The document summarizes 3 assignments for an ITEC 4750 capstone networking project. Assignment 1 involved identifying a real-world problem for FreeMax real estate company and developing feasibility reports. Assignment 2 split the team to design inputs/outputs, technology used, hardware/software, and system integration. Assignment 3 evaluated the network and provided maintenance recommendations, with the team dividing work between evaluation and maintenance sections. Group efforts involved in-person and online coordination to complete assignment requirements.
Software Project Management: Project CharterMinhas Kamal
Software Project Management: ResearchColab- Project Charter (Document-1.1)
Presented in 4th year of Bachelor of Science in Software Engineering (BSSE) course at Institute of Information Technology, University of Dhaka (IIT, DU).
Software Project Management: Project CharterMinhas Kamal
Software Project Management: ResearchColab- Project Charter (Document-1.1)
Presented in 4th year of Bachelor of Science in Software Engineering (BSSE) course at Institute of Information Technology, University of Dhaka (IIT, DU).
Software Project Management Presentation FinalMinhas Kamal
Software Project Management- ResearchColab
Presented in 4th year of Bachelor of Science in Software Engineering (BSSE) course at Institute of Information Technology, University of Dhaka (IIT, DU).
Estimating agile development in the Federal Government domain requires more than just defining Story Points and planning Sprints. These estimates must follow the guidance in OMB A-11 Part 7 and other document based management of budget and performance measures.
Software Project Management Presentation FinalMinhas Kamal
Software Project Management- ResearchColab
Presented in 4th year of Bachelor of Science in Software Engineering (BSSE) course at Institute of Information Technology, University of Dhaka (IIT, DU).
Estimating agile development in the Federal Government domain requires more than just defining Story Points and planning Sprints. These estimates must follow the guidance in OMB A-11 Part 7 and other document based management of budget and performance measures.
Week Four JournalObjectiveYou will identify key ethical proble.docxalanfhall8953
Week Four Journal
Objective
You will identify key ethical problems facing the company, create potential solutions to those problems, and explain why certain solutions are better than others.
Instructions
In this assignment, you will identify problems that face the two companies that you have chosen to study in this course. You will explain those problems, how they affect the company, and who or what is responsible for those problems. Then, you will attempt to provide solutions to those problems, also identifying the difficulties in implementing those solutions.
Please answer all questions in detail. Because this journal is worth 5% of your final grade, there is a high expectation for your participation. Grades for the journals are based on content, critical engagement, quality of reflection, and detail. Please submit the completed journal via the Assignment Basket found in the Week Four Journal tab on the left navigation toolbar by Day 7.
Problems Facing Not-for-Profit Company
1. Identify two to five problems that face your chosen not-for-profit company. Explain those problems.
a. Why do these problems exist? Present the background on these problems.
b. How do these problems impact the organization?
c. Who is responsible for these problems?
2. Identify potential solutions to those problems. Here, you can feel free to brainstorm and merely list various solutions to the problems that you identify.
3. Choose a best solution for each problem. Explain why that solution is the best solution. In addition, determine whether or not the solution is possible and what would need to be done to implement the solution.
Important note: Do your best to support your claims with evidence, facts, and information that you have learned about ethical theories and values throughout the course.
Problems Facing For-Profit Company
1. Identify two to five problems that face your chosen not-for-profit company. Explain those problems.
a. Why do these problems exist? Present the background on these problems.
b. How do these problems impact the organization?
c. Who is responsible for these problems?
2. Identify potential solutions to those problems. Here you can feel free to brainstorm and merely list various solutions to the problems that you identify.
3. Choose a best solution for each problem. Explain why that solution is the best solution. In addition, determine whether or not the solution is possible and what would need to be done to implement the solution.
Important note: Do your best to support your claims with evidence, facts, and information that you have learned about ethical theories and values throughout the course.
1
CLASS NAME: MIS600
PROFESSORS NAME: William Ying
STUDENTS NAME: Issah Musah, and Raj Patel
PROJECT NAME: NETWORK DESIGN
Content
Topic Page No.
Cover Page .
Instructions Need task completed for Ds portion of the pr.docxnormanibarber20063
Instructions:
*** Need task completed for D's portion of the project:
3-pages for a SAR;
3-pages for an AAR
covering the topic "Assessing Suspicious Activity" ***
Team e-mail discussing Instructions about the Project:
Team,
I was talking with Team member #2 in class today and the outlines don't match up to the assignment. I propose we write in the order of the assignment and each do 3 pages for each paper. The SAR will be the assessment prior to implementation of our recommendations and the AAR is the assessment afterwards. The breakdown will look like this:
Assessing Suspicious Activity - D
Financial Sector – Team Lead
Law enforcement - Team member #3
Intelligence - Team member #4
Homeland security - Team member #5
If we each do 3 pages we will hit the 15 required. I can put it all together and edit if needed, and someone else or I can do the PowerPoint.
Thanks,
Team Lead
------------------------------------------------------------------------------------------------------------------------------
Team Lead,
Based on the reading of our assignments, I see that there are only 4-roles in the assignment (see bold below). My understanding is that you need me to write up 3 pages on "the cyber threats and vulnerabilities that are facing the US critical infrastructure" (separate from the SAR and AAR); 3-pages for the SAR, and 3-pages for the AAR. If this is the case, what role do you want me to write up for the SAR and AAR? Also, we are not to follow the SAR and AAR outlines?
Roles:
Assessing Suspicious Activity - D
Financial Sector – Team Lead
Law enforcement - Team member #3
Intelligence - Team member #4
Homeland security - Team member #5
Thanks,
D
-------------------------------------------------------------------------------------------------------------------------------------
D,
The two outlines are nearly identical for different projects. Team member #3, Team member #4, and I are on board with writing to the tasks vs the outline. If you agree, the task you will do is Task 2 for the Project 4. This task is called "Assessing Suspicious Activity" and we will need 3 pages on this for the SAR and 3 pages for the AAR.
Thanks,
Team Lead
-------------------------------------- SEE PROJECT DETAILS BELOW-----------------------------------------------
US critical infrastructure-power—water, oil and natural gas, military systems, financial systems—have become the target of cyber and physical attacks as more critical infrastructure systems are integrated with the Internet and other digital controls systems. The lesson learned in defending and mitigating cyberattacks is that no entity can prevent or resolve cyberattacks on its own. Collaboration and information sharing is key for success and survival.
This is a group exercise, representing collaboration across all sectors, to support and defend US critical infrastructure. In the working world, a team like this would include some agencies, some industrial partners, and some private se.
IT327-1404A-01 Implementing, Managing and Mainta.docxpriestmanmable
IT327-1404A-01 Implementing, Managing and Maintaining a Network I
Phase 1 Individual Project
Michael F. Ryan Jr.
10/14/14
Contents
Week 1: Target Organization 3
Target Organization 3
Analysis and Recommendations 3
Week 2: Transmission Control Protocol/Internet Protocol (TCP/IP) Addressing and Management 4
Week 3: Fault Tolerance Plan 5
Week 4: Security Plan 6
Week 5: Network Monitoring 7
All Weeks: Network Pro Prep Toolkit 8
Week 1: Target OrganizationTarget Organization
About Ryan Computer Enterprises
Ryan Computer Enterprises formed in 2000, and provides leading business solutions. Currently there are over 8000 employees that are located throughout five states with three locations in Pennsylvania, Florida, California, Texas and New York. The administrative office currently is located in Pennsylvania. Currently there are over 500 additional employees located in the corporate headquarters. The company provides cutting edge solutions and needs USAA, JP Morgan, Goldman Sacks and other financial institutions. In 2002, Forbes magazine rated Ryan Computer Enterprises as the number one business organization for the field of technical consultation.
Major clients of Ryan Computer Enterprises are all in the field of investment banking and insurance. Some major factors of focus for the company will be improvement of business process the clientele have set in place, legacy systems and to have a set solution in place to be utilized thought their organization. Ryan Computer Enterprises has stated that our goal is align both the company and client goals.
Ryan Computer Enterprises has slowly replaced existing infrastructure over the years focusing on workstation, printer, switch and routers. Some areas of interest that go beyond the physical infrastructure are application upgrades. The applications that are in questions for upgrades are DBMS and other various apps such as Office 365. It has been over 2 years since the last upgrade to the IT system has been conducted and in order to provide better security and stability it has been decided that specific facets that have been listed must be upgraded as well as servers and the use of cloud technology must be implemented to allow for virtual storage of information. Other technology that should be visited is the addition of WAPs through out the facilities this allows the vendors and employees to use their mobile devices and other wireless items as well as the clientele.
The last item for discussion that will be addressed as an upgrade will be the addition of remote access. Having VPN capabilities allows Ryan Computer Enterprises to better facilitate troubleshooting and adds to the functionality of its employees. All email services as well as server access allow an employee to better assist with technical work as well as giving the clients the ability to conduct business wherever they might be located.
Metrics that are used to identify some of the issues are based on multiple factors but some ...
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docxjasoninnes20
BUSINESS CASE CAPSTONE 2
BUSINESS CASE CAPSTONE 3
Business Case Capstone
Connie Farris
Raphael Brown
Jim Chambers
Shaun Cummings
Deandre Kralevic
Colorado Technical University
IT Capstone II
(IT488-1904B-01)
Henrietta Okora
Running head: BUSINESS CASE CAPSTONE 1
Business Case Capstone
Table of Contents
(Week 1) Section 1: Overview of the project (from IT487)3
Overview3
I75 Corridor4
Section 2: Requirements (from IT487)5
Section 3: Design (from IT487)7
Section 4: System development methodology9
Section 5: Work breakdown structure11
Section 6: Communication Plan13
(WEEK 2) Section 7: Quality Assurance Plan TBD15
(WEEK 3) Section 8: Documentation Plan TBD16
(Week 4) Section 9: Quality Assurance and results of test-case execution TBD17
Section 10: Project Closure18
References:19
(Week 1) Section 1: Overview of the project (from IT487)Overview
The Galactic Customer IT Services is IT Support Company with over 250,000 employees with companies in over 50 states with the main headquarters located in Gainesville, FL. The location chosen for the headquarters is based on a Telco Gateway Infrastructure that the main fiber-optic truck line runs along the I75 corridor, from Miami Lakes FL to the northern part of Michigan. This I75 corridor plays an important part of the Networking ability for the organization. The Galactic Customer IT Services is an IT support company, which provides IT support to various small to large companies both within the Unites States and support to various military bases overseas. This large customer service company has installed application software to its large Help Desk ticketing system. The next phase being implemented is the upgrading of its Networking Infrastructure, which also includes cloud-based networking. This Organization has several new updated Servers ready to install on the network. With the previous project being accepted the organization has decided to move forward to improving its networking infrastructure, however the organization has request the project team to draft a plan that requires the following in the plan: Requirements, Design, System Development Methodology, WBS (Work Breakdown Structure), Communications Plan, Quality Assurance Plan, Documentation Plan, and Quality Assurance and results of test-case execution be the project can be closed. I75 Corridor
http://gregkantner.com/blog/wp-content/uploads/2012/05/interstate-75-map.gif
Section 2: Requirements (from IT487)
The project requirements here are derived from the software requirements for the Galactic customer services. The project was to create new ticketing software that the customer wanted upgraded and to completely replace the previous product. The requirements are the following:
• Ticket system
• Ticke ...
Presentation given at the Kansas City Chapter of PMI several years ago. Examines and details 4 failed projects, their effects and how they were dealt with.
CIS337– Networking in Business Unit 6 Assignment FinalVinaOconner450
CIS337– Networking in Business
Unit 6 Assignment: Final Project Part III: Securing & Maintaining the Network
Copyright 2022 Post University, ALL RIGHTS RESERVED
Due Date: 11:59 pm EST Sunday of Unit 6
Points: 20
Overview:
Your medium-sized organization is expanding both nationally and internationally and
you have been tasked to implement a Wide Area Network (WAN) topology. The
organization has expanded to 5 different geographical locations and has directed you to
design the WAN. In essence, you need to submit a plan to your Executive board and
get approval to install the WAN.
Background Information:
• Your Executive Board consists of the CEO, CFO, CIO.
• Your IT/Security Team consists of CISO, Security Manager, Data Center
manager, IT Manager.
• Employees of the organization will expand from 20 to 60 (globally)
• Currently, there are 20 employees at Location A. There will be another location of
30 employees at Location B and 10 new employees in France. Some new
employees at Location B will be remote users.
• Your new network must be scalable for future growth.
Instructions:
For this section, you will work in a group. One person will be assigned to submit the
PowerPoint and paper for the entire group.
You will need to ensure security is in place to protect from internal and external threats
to the network. In a PowerPoint Presentation present the following to the Executive
Board:
• Create a plan for secure access for both internal and external users to include
password complexity.
o Should multi-layer authentication be used? Why or why not?
Copyright 2022 Post University, ALL RIGHTS RESERVED
o Make sure your network topology includes awareness training to make
users aware of the various malware and phishing attempts employed by
attackers.
• Provide a detailed budget needed to build and sustain your network based on
costs of the previous 3-5 years. You will research and submit a cost requirement.
o You will provide a 1-page rationale for your budget and justify if the needs
of the new network exceed the budgeted amount.
Requirements:
• PowerPoint Presentation compromised of 4- 6 slides, excluding the budget, 1-
page budget rationale, Title, and Reference pages.
• Provide supporting notes representing each slide.
• APA format, including an in-text citation for referenced work.
• Be sure to include the names of each person in your group at the bottom of each
slide.
• A 1-page paper minimum including a rationale for your budget and justifying if the
needs of the new network exceed the budgeted amount.
• At least two resources.
Be sure to read the criteria below by which your work will be evaluated before
you write and again after you write.
Evaluation Rubric for Unit 6: Final Project Part III Assignment
CRITERIA Needs
Improvement
Proficient Exemplary
0-1 Points 1-2 Points 2-3 Points
Security Plan Plan for
security ...
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxmonicafrancis71118
CLASS NAME:MIS600
PROFESSORS NAME:
STUDENTS NAME:
PROJECT NAME: NETWORK DESIGN
Content
Topic Page No.
Cover Page 1
Content 2
Executive summary 3
Project Charter 3
Earn Value Statement 11
Executive Summary
Network under a set of confined region is known as Intranet. It uses an IP protocol and IP-based tools like the file transfer application and web browsers that is provided by the server to only assigned IP address. Computer network communication is an important installation in a contemporary organization organisation. As the organization's service provision is improved through the reliable communication, its competition with related firms is enhanced and, therefore, valued competence. Ultimate network design as a mode of flow of information among employees and stakeholders in promotes coordination in the management, team work and services the business offer. This automatically improves the performance of the organisation at the good will of all workers.
It should be noted that an organisation's communication systems alone holds a large percentage in its performance that it should not be compromised, even on the slightest default. This would mean that the organisation would require an Information System that when a default occurs at any single point in the connection system, it would be easier to detect and reach that point as soon as possible. The design should be design with backbone network so temporally technical problem with not upset the performance of network communication. This is more appropriate in big organisations to maintain their data and communication confidentiality, integrity and accessibility. In networking design approach, the choice of device should be intelligently selected for the desired function, this will enhance performance in terms of managing security, traffic, errors in storage and transmitting information.
Documents and programs that are sensitive are run through LAN security domain system to create passwords for their protection against cybercrimes. The protected file would then be accessed by authorised personnel only. This would be an important idea where security of flowing information is paramount. Each set of the employee has got a privilege to prevent the access of any restricted file in the company.
Project Charter
Project Name
Network Design
Project Number
DW2
Project Team
Sponsor: Robert Elson
Author : Jacobs Adam
Manager: Joyce Rob.
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
Final Report Summary Group Effort
1. ITEC-4750-01 Networking & Information Assurance Team
Assignment Summaries & Group Efforts
Project Name: ITEC 4750 Senior Capstone Network Project
Team Members: Paul Szczepaniak, Teresa Barron, Brittany Gilstrap, Paul Spilman, Alexander Wang,
Ronald Norton, Kimberly Pate & Jerry Bryan
Project Manager: Jerry Bryan
Date: Sunday, November 13, 2011
Prepared By
Document Owner(s) Project/Organization Role
Teresa Barron Company Liaison
Brittany Gilstrap Scope Manager
Project Closure Report Version Control
Version Date Author Change Description
1 11/13/11 Teresa Barron Create document.
2 11/16/11 Teresa Barron Revise document
3 11/30/11 Brittany Gilstrap Combine document.
2. Assignment 1 Summary
In assignment 1, we had to identify and describe a real world problem or opportunity,
then we had to investigate and complete fact gathering. After the fact gathering is complete we
had to investigate and present system feasibility. For the first part of the assignment, we identify
our real world problem or opportunity as “FreeMax” a locally owned regional real-estate
company that is headquartered in Macon with branch offices in Dublin, Warner Robins, and
Perry. We have also stated that FreeMax is dedicated to providing strong leadership and
guidance throughout the real estate buying and selling experience. FreeMax (our company)
desires to install a new Wide Area Network update the Local Area Network(s) where necessary
in all locations due to recent company changes and business growth. Also, the company wishes
to the company wishes to deploy a companywide Internet Protocol (IP) based phone system
requiring upgraded infrastructure in some cases and new infrastructure in other cases. The
company plans to outsource their email services to Google Apps and the company plans to
maintain its own web servers at the Macon location.
In addition, we have worked up a feasibility report that details the current analysis of
FreeMax and what the company needed in order to install WAN and be able to update the LAN.
We have included an initial hardware & software cost estimate that list the type of hardware that
would be used in the in company along with Quantity and the cost of each piece of hardware
needed by the company. Also, we had worked up a Cost-Benefit analysis that describes the
advantages of using a MPLS Layer 2 Point to Point that might be suitable for FreeMax and can
save up to 40% of the cost compared to other network hardware. Along with that we also listed
the disadvantages of MPLS are that it only provides high bandwidth circuits and point to
multipoints are supported by MPLS. Part of Assignment 1 we developed a project charter, scope
3. statement , team contract, communication plan , work breakdown structure that we reviewed and
signed during our first or second team meeting to discuss assignment parts that are needed for the
capstone. In addition, we have include a Gantt chart to illustrate project milestones and
assignment due dates.
Assignment 1 Group Effort
For assignment one, we decided we wanted to kick off the first assignment and the class
with a physical meeting on the campus. Most members were able to meet up, while some were
not, but were contacted after the meeting to be assigned their work for the assignment. Each
member was given a document to complete, and upload to the discussion board. After this
meeting, everyone conducted the rest of the assignment via the discussion board, and everyone
took part in updating and uploading all documents necessary for the assignments instructions.
Everyone did a good job coordinating, and getting their assignments in on time for the turn in
date. This was probably the best coordination we had out of all our assignments, and I believe
that the face to face meeting was a great benefit for us.
Assignment 2 Summary
For this assignment we had to spit up team and worked on the necessary parts of the
assignment. Part 1, Paul and Brittany worked together to create Inputs, Outputs and Procedures
of the Capstone project. The second part of the assignment was focused on Information System
Design & Development that describe what kind of technology that the company uses. It also
describes that company use web-based service that is cutting edge that delivers accurate and
timely data analysis to customers and employees. The third part of the assignment, Alexander
Wang and Jerry Bryan worked together to identify the hardware and software like the necessary
4. software applications that we are using to develop the project along with any networkable
hardware. For our project, we specified that we use Dell servers, multifunction network printers,
wireless access points, voice over IP phones that will be setup in the branch office. On the final
part of the assignment, I worked with Ron to discuss system integration issues by describing
possible software applications like Drop box to access project files in a secure internet
environment. Also, we have discussed using VPNs between offices that that do not share
broadband equipment and capabilities as well as communicating between service providers. We
have also described using Using Active Directory to manage authentication will require us to be
aware of the locations that do not carry a high bandwidth.
Assignment 2 Group Effort
For assignment two, we decided that we would try to do the assignment completely
online, and coordinate the completion through the discussion board only. Group members were
split up into partners to complete the different parts of this assignment. Again, everyone
coordinated to finish their parts on time, but the amount of discussion fell shorter than expected
compared to our assignment one discussion. Regardless, we were able to get our parts in on time
for the due date, everyone was then asked to state opinions towards the completion of the
assignment, and how they felt it went.
Assignment 3 Summary
Assignment 3 was split into 2 separate parts: Information Systems Evaluation
Recommendations and Maintenance Recommendations. The evaluation recommendations we
discussed the purpose, system testing and analysis, user testing and feedback that we used for the
evaluating the network for our real estate company FreeMax. Maintenance recommendations
5. describe the types of recommendations that were needed to maintain the information systems of
FreeMax Realty. We have stated the scope of the company’s IT support department will largely
depend on the nature of any third party support agreements with local IT support contractors,
hardware and software vendors and limiting factors such as Internet connectivity where remote
support may be available at little to no cost above existing support agreements.
Assignment 3 Group Effort
For assignment three, we decided we would do the assignment through the discussion
board because the group leader would be out of town, but unfortunately, no work was done until
the last week it was due when the group leader would finally be back in town. During the last
week, the assignment was then divided into two parts, and the group was divided in half for these
parts. One member from each of the groups wrote the preliminary version of the document for
the other members to overview or modify it, if needed, and comment with approvals. In the end,
the team pulled it together, and was able to get the work done while submitting it on time as
well.