SlideShare a Scribd company logo
1 of 2
You are provided with the text sheet entitled Integrated
Distributors Incorporated
(access_project_ts_integrateddistributors.docx) to complete this
project. You play the dual role of an IT architect and IT security
specialist working for Integrated Distributors Incorporated
(IDI), a multi-national organization with offices in several
countries. Your instructor for this course plays the role of the
chief information officer (CIO). Your peers play the role of
selected technology staff. Each of the organization’s locations
is operating with different information technologies and
infrastructure—IT systems, applications, and databases. Various
levels of IT security and access management have been
implemented and embedded within their respective locations.
Tasks:
Your goals as the IT architect and IT security specialist are to:
Develop solutions to the issues that the specified location of IDI
is facing.
Develop plans to implement corporate-wide information access
methods to ensure confidentiality, integrity, and availability.
Assess risks and vulnerabilities with operating IT facilities in
the disparate locations where IDI now functions and develop
mitigation plans and implementation methods.
Analyze the strengths and weaknesses in the current systems of
IDI.
Address remote user and Web site user’s secure access
requirements.
Develop a proposed budget for the project—consider hardware,
software, upgrades/replacements, and consulting services.
Prepare detailed network and configuration diagrams outlining
the proposed change to be able to present it to the management.
Develop and submit a comprehensive report addressing the
learning objectives and your solutions to the issues within the
scenario.
Prepare a 10- to 15-slide PowerPoint presentation that addresses
important access control, infrastructure, and management
aspects from each location.

More Related Content

Similar to You are provided with the text sheet entitled Integrated Distributor

Chapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docxChapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docx
tiffanyd4
 
Rfid based job tracking mobile application
Rfid based job tracking mobile applicationRfid based job tracking mobile application
Rfid based job tracking mobile application
Mike Taylor
 
Project Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docxProject Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docx
wkyra78
 
What is software product development services.pptx
What is software product development services.pptxWhat is software product development services.pptx
What is software product development services.pptx
Xlogia Tech
 
CESSI Digital Library Case Study Eng
CESSI Digital Library Case Study EngCESSI Digital Library Case Study Eng
CESSI Digital Library Case Study Eng
atolomei
 
Shrey_Kumar_Resume_01072016
Shrey_Kumar_Resume_01072016Shrey_Kumar_Resume_01072016
Shrey_Kumar_Resume_01072016
Shrey Kumar
 

Similar to You are provided with the text sheet entitled Integrated Distributor (20)

Chapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docxChapter 9 The People in Information Systems Learning Ob.docx
Chapter 9 The People in Information Systems Learning Ob.docx
 
Amulya kumar sahoo resumev
Amulya kumar sahoo resumevAmulya kumar sahoo resumev
Amulya kumar sahoo resumev
 
Amulya kumar sahoo resumev
Amulya kumar sahoo resumevAmulya kumar sahoo resumev
Amulya kumar sahoo resumev
 
Amulya kumar sahoo resumev
Amulya kumar sahoo resumevAmulya kumar sahoo resumev
Amulya kumar sahoo resumev
 
NarendraKolla
NarendraKollaNarendraKolla
NarendraKolla
 
Rfid based job tracking mobile application
Rfid based job tracking mobile applicationRfid based job tracking mobile application
Rfid based job tracking mobile application
 
RFID Based Job Tracking Mobile Application that Eliminates Handwritten Notes
RFID Based Job Tracking Mobile Application that Eliminates Handwritten NotesRFID Based Job Tracking Mobile Application that Eliminates Handwritten Notes
RFID Based Job Tracking Mobile Application that Eliminates Handwritten Notes
 
Top 10 Challenges in IoT App Development.pdf
Top 10 Challenges in IoT App Development.pdfTop 10 Challenges in IoT App Development.pdf
Top 10 Challenges in IoT App Development.pdf
 
IT Fundamentals
IT FundamentalsIT Fundamentals
IT Fundamentals
 
Security and Governance Strategies for the Consumerization of IT
Security and Governance Strategies for the Consumerization of ITSecurity and Governance Strategies for the Consumerization of IT
Security and Governance Strategies for the Consumerization of IT
 
It proffesionals
It proffesionalsIt proffesionals
It proffesionals
 
Project Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docxProject Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docx
 
What is software product development services.pptx
What is software product development services.pptxWhat is software product development services.pptx
What is software product development services.pptx
 
Career opportunities
Career opportunitiesCareer opportunities
Career opportunities
 
Aging Services Expo Presentation
Aging Services Expo PresentationAging Services Expo Presentation
Aging Services Expo Presentation
 
Arunkumar_Resume
Arunkumar_ResumeArunkumar_Resume
Arunkumar_Resume
 
6 aproaches
6 aproaches6 aproaches
6 aproaches
 
CESSI Digital Library Case Study Eng
CESSI Digital Library Case Study EngCESSI Digital Library Case Study Eng
CESSI Digital Library Case Study Eng
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution
 
Shrey_Kumar_Resume_01072016
Shrey_Kumar_Resume_01072016Shrey_Kumar_Resume_01072016
Shrey_Kumar_Resume_01072016
 

More from ruthannemcmullen

Denial & Deception – Week 7Select one of the ‘Questions to Pon.docx
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docxDenial & Deception – Week 7Select one of the ‘Questions to Pon.docx
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docx
ruthannemcmullen
 
Demonstration of core knowledgeThe following section demonstrate.docx
Demonstration of core knowledgeThe following section demonstrate.docxDemonstration of core knowledgeThe following section demonstrate.docx
Demonstration of core knowledgeThe following section demonstrate.docx
ruthannemcmullen
 
Dental offices, which most people consider environmentally benign .docx
Dental offices, which most people consider environmentally benign .docxDental offices, which most people consider environmentally benign .docx
Dental offices, which most people consider environmentally benign .docx
ruthannemcmullen
 
Democracies Around the WorldThe United States does not have a .docx
Democracies Around the WorldThe United States does not have a .docxDemocracies Around the WorldThe United States does not have a .docx
Democracies Around the WorldThe United States does not have a .docx
ruthannemcmullen
 
Deliverable Length  2-4 pagesConsider the facts of the follow.docx
Deliverable Length  2-4 pagesConsider the facts of the follow.docxDeliverable Length  2-4 pagesConsider the facts of the follow.docx
Deliverable Length  2-4 pagesConsider the facts of the follow.docx
ruthannemcmullen
 
Deliverable Length800–1,000 words, including a completed table.docx
Deliverable Length800–1,000 words, including a completed table.docxDeliverable Length800–1,000 words, including a completed table.docx
Deliverable Length800–1,000 words, including a completed table.docx
ruthannemcmullen
 

More from ruthannemcmullen (20)

Describe how an attacker could use a sniffer in conjunction with a T.docx
Describe how an attacker could use a sniffer in conjunction with a T.docxDescribe how an attacker could use a sniffer in conjunction with a T.docx
Describe how an attacker could use a sniffer in conjunction with a T.docx
 
Describe a specific workplace conflict situation involving the compe.docx
Describe a specific workplace conflict situation involving the compe.docxDescribe a specific workplace conflict situation involving the compe.docx
Describe a specific workplace conflict situation involving the compe.docx
 
Describe common biases in decision making.Explain the roles of emo.docx
Describe common biases in decision making.Explain the roles of emo.docxDescribe common biases in decision making.Explain the roles of emo.docx
Describe common biases in decision making.Explain the roles of emo.docx
 
Describe an example of a television program that you believe clearly.docx
Describe an example of a television program that you believe clearly.docxDescribe an example of a television program that you believe clearly.docx
Describe an example of a television program that you believe clearly.docx
 
Describe Abell’s three-dimensional business-definition model and exp.docx
Describe Abell’s three-dimensional business-definition model and exp.docxDescribe Abell’s three-dimensional business-definition model and exp.docx
Describe Abell’s three-dimensional business-definition model and exp.docx
 
Describe an example of a contract that you or someone you know enter.docx
Describe an example of a contract that you or someone you know enter.docxDescribe an example of a contract that you or someone you know enter.docx
Describe an example of a contract that you or someone you know enter.docx
 
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docx
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docxDenial & Deception – Week 7Select one of the ‘Questions to Pon.docx
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docx
 
Denial-of-service attacks are a common method to bring down an organ.docx
Denial-of-service attacks are a common method to bring down an organ.docxDenial-of-service attacks are a common method to bring down an organ.docx
Denial-of-service attacks are a common method to bring down an organ.docx
 
Demonstration of core knowledgeThe following section demonstrate.docx
Demonstration of core knowledgeThe following section demonstrate.docxDemonstration of core knowledgeThe following section demonstrate.docx
Demonstration of core knowledgeThe following section demonstrate.docx
 
Describe at least five ways IT has helped change HR. What are the .docx
Describe at least five ways IT has helped change HR. What are the .docxDescribe at least five ways IT has helped change HR. What are the .docx
Describe at least five ways IT has helped change HR. What are the .docx
 
Dental offices, which most people consider environmentally benign .docx
Dental offices, which most people consider environmentally benign .docxDental offices, which most people consider environmentally benign .docx
Dental offices, which most people consider environmentally benign .docx
 
Democracies Around the WorldThe United States does not have a .docx
Democracies Around the WorldThe United States does not have a .docxDemocracies Around the WorldThe United States does not have a .docx
Democracies Around the WorldThe United States does not have a .docx
 
Deliverable Length  500-750 wordsOutline the major theories of .docx
Deliverable Length  500-750 wordsOutline the major theories of .docxDeliverable Length  500-750 wordsOutline the major theories of .docx
Deliverable Length  500-750 wordsOutline the major theories of .docx
 
Deliverable Length  A one-page letter to employeesLetter to E.docx
Deliverable Length  A one-page letter to employeesLetter to E.docxDeliverable Length  A one-page letter to employeesLetter to E.docx
Deliverable Length  A one-page letter to employeesLetter to E.docx
 
Deliverable Length  400 - 600 wordsSummative Discussion Boa.docx
Deliverable Length  400 - 600 wordsSummative Discussion Boa.docxDeliverable Length  400 - 600 wordsSummative Discussion Boa.docx
Deliverable Length  400 - 600 wordsSummative Discussion Boa.docx
 
Deliverable Length800 - 1000 wordsDetailsWeekly tasks or ass.docx
Deliverable Length800 - 1000 wordsDetailsWeekly tasks or ass.docxDeliverable Length800 - 1000 wordsDetailsWeekly tasks or ass.docx
Deliverable Length800 - 1000 wordsDetailsWeekly tasks or ass.docx
 
Deliverable Length  2-4 pagesConsider the facts of the follow.docx
Deliverable Length  2-4 pagesConsider the facts of the follow.docxDeliverable Length  2-4 pagesConsider the facts of the follow.docx
Deliverable Length  2-4 pagesConsider the facts of the follow.docx
 
Deliverable Length  5 slides (body of presentation), with in-depth .docx
Deliverable Length  5 slides (body of presentation), with in-depth .docxDeliverable Length  5 slides (body of presentation), with in-depth .docx
Deliverable Length  5 slides (body of presentation), with in-depth .docx
 
Deliverable Length800–1,000 words, including a completed table.docx
Deliverable Length800–1,000 words, including a completed table.docxDeliverable Length800–1,000 words, including a completed table.docx
Deliverable Length800–1,000 words, including a completed table.docx
 
Deliverable Length  1-2 pagesSociologists cite the weakening .docx
Deliverable Length  1-2 pagesSociologists cite the weakening .docxDeliverable Length  1-2 pagesSociologists cite the weakening .docx
Deliverable Length  1-2 pagesSociologists cite the weakening .docx
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

You are provided with the text sheet entitled Integrated Distributor

  • 1. You are provided with the text sheet entitled Integrated Distributors Incorporated (access_project_ts_integrateddistributors.docx) to complete this project. You play the dual role of an IT architect and IT security specialist working for Integrated Distributors Incorporated (IDI), a multi-national organization with offices in several countries. Your instructor for this course plays the role of the chief information officer (CIO). Your peers play the role of selected technology staff. Each of the organization’s locations is operating with different information technologies and infrastructure—IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations. Tasks: Your goals as the IT architect and IT security specialist are to: Develop solutions to the issues that the specified location of IDI is facing. Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability. Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods. Analyze the strengths and weaknesses in the current systems of IDI. Address remote user and Web site user’s secure access
  • 2. requirements. Develop a proposed budget for the project—consider hardware, software, upgrades/replacements, and consulting services. Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management. Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario. Prepare a 10- to 15-slide PowerPoint presentation that addresses important access control, infrastructure, and management aspects from each location.