Cyberdyne
SYSTEMS
Who is Cyberdyne?
Lucio A Gonzalez
Jordan Dracoulis
Allen Sanford
Bryan Moss
Business Case
 We will submitting a bid for a infrastructure
project for a banking software company.
 They are moving to completely new
building and need a network setup for
developing there software.
 The building is two levels with 75-100
employees on each floor, and 80% of
them work from two labs in the building,
while the other 20% are in offices.
Business case cont.
 Along with the network they will require
each person to a VoIP phone and also
want secure WiFi through the entire
building.
 The stakeholders are the company along
with all the employees, the banks they
develop software for, and any investors.
Scope of Project
 Physical set up of network
 Secure the network
 Provide network schema
 Build budget
 Buy required materials
 Set up all servers, work stations, routers, VoIP
phones, and Wi-Fi access points.
 Make suggestions for risk management plan
and disaster recovery.
Out of the scope
 Physical security of building
 Installation of software for development
 Implementation of risk management plan
 Maintaining the network once installed
 Ensuring they have enough bandwidth to
operate.
 Making policy’s and ensuring they are
enforced
Work Break Down
 1. Place bid for infrastructure job
 2. Choose the ISP for location
 3. Create network topology
 4. Order all equipment and materials for job completion
 5. Begin build out
 6. Configure servers and workstations
 7. Test Networks
 8. Final Walkthrough
Budget/Bill of Material
Servers (12) PowerEdge M630 Blade Server $21,876.00
Workstations
(200) Dell OptiPlex 3020 $120,000.00
Cable (85,000
FT) 1000 FT 24-Gauge CAT5e Cable $7,225.00
Switches (4) Cisco 200 Series Smart Switch $2,700.00
WAP (6) ZyXel NWA 1123-AC $1,200.00
Budget/bill of Materials cont.
Router (2) Cisco 1941/K9 $2,021.98
Phones (200) Cisco 794G Network VoIP Device $65,398.00
Monitors HP Business V193 $16,598.00
Server Racks (4) Tripp Lite SR42UB $4,539.96
Total $241,558.94
Risk I
 Orange Creek Inc. Location is hacked and data
distributed.
 Trust in Orange Creek, Inc. will be lowered,
resulting in loss in revenue as customers look
elsewhere for software development.
 Physical Firewall and IDS is installed between
entire network and outside access. Lab Servers
will not be made available via the WiFi network.
Risk II
 Orange Creek, Inc. employee is fired or laid off. Employee
then tries to distribute Orange Creek, Inc. data.
 Orange Creek, Inc. could suffer from loss of data due to
employee stealing from company.
 All employees will sign Non-Disclosure Agreement stating
that all Orange Creek, Inc. programs and information will
not be distributed without express authorization from
Orange Creek, Inc. supervisors.
 Employees that are fired will have their access to building
immediately revoked and be escorted off the premises by
security. If necessary, an immediate change to all network
passwords will be done following employee firing
notification.
Risk III
 Lost project data. Loss of server due to equipment failure. This
could also be the result of a hard drive failure.
 If there is an ongoing project on the server that has not been
backed up, the data will be lost and the team will have to start
the project over. This could result in a delay in project
completion and/or a lost customer.
 Daily incremental server backups to make sure there is little lost
data. All server backups will be stored in an off-site, secure
location to prevent data loss due to building destruction. 2
back-up servers will be available to make sure that the lost
productivity is kept to a minimum.
Disaster Recovery Plan
Steps to be taken in case of a disaster:
 Contact CS in case of any disaster
 Continue operations at an off-site facility if the
disaster occurs that requires the replacement of
facility or the employee’s to remain off site, within
twenty four hours of disaster.
 Precautionary security education, to employee’s to
lessen the possibility of theft.
 Monitor the computer security standards.
Disaster Recovery Plan Cont.
Manager’s responsibilities check list:
 Implement a disaster recovery plan for the safety
of their employee’s
 Contact the owners of Orange Creek Inc. and
contact CS.
 Help assess the damage done to equipment and
communicate that to CS.
 If necessary orchestrate the relocation of the
network site, communicate that to CS so that
access to the back-up server can be networked.
Servers
• A Dell blade server is a stripped
down server that is optimized to
minimize physical space
Each server uses multiples OS’s such
as Microsoft windows, UNIX/Linux and
even Mac OS
Advantage of Blade Servers
 Load balancing failover density
 Lower management cost
 Power consumption
 Flexibility and ease of upgrading
 Deployment of scalability
 File sharing and serving
 SSL encrypting web communication
 Virtualization
What the servers will do.
 Web
 DHCP/DNS
 Application
 Citrix
 Q&A
 File/Print
 Email
Client Configuration
 Each workstation will be equipped with Microsoft
Windows 7 Enterprise
 Microsoft Office Suite Professional
 Al work supported software will be utilized through the
Citrix environment
Example:
 Quality control
 Software Development
Security
 Employees will gain access electronic badges at every
entry way.
 CAC card readers will be install onto every workstation
limited access to hardware.
 Employees will go through quarterly information and
operation security training.
 Server rooms and labs will be protected in 2 ways
 Badge scanner
 Number pad
Active Directory
 Forest Functional Level: Windows Server
2008
 Domain Functional Level: Windows Server
2008
 Organizational Units: Supervisor, Human
Resources, Accounting, Development
Department, Testing Department,
Administrators, and Employees

Cyberdyne systems (2)

  • 1.
  • 2.
    Who is Cyberdyne? LucioA Gonzalez Jordan Dracoulis Allen Sanford Bryan Moss
  • 3.
    Business Case  Wewill submitting a bid for a infrastructure project for a banking software company.  They are moving to completely new building and need a network setup for developing there software.  The building is two levels with 75-100 employees on each floor, and 80% of them work from two labs in the building, while the other 20% are in offices.
  • 4.
    Business case cont. Along with the network they will require each person to a VoIP phone and also want secure WiFi through the entire building.  The stakeholders are the company along with all the employees, the banks they develop software for, and any investors.
  • 5.
    Scope of Project Physical set up of network  Secure the network  Provide network schema  Build budget  Buy required materials  Set up all servers, work stations, routers, VoIP phones, and Wi-Fi access points.  Make suggestions for risk management plan and disaster recovery.
  • 6.
    Out of thescope  Physical security of building  Installation of software for development  Implementation of risk management plan  Maintaining the network once installed  Ensuring they have enough bandwidth to operate.  Making policy’s and ensuring they are enforced
  • 7.
    Work Break Down 1. Place bid for infrastructure job  2. Choose the ISP for location  3. Create network topology  4. Order all equipment and materials for job completion  5. Begin build out  6. Configure servers and workstations  7. Test Networks  8. Final Walkthrough
  • 16.
    Budget/Bill of Material Servers(12) PowerEdge M630 Blade Server $21,876.00 Workstations (200) Dell OptiPlex 3020 $120,000.00 Cable (85,000 FT) 1000 FT 24-Gauge CAT5e Cable $7,225.00 Switches (4) Cisco 200 Series Smart Switch $2,700.00 WAP (6) ZyXel NWA 1123-AC $1,200.00
  • 17.
    Budget/bill of Materialscont. Router (2) Cisco 1941/K9 $2,021.98 Phones (200) Cisco 794G Network VoIP Device $65,398.00 Monitors HP Business V193 $16,598.00 Server Racks (4) Tripp Lite SR42UB $4,539.96 Total $241,558.94
  • 18.
    Risk I  OrangeCreek Inc. Location is hacked and data distributed.  Trust in Orange Creek, Inc. will be lowered, resulting in loss in revenue as customers look elsewhere for software development.  Physical Firewall and IDS is installed between entire network and outside access. Lab Servers will not be made available via the WiFi network.
  • 19.
    Risk II  OrangeCreek, Inc. employee is fired or laid off. Employee then tries to distribute Orange Creek, Inc. data.  Orange Creek, Inc. could suffer from loss of data due to employee stealing from company.  All employees will sign Non-Disclosure Agreement stating that all Orange Creek, Inc. programs and information will not be distributed without express authorization from Orange Creek, Inc. supervisors.  Employees that are fired will have their access to building immediately revoked and be escorted off the premises by security. If necessary, an immediate change to all network passwords will be done following employee firing notification.
  • 20.
    Risk III  Lostproject data. Loss of server due to equipment failure. This could also be the result of a hard drive failure.  If there is an ongoing project on the server that has not been backed up, the data will be lost and the team will have to start the project over. This could result in a delay in project completion and/or a lost customer.  Daily incremental server backups to make sure there is little lost data. All server backups will be stored in an off-site, secure location to prevent data loss due to building destruction. 2 back-up servers will be available to make sure that the lost productivity is kept to a minimum.
  • 21.
    Disaster Recovery Plan Stepsto be taken in case of a disaster:  Contact CS in case of any disaster  Continue operations at an off-site facility if the disaster occurs that requires the replacement of facility or the employee’s to remain off site, within twenty four hours of disaster.  Precautionary security education, to employee’s to lessen the possibility of theft.  Monitor the computer security standards.
  • 22.
    Disaster Recovery PlanCont. Manager’s responsibilities check list:  Implement a disaster recovery plan for the safety of their employee’s  Contact the owners of Orange Creek Inc. and contact CS.  Help assess the damage done to equipment and communicate that to CS.  If necessary orchestrate the relocation of the network site, communicate that to CS so that access to the back-up server can be networked.
  • 23.
    Servers • A Dellblade server is a stripped down server that is optimized to minimize physical space Each server uses multiples OS’s such as Microsoft windows, UNIX/Linux and even Mac OS
  • 24.
    Advantage of BladeServers  Load balancing failover density  Lower management cost  Power consumption  Flexibility and ease of upgrading  Deployment of scalability  File sharing and serving  SSL encrypting web communication  Virtualization
  • 25.
    What the serverswill do.  Web  DHCP/DNS  Application  Citrix  Q&A  File/Print  Email
  • 26.
    Client Configuration  Eachworkstation will be equipped with Microsoft Windows 7 Enterprise  Microsoft Office Suite Professional  Al work supported software will be utilized through the Citrix environment Example:  Quality control  Software Development
  • 27.
    Security  Employees willgain access electronic badges at every entry way.  CAC card readers will be install onto every workstation limited access to hardware.  Employees will go through quarterly information and operation security training.  Server rooms and labs will be protected in 2 ways  Badge scanner  Number pad
  • 28.
    Active Directory  ForestFunctional Level: Windows Server 2008  Domain Functional Level: Windows Server 2008  Organizational Units: Supervisor, Human Resources, Accounting, Development Department, Testing Department, Administrators, and Employees