SlideShare a Scribd company logo
Need a complete security set up for the following new implementation. Firewall locations and
config (vlan vs physical), authentication requirements, intrusion detection software, etc. Don't
forget physical security (door locks, data center access, etc.). Thank you. Scenario and
informaiton is below. HDS is the fictional company.
The proposed solution is a complete reworking of HDS's IS implementation. The core
components of this new system are: First, one database, located at the Phoenix office, which each
store accesses and updates. This database has transactions logged and changes backed up daily
with complete backups weekly. Second, implementation of a company intranet, accessible via
VPN, and hosted at the Phoenix location. This VPN connection allows each storefront access to
the same information (including the database) and allows HDS design team laptops to access
corporate information while off-site. Third, a complete security suite that provides authenticated
user access while monitoring for and halting nefarious network activity. Fourth, a redesigned
web site. This web site gives customers a window to past and current designs, store location
information, including up to date inventory information, renovation ordering and individual
access to their current designer and renovation progress. The web site also functions as an
employee portal to a subset of the corporate intranet. Fifth, updated, standardized, VOIP capable
LAN implementations at each location. This will provide increased team member bandwidth,
facilitate video and voice conferencing and sand-boxed guest wireless access.
Project Objectives: To the first point, IT Unlimited will implement a single, centralized, data
storage and database system. This system will be accessible via company intranet and will
provide at least a 50% reduction in time sent performing data entry activities. The reduction is
possible as each store will now query against a single database. Second, a redesigned web site
will significantly reduce time spent answering basic and common customer questions by
including: a FAQ page, viewable access to current and past designs, current store inventory, a
standardized – online – initial consultation form and links to corporate supply partners. Third, a
standardized (yet scalable) LAN implementation at each site will provide reduced IT workload
by allowing standard computer imaging, VOIP (with video/teleconference capabilities), sand-
boxed guest WIFI, VPN access to corporate intranet and account restricted database access.
Fourth, a cohesive security program will be implemented that allows for authenticated team
member access while detecting unlawful intrusions. It will also compartmentalize critical
information and systems to limit damage should access be gained.
Project Description: The overall concept of this project is as follows: One central database
(located at the Phoenix storefront) accessible via LAN, VPN and web portal. This database feeds
all relevant company information (employee data, client data, design data, scheduling, inventory,
etc.) to each authorized user and provides read only information to clients/potential clients. The
information accessible to clients (via the web site) is: design samples, inventory by store, store
contacts, personal renovation information and frequently asked questions (FAQs). Authorized
users will be able to access/update inventory quantities, adjust renovation schedules, input orders
for clients and add/update FAQs. This access will be via storefront LAN, secure VPN or
password protected web portal. Client orders will be input through an online, standardized form
(see appendix A for current form examples). Potential clients will initiate the ordering process by
inputting a standardized, online form. In order to streamline store communications and the
meeting process, each LAN will be provisioned to allow VOIP connectivity and provide suitable
throughput and bandwidth for Secure Video Teleconferencing between locations.
Need a complete security set up for the following new implementation. Firewall locations and
config (vlan vs physical), authentication requirements, intrusion detection software, etc. Don't
forget physical security (door locks, data center access, etc.). Thank you. Scenario and
informaiton is below. HDS is the fictional company.
The proposed solution is a complete reworking of HDS's IS implementation. The core
components of this new system are: First, one database, located at the Phoenix office, which each
store accesses and updates. This database has transactions logged and changes backed up daily
with complete backups weekly. Second, implementation of a company intranet, accessible via
VPN, and hosted at the Phoenix location. This VPN connection allows each storefront access to
the same information (including the database) and allows HDS design team laptops to access
corporate information while off-site. Third, a complete security suite that provides authenticated
user access while monitoring for and halting nefarious network activity. Fourth, a redesigned
web site. This web site gives customers a window to past and current designs, store location
information, including up to date inventory information, renovation ordering and individual
access to their current designer and renovation progress. The web site also functions as an
employee portal to a subset of the corporate intranet. Fifth, updated, standardized, VOIP capable
LAN implementations at each location. This will provide increased team member bandwidth,
facilitate video and voice conferencing and sand-boxed guest wireless access.
Project Objectives: To the first point, IT Unlimited will implement a single, centralized, data
storage and database system. This system will be accessible via company intranet and will
provide at least a 50% reduction in time sent performing data entry activities. The reduction is
possible as each store will now query against a single database. Second, a redesigned web site
will significantly reduce time spent answering basic and common customer questions by
including: a FAQ page, viewable access to current and past designs, current store inventory, a
standardized – online – initial consultation form and links to corporate supply partners. Third, a
standardized (yet scalable) LAN implementation at each site will provide reduced IT workload
by allowing standard computer imaging, VOIP (with video/teleconference capabilities), sand-
boxed guest WIFI, VPN access to corporate intranet and account restricted database access.
Fourth, a cohesive security program will be implemented that allows for authenticated team
member access while detecting unlawful intrusions. It will also compartmentalize critical
information and systems to limit damage should access be gained.
Project Description: The overall concept of this project is as follows: One central database
(located at the Phoenix storefront) accessible via LAN, VPN and web portal. This database feeds
all relevant company information (employee data, client data, design data, scheduling, inventory,
etc.) to each authorized user and provides read only information to clients/potential clients. The
information accessible to clients (via the web site) is: design samples, inventory by store, store
contacts, personal renovation information and frequently asked questions (FAQs). Authorized
users will be able to access/update inventory quantities, adjust renovation schedules, input orders
for clients and add/update FAQs. This access will be via storefront LAN, secure VPN or
password protected web portal. Client orders will be input through an online, standardized form
(see appendix A for current form examples). Potential clients will initiate the ordering process by
inputting a standardized, online form. In order to streamline store communications and the
meeting process, each LAN will be provisioned to allow VOIP connectivity and provide suitable
throughput and bandwidth for Secure Video Teleconferencing between locations.
Need a complete security set up for the following new implementation. Firewall locations and
config (vlan vs physical), authentication requirements, intrusion detection software, etc. Don't
forget physical security (door locks, data center access, etc.). Thank you. Scenario and
informaiton is below. HDS is the fictional company.
The proposed solution is a complete reworking of HDS's IS implementation. The core
components of this new system are: First, one database, located at the Phoenix office, which each
store accesses and updates. This database has transactions logged and changes backed up daily
with complete backups weekly. Second, implementation of a company intranet, accessible via
VPN, and hosted at the Phoenix location. This VPN connection allows each storefront access to
the same information (including the database) and allows HDS design team laptops to access
corporate information while off-site. Third, a complete security suite that provides authenticated
user access while monitoring for and halting nefarious network activity. Fourth, a redesigned
web site. This web site gives customers a window to past and current designs, store location
information, including up to date inventory information, renovation ordering and individual
access to their current designer and renovation progress. The web site also functions as an
employee portal to a subset of the corporate intranet. Fifth, updated, standardized, VOIP capable
LAN implementations at each location. This will provide increased team member bandwidth,
facilitate video and voice conferencing and sand-boxed guest wireless access.
Project Objectives: To the first point, IT Unlimited will implement a single, centralized, data
storage and database system. This system will be accessible via company intranet and will
provide at least a 50% reduction in time sent performing data entry activities. The reduction is
possible as each store will now query against a single database. Second, a redesigned web site
will significantly reduce time spent answering basic and common customer questions by
including: a FAQ page, viewable access to current and past designs, current store inventory, a
standardized – online – initial consultation form and links to corporate supply partners. Third, a
standardized (yet scalable) LAN implementation at each site will provide reduced IT workload
by allowing standard computer imaging, VOIP (with video/teleconference capabilities), sand-
boxed guest WIFI, VPN access to corporate intranet and account restricted database access.
Fourth, a cohesive security program will be implemented that allows for authenticated team
member access while detecting unlawful intrusions. It will also compartmentalize critical
information and systems to limit damage should access be gained.
Project Description: The overall concept of this project is as follows: One central database
(located at the Phoenix storefront) accessible via LAN, VPN and web portal. This database feeds
all relevant company information (employee data, client data, design data, scheduling, inventory,
etc.) to each authorized user and provides read only information to clients/potential clients. The
information accessible to clients (via the web site) is: design samples, inventory by store, store
contacts, personal renovation information and frequently asked questions (FAQs). Authorized
users will be able to access/update inventory quantities, adjust renovation schedules, input orders
for clients and add/update FAQs. This access will be via storefront LAN, secure VPN or
password protected web portal. Client orders will be input through an online, standardized form
(see appendix A for current form examples). Potential clients will initiate the ordering process by
inputting a standardized, online form. In order to streamline store communications and the
meeting process, each LAN will be provisioned to allow VOIP connectivity and provide suitable
throughput and bandwidth for Secure Video Teleconferencing between locations.
Solution
Now first create a table that is used to store the data of the company located at Pheonix database
center. Create two type of users that can access the data in these table one is normal user and
other is administrator. For providing security, te data can be accessed after the authentication is
done and queries are implemented in such a way that client cannot modify the data whereas
admin can do it. Triggers are implemented to check whether data is modified or updated or
deleted in the table..
Now the website which is treated as medium for accessing data can be connected via LAN or
internet. Server that stores the data will contain the process of authentication of user and provide
the corresponding functions to the respective users. Registered users can access the data
available in the table. For VoIP using the LAN there are five phases in setup of environment.

More Related Content

Similar to Need a complete security set up for the following new implem.pdf

Time and attendance software
Time and attendance softwareTime and attendance software
Time and attendance software
pftecsoft
 
I need cmit 495 wireless design paper.Background Information for.docx
I need cmit 495 wireless design paper.Background Information for.docxI need cmit 495 wireless design paper.Background Information for.docx
I need cmit 495 wireless design paper.Background Information for.docx
anthonybrooks84958
 
Video on demand system for us hospitality sector
Video on demand system for us hospitality sectorVideo on demand system for us hospitality sector
Video on demand system for us hospitality sector
Dusane Infotech India Pvt. Ltd.
 
Systems analysis project 10 can you answer the 4 questions at the t.pdf
Systems analysis project 10 can you answer the 4 questions at the t.pdfSystems analysis project 10 can you answer the 4 questions at the t.pdf
Systems analysis project 10 can you answer the 4 questions at the t.pdf
rohit219406
 
Proposal to Manage the Upgrade of the IT Infrastructure for PPESA
Proposal to Manage the Upgrade of the IT Infrastructure for PPESAProposal to Manage the Upgrade of the IT Infrastructure for PPESA
Proposal to Manage the Upgrade of the IT Infrastructure for PPESAFederico Schiavio
 
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docx
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docxWWTC Office Layout Diagram.htmlAmerican State & Local Po.docx
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docx
ericbrooks84875
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
rock73
 
Business information systems
Business information systemsBusiness information systems
Business information systems
smumbahelp
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
Debanjan Paul
 
Peter Coffee at Southland Technology Conference
Peter Coffee at Southland Technology ConferencePeter Coffee at Southland Technology Conference
Peter Coffee at Southland Technology Conference
Peter Coffee
 
Kaztranscom - OpenStack Summit 2016/Red Hat NFV Mini Summit
Kaztranscom  - OpenStack Summit 2016/Red Hat NFV Mini SummitKaztranscom  - OpenStack Summit 2016/Red Hat NFV Mini Summit
Kaztranscom - OpenStack Summit 2016/Red Hat NFV Mini Summit
kimw001
 
20110514 PMI San Diego Keynote
20110514 PMI San Diego Keynote20110514 PMI San Diego Keynote
20110514 PMI San Diego Keynote
Peter Coffee
 

Similar to Need a complete security set up for the following new implem.pdf (20)

Module 4 Assignment
Module 4 AssignmentModule 4 Assignment
Module 4 Assignment
 
Time and attendance software
Time and attendance softwareTime and attendance software
Time and attendance software
 
Poster
PosterPoster
Poster
 
List of Projects achieved
List of Projects achievedList of Projects achieved
List of Projects achieved
 
E-Commerce 07
E-Commerce 07E-Commerce 07
E-Commerce 07
 
I need cmit 495 wireless design paper.Background Information for.docx
I need cmit 495 wireless design paper.Background Information for.docxI need cmit 495 wireless design paper.Background Information for.docx
I need cmit 495 wireless design paper.Background Information for.docx
 
Video on demand system for us hospitality sector
Video on demand system for us hospitality sectorVideo on demand system for us hospitality sector
Video on demand system for us hospitality sector
 
Systems analysis project 10 can you answer the 4 questions at the t.pdf
Systems analysis project 10 can you answer the 4 questions at the t.pdfSystems analysis project 10 can you answer the 4 questions at the t.pdf
Systems analysis project 10 can you answer the 4 questions at the t.pdf
 
Overview one pager
Overview one pagerOverview one pager
Overview one pager
 
AFIS as SaaS - 8-5-2015
AFIS as SaaS - 8-5-2015AFIS as SaaS - 8-5-2015
AFIS as SaaS - 8-5-2015
 
Proposal to Manage the Upgrade of the IT Infrastructure for PPESA
Proposal to Manage the Upgrade of the IT Infrastructure for PPESAProposal to Manage the Upgrade of the IT Infrastructure for PPESA
Proposal to Manage the Upgrade of the IT Infrastructure for PPESA
 
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docx
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docxWWTC Office Layout Diagram.htmlAmerican State & Local Po.docx
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docx
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
 
Business information systems
Business information systemsBusiness information systems
Business information systems
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
 
Peter Coffee at Southland Technology Conference
Peter Coffee at Southland Technology ConferencePeter Coffee at Southland Technology Conference
Peter Coffee at Southland Technology Conference
 
Accomplishments
AccomplishmentsAccomplishments
Accomplishments
 
Kaztranscom - OpenStack Summit 2016/Red Hat NFV Mini Summit
Kaztranscom  - OpenStack Summit 2016/Red Hat NFV Mini SummitKaztranscom  - OpenStack Summit 2016/Red Hat NFV Mini Summit
Kaztranscom - OpenStack Summit 2016/Red Hat NFV Mini Summit
 
BinionsIIa
BinionsIIaBinionsIIa
BinionsIIa
 
20110514 PMI San Diego Keynote
20110514 PMI San Diego Keynote20110514 PMI San Diego Keynote
20110514 PMI San Diego Keynote
 

More from info324235

In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdfIn a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
info324235
 
How is Cladophora morphologically similar to Spirogyra How is it di.pdf
How is Cladophora morphologically similar to Spirogyra How is it di.pdfHow is Cladophora morphologically similar to Spirogyra How is it di.pdf
How is Cladophora morphologically similar to Spirogyra How is it di.pdf
info324235
 
How did greek medicine influence medicine todaySolutionGrek m.pdf
How did greek medicine influence medicine todaySolutionGrek m.pdfHow did greek medicine influence medicine todaySolutionGrek m.pdf
How did greek medicine influence medicine todaySolutionGrek m.pdf
info324235
 
Gather information about TinyOS and prepare short report about it.pdf
Gather information about TinyOS and prepare short report about it.pdfGather information about TinyOS and prepare short report about it.pdf
Gather information about TinyOS and prepare short report about it.pdf
info324235
 
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdfFoundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
info324235
 
Explain what single human development most contributed to the evolut.pdf
Explain what single human development most contributed to the evolut.pdfExplain what single human development most contributed to the evolut.pdf
Explain what single human development most contributed to the evolut.pdf
info324235
 
Case Study 4 Understanding a Development Miracle China business deci.pdf
Case Study 4 Understanding a Development Miracle China business deci.pdfCase Study 4 Understanding a Development Miracle China business deci.pdf
Case Study 4 Understanding a Development Miracle China business deci.pdf
info324235
 
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
info324235
 
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdfAbout 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
info324235
 
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdfA certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
info324235
 
________________stakeholders are the ones who most directly interact.pdf
________________stakeholders are the ones who most directly interact.pdf________________stakeholders are the ones who most directly interact.pdf
________________stakeholders are the ones who most directly interact.pdf
info324235
 
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
info324235
 
Write out a checklist for construction of a good graphic. For Ja.pdf
Write out a checklist for construction of a good graphic.  For Ja.pdfWrite out a checklist for construction of a good graphic.  For Ja.pdf
Write out a checklist for construction of a good graphic. For Ja.pdf
info324235
 
Which TCPIP Application layer protocol provides IP address resoluti.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdfWhich TCPIP Application layer protocol provides IP address resoluti.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdf
info324235
 
why do so many genes (20-30 of all genes) encode transport prot.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdfwhy do so many genes (20-30 of all genes) encode transport prot.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdf
info324235
 
Why is the NFP at the venous end a negative number filtration occur.pdf
Why is the NFP at the venous end a negative number  filtration occur.pdfWhy is the NFP at the venous end a negative number  filtration occur.pdf
Why is the NFP at the venous end a negative number filtration occur.pdf
info324235
 
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdfWhat are 3 changes that occur in dendritic cells once they become ‘a.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
info324235
 
Which of the following traits is considered MendelianSelect one.pdf
Which of the following traits is considered MendelianSelect one.pdfWhich of the following traits is considered MendelianSelect one.pdf
Which of the following traits is considered MendelianSelect one.pdf
info324235
 
What are three risks of not including best HR practices into the man.pdf
What are three risks of not including best HR practices into the man.pdfWhat are three risks of not including best HR practices into the man.pdf
What are three risks of not including best HR practices into the man.pdf
info324235
 
When a persons score on one variable is used to make predictions abo.pdf
When a persons score on one variable is used to make predictions abo.pdfWhen a persons score on one variable is used to make predictions abo.pdf
When a persons score on one variable is used to make predictions abo.pdf
info324235
 

More from info324235 (20)

In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdfIn a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
In a plaque assay, a microbiologist counts 20 plaques on a plate. Ho.pdf
 
How is Cladophora morphologically similar to Spirogyra How is it di.pdf
How is Cladophora morphologically similar to Spirogyra How is it di.pdfHow is Cladophora morphologically similar to Spirogyra How is it di.pdf
How is Cladophora morphologically similar to Spirogyra How is it di.pdf
 
How did greek medicine influence medicine todaySolutionGrek m.pdf
How did greek medicine influence medicine todaySolutionGrek m.pdfHow did greek medicine influence medicine todaySolutionGrek m.pdf
How did greek medicine influence medicine todaySolutionGrek m.pdf
 
Gather information about TinyOS and prepare short report about it.pdf
Gather information about TinyOS and prepare short report about it.pdfGather information about TinyOS and prepare short report about it.pdf
Gather information about TinyOS and prepare short report about it.pdf
 
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdfFoundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
Foundation of EthicsWhat does Mill say is the ultimate sanction of.pdf
 
Explain what single human development most contributed to the evolut.pdf
Explain what single human development most contributed to the evolut.pdfExplain what single human development most contributed to the evolut.pdf
Explain what single human development most contributed to the evolut.pdf
 
Case Study 4 Understanding a Development Miracle China business deci.pdf
Case Study 4 Understanding a Development Miracle China business deci.pdfCase Study 4 Understanding a Development Miracle China business deci.pdf
Case Study 4 Understanding a Development Miracle China business deci.pdf
 
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
5. An analog filer has system fnction Ha(s)--a (a) (10 pts,) Comvert .pdf
 
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdfAbout 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
 
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdfA certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
 
________________stakeholders are the ones who most directly interact.pdf
________________stakeholders are the ones who most directly interact.pdf________________stakeholders are the ones who most directly interact.pdf
________________stakeholders are the ones who most directly interact.pdf
 
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
 
Write out a checklist for construction of a good graphic. For Ja.pdf
Write out a checklist for construction of a good graphic.  For Ja.pdfWrite out a checklist for construction of a good graphic.  For Ja.pdf
Write out a checklist for construction of a good graphic. For Ja.pdf
 
Which TCPIP Application layer protocol provides IP address resoluti.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdfWhich TCPIP Application layer protocol provides IP address resoluti.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdf
 
why do so many genes (20-30 of all genes) encode transport prot.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdfwhy do so many genes (20-30 of all genes) encode transport prot.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdf
 
Why is the NFP at the venous end a negative number filtration occur.pdf
Why is the NFP at the venous end a negative number  filtration occur.pdfWhy is the NFP at the venous end a negative number  filtration occur.pdf
Why is the NFP at the venous end a negative number filtration occur.pdf
 
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdfWhat are 3 changes that occur in dendritic cells once they become ‘a.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
 
Which of the following traits is considered MendelianSelect one.pdf
Which of the following traits is considered MendelianSelect one.pdfWhich of the following traits is considered MendelianSelect one.pdf
Which of the following traits is considered MendelianSelect one.pdf
 
What are three risks of not including best HR practices into the man.pdf
What are three risks of not including best HR practices into the man.pdfWhat are three risks of not including best HR practices into the man.pdf
What are three risks of not including best HR practices into the man.pdf
 
When a persons score on one variable is used to make predictions abo.pdf
When a persons score on one variable is used to make predictions abo.pdfWhen a persons score on one variable is used to make predictions abo.pdf
When a persons score on one variable is used to make predictions abo.pdf
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 

Need a complete security set up for the following new implem.pdf

  • 1. Need a complete security set up for the following new implementation. Firewall locations and config (vlan vs physical), authentication requirements, intrusion detection software, etc. Don't forget physical security (door locks, data center access, etc.). Thank you. Scenario and informaiton is below. HDS is the fictional company. The proposed solution is a complete reworking of HDS's IS implementation. The core components of this new system are: First, one database, located at the Phoenix office, which each store accesses and updates. This database has transactions logged and changes backed up daily with complete backups weekly. Second, implementation of a company intranet, accessible via VPN, and hosted at the Phoenix location. This VPN connection allows each storefront access to the same information (including the database) and allows HDS design team laptops to access corporate information while off-site. Third, a complete security suite that provides authenticated user access while monitoring for and halting nefarious network activity. Fourth, a redesigned web site. This web site gives customers a window to past and current designs, store location information, including up to date inventory information, renovation ordering and individual access to their current designer and renovation progress. The web site also functions as an employee portal to a subset of the corporate intranet. Fifth, updated, standardized, VOIP capable LAN implementations at each location. This will provide increased team member bandwidth, facilitate video and voice conferencing and sand-boxed guest wireless access. Project Objectives: To the first point, IT Unlimited will implement a single, centralized, data storage and database system. This system will be accessible via company intranet and will provide at least a 50% reduction in time sent performing data entry activities. The reduction is possible as each store will now query against a single database. Second, a redesigned web site will significantly reduce time spent answering basic and common customer questions by including: a FAQ page, viewable access to current and past designs, current store inventory, a standardized – online – initial consultation form and links to corporate supply partners. Third, a standardized (yet scalable) LAN implementation at each site will provide reduced IT workload by allowing standard computer imaging, VOIP (with video/teleconference capabilities), sand-
  • 2. boxed guest WIFI, VPN access to corporate intranet and account restricted database access. Fourth, a cohesive security program will be implemented that allows for authenticated team member access while detecting unlawful intrusions. It will also compartmentalize critical information and systems to limit damage should access be gained. Project Description: The overall concept of this project is as follows: One central database (located at the Phoenix storefront) accessible via LAN, VPN and web portal. This database feeds all relevant company information (employee data, client data, design data, scheduling, inventory, etc.) to each authorized user and provides read only information to clients/potential clients. The information accessible to clients (via the web site) is: design samples, inventory by store, store contacts, personal renovation information and frequently asked questions (FAQs). Authorized users will be able to access/update inventory quantities, adjust renovation schedules, input orders for clients and add/update FAQs. This access will be via storefront LAN, secure VPN or password protected web portal. Client orders will be input through an online, standardized form (see appendix A for current form examples). Potential clients will initiate the ordering process by inputting a standardized, online form. In order to streamline store communications and the meeting process, each LAN will be provisioned to allow VOIP connectivity and provide suitable throughput and bandwidth for Secure Video Teleconferencing between locations. Need a complete security set up for the following new implementation. Firewall locations and config (vlan vs physical), authentication requirements, intrusion detection software, etc. Don't forget physical security (door locks, data center access, etc.). Thank you. Scenario and informaiton is below. HDS is the fictional company. The proposed solution is a complete reworking of HDS's IS implementation. The core components of this new system are: First, one database, located at the Phoenix office, which each store accesses and updates. This database has transactions logged and changes backed up daily with complete backups weekly. Second, implementation of a company intranet, accessible via VPN, and hosted at the Phoenix location. This VPN connection allows each storefront access to the same information (including the database) and allows HDS design team laptops to access
  • 3. corporate information while off-site. Third, a complete security suite that provides authenticated user access while monitoring for and halting nefarious network activity. Fourth, a redesigned web site. This web site gives customers a window to past and current designs, store location information, including up to date inventory information, renovation ordering and individual access to their current designer and renovation progress. The web site also functions as an employee portal to a subset of the corporate intranet. Fifth, updated, standardized, VOIP capable LAN implementations at each location. This will provide increased team member bandwidth, facilitate video and voice conferencing and sand-boxed guest wireless access. Project Objectives: To the first point, IT Unlimited will implement a single, centralized, data storage and database system. This system will be accessible via company intranet and will provide at least a 50% reduction in time sent performing data entry activities. The reduction is possible as each store will now query against a single database. Second, a redesigned web site will significantly reduce time spent answering basic and common customer questions by including: a FAQ page, viewable access to current and past designs, current store inventory, a standardized – online – initial consultation form and links to corporate supply partners. Third, a standardized (yet scalable) LAN implementation at each site will provide reduced IT workload by allowing standard computer imaging, VOIP (with video/teleconference capabilities), sand- boxed guest WIFI, VPN access to corporate intranet and account restricted database access. Fourth, a cohesive security program will be implemented that allows for authenticated team member access while detecting unlawful intrusions. It will also compartmentalize critical information and systems to limit damage should access be gained. Project Description: The overall concept of this project is as follows: One central database (located at the Phoenix storefront) accessible via LAN, VPN and web portal. This database feeds all relevant company information (employee data, client data, design data, scheduling, inventory, etc.) to each authorized user and provides read only information to clients/potential clients. The information accessible to clients (via the web site) is: design samples, inventory by store, store contacts, personal renovation information and frequently asked questions (FAQs). Authorized users will be able to access/update inventory quantities, adjust renovation schedules, input orders for clients and add/update FAQs. This access will be via storefront LAN, secure VPN or password protected web portal. Client orders will be input through an online, standardized form (see appendix A for current form examples). Potential clients will initiate the ordering process by inputting a standardized, online form. In order to streamline store communications and the
  • 4. meeting process, each LAN will be provisioned to allow VOIP connectivity and provide suitable throughput and bandwidth for Secure Video Teleconferencing between locations. Need a complete security set up for the following new implementation. Firewall locations and config (vlan vs physical), authentication requirements, intrusion detection software, etc. Don't forget physical security (door locks, data center access, etc.). Thank you. Scenario and informaiton is below. HDS is the fictional company. The proposed solution is a complete reworking of HDS's IS implementation. The core components of this new system are: First, one database, located at the Phoenix office, which each store accesses and updates. This database has transactions logged and changes backed up daily with complete backups weekly. Second, implementation of a company intranet, accessible via VPN, and hosted at the Phoenix location. This VPN connection allows each storefront access to the same information (including the database) and allows HDS design team laptops to access corporate information while off-site. Third, a complete security suite that provides authenticated user access while monitoring for and halting nefarious network activity. Fourth, a redesigned web site. This web site gives customers a window to past and current designs, store location information, including up to date inventory information, renovation ordering and individual access to their current designer and renovation progress. The web site also functions as an employee portal to a subset of the corporate intranet. Fifth, updated, standardized, VOIP capable LAN implementations at each location. This will provide increased team member bandwidth, facilitate video and voice conferencing and sand-boxed guest wireless access. Project Objectives: To the first point, IT Unlimited will implement a single, centralized, data storage and database system. This system will be accessible via company intranet and will provide at least a 50% reduction in time sent performing data entry activities. The reduction is possible as each store will now query against a single database. Second, a redesigned web site will significantly reduce time spent answering basic and common customer questions by including: a FAQ page, viewable access to current and past designs, current store inventory, a standardized – online – initial consultation form and links to corporate supply partners. Third, a standardized (yet scalable) LAN implementation at each site will provide reduced IT workload
  • 5. by allowing standard computer imaging, VOIP (with video/teleconference capabilities), sand- boxed guest WIFI, VPN access to corporate intranet and account restricted database access. Fourth, a cohesive security program will be implemented that allows for authenticated team member access while detecting unlawful intrusions. It will also compartmentalize critical information and systems to limit damage should access be gained. Project Description: The overall concept of this project is as follows: One central database (located at the Phoenix storefront) accessible via LAN, VPN and web portal. This database feeds all relevant company information (employee data, client data, design data, scheduling, inventory, etc.) to each authorized user and provides read only information to clients/potential clients. The information accessible to clients (via the web site) is: design samples, inventory by store, store contacts, personal renovation information and frequently asked questions (FAQs). Authorized users will be able to access/update inventory quantities, adjust renovation schedules, input orders for clients and add/update FAQs. This access will be via storefront LAN, secure VPN or password protected web portal. Client orders will be input through an online, standardized form (see appendix A for current form examples). Potential clients will initiate the ordering process by inputting a standardized, online form. In order to streamline store communications and the meeting process, each LAN will be provisioned to allow VOIP connectivity and provide suitable throughput and bandwidth for Secure Video Teleconferencing between locations. Solution Now first create a table that is used to store the data of the company located at Pheonix database center. Create two type of users that can access the data in these table one is normal user and other is administrator. For providing security, te data can be accessed after the authentication is done and queries are implemented in such a way that client cannot modify the data whereas admin can do it. Triggers are implemented to check whether data is modified or updated or deleted in the table.. Now the website which is treated as medium for accessing data can be connected via LAN or internet. Server that stores the data will contain the process of authentication of user and provide the corresponding functions to the respective users. Registered users can access the data available in the table. For VoIP using the LAN there are five phases in setup of environment.