct a 95% confidence interval for the proportion of individuals in the target market segment who are aware of the firm's new brand. If you use Excel and/or StatTools, please specify any functions you use and all the inputs.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe the implementation of secure sockets layer

Describe the implementation of Secure Sockets Layer (SSL) in support of Hypertext Transfer Protocol Secure (HTTPS). Assess how you are assured that your browser is secure. Determine if the user data truly is protected or this is a false sense of s..

  Responsibility of confidentiality to previous employer

You have taken a job with a software user who has contracted your previous employer to develop a system for them. However, you have also a responsibility of confidentiality to your previous employer.

  Questions on cyber security

Question 1: Submit a list of five cybersecurity breach case studies. Question 2: For each breach, write a brief statement covering the following points: a\ When did the incident take place (dates)? b\ What went wrong? c\ What was the outcome?

  Difference between cyber-related crimes and cyber crimes

Summarize the difference between cyber-related crimes and cyber crimes. On cyber crimes, define cyber trespass, cyber vandalism and cyber privacy. On cyber-related crimes describe the difference between cyber-assisted and cyber-enhanced crimes.

  What is the difference between ethics and morality

In United States vs. Davis, the U.S. Court of Appeals for the 11th Circuit ruled that a warrant was needed to access cell tower data. Who (what court(s)) must follow this ruling and why?

  Describe the security implications of using these technology

Describe the security implications of using these technologies and how risk will be mitigated from a network hardware and software perspective.

  Cryptography and network security

CS 470: Cryptography and Network Security,  Compare the RSA and EIGamal signature schemes' performance in terms of efficiency of the verification operation, ability to pre-compute most of the signature operation in advance.

  For a typical network environment

For a typical network environment (that includes an Internet-facing Website, a human resources database and application, and development workstations that contain copyrighted material), describe some typical devices or assets and vulnerabilities that..

  Computing the value of shared secret key

You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 291. What is the value of your shared secret key?

  Identifying and discussing technological improvements

Identify the type of breach and identify and explain how the breach occurred (or suspicions by authorities as to how it may have occurred)

  Discuss specific malware and social engineer

Explain your method of attack and operation within reasonable parameters of the law. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.

  Paper on certification & accreditation for it systems

Write a 5 page paper on Certification & Accreditation for IT Systems (Network Plus, Security Plus, SSAA's, DAA's, ATO's, etc.)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd