Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Staab Itp 251 Chapter 9 Swl Case Presentation


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

Staab Itp 251 Chapter 9 Swl Case Presentation

  1. 1. To the Point<br />CH. 9<br />System Development and Analysis<br />John Staab, CEO<br />
  2. 2. SWL Team Tasks<br />Network Management Software<br />Wireless Network<br />Wireless Budget Plan - TCO<br />Security Plan<br />10 Tasks<br />Concurrent Tasks<br />Sequential Tasks<br />
  3. 3. Network Management Software<br />WhatsUpGold<br />SolarWinds<br />OpenNMS<br />Spiceworks<br />
  4. 4. Wireless Networks<br />Advantages<br />Ease of scalability<br />Less cost<br />Convenience<br />Disadvantages<br />Reliability<br />Speed<br />Security<br />
  5. 5. Wireless Networks<br />Installation Recommendation<br />At least G-band<br />Keep network speed up<br />Critical services should not be wireless<br />Servers with critical applications should be connected to a wired LAN.<br />Directional access points in strategic locations<br />Concentrate wireless network strength inside the building to prevent signal bleeding outside the facility<br />WiFi Protected Access version 2 (WPAv2)<br />Encrypt wireless communication<br />Wireless Intrusion Prevention Sensor (WIPS)<br />Detect and prevent wireless intrusions<br />
  6. 6. Wireless Budget Plan - TCO<br />
  7. 7. Wireless Security<br />Who is ultimately responsible for security?<br />Management is always ultimately responsible for anything that happens. However everyone is responsible, to some degree, because everyone can do their part to uphold the security of the network. Users can be made aware of best security practices, and held accountable if they fail to follow said practices. Management has to keep users informed of best practices and provide security training and requirements to users. The IT department is responsible for developing and applying security measures to the network.<br />
  8. 8. 10 Tasks – System Architecture<br />Enterprise Resource Planning<br />Initial Cost of Ownership<br />Total Cost of Ownership<br />Scalability<br />Integration<br />Security<br />Client/Server Design<br />Tiers<br />Topology<br />Monitoring<br />All tasks are somewhat independent but come together when completed<br />