Information Technology Strategic Plan

Term Paper: Information Technology Strategic Plan

Imagine that a company has recently hired you as a senior business consultant. The company is seeking to gain better traction with regard to customer satisfaction and loyalty. The company hired you because of your expertise with mobile apps, social media, and cloud technology. The management of the company feels that yearly revenues could top $20 million per year with the infusion of current technology. Currently the company has revenue of $5 million per year.

Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Write an eight to ten (8-10) page paper in which you:

  • Write an introductory statement of the company including but not limited to the type of the company, the location, the industry in which it competes, and the organizational vision and mission that encompasses the nature of the company.
  • Specify the current situation of the company with regard to its technology and security aspects.
  • Determine at least five (5) information technology personnel / roles that would be in place in order to start the business venture of gaining better traction of customer satisfaction and loyalty. Justify your response.
  • Conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis for the business venture in question for the company. Justify your response.
  • Develop at least five (5) major goals for the information technology strategic plan. Justify your response.
  • Speculate on three (3) positive organizational impacts of implementing the strategic plan. Justify your response.
  • Use at least three (3) quality references. Note: Wikipedia and other Websites do not qualify as academic resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the role of the information technology professional.
  • Develop an information technology strategic plan to address and solve a proposed business problem.
  • Describe and identify the uses of business process management and systems development.
  • Use technology and information resources to research issues in information systems and technology.
  • Write clearly and concisely about topics related to information systems for decision making using proper writing mechanics and technical style conventions.

Rubric attached below.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

TERM PAPER INSTRUCTIONS FOR STUDENTS

TERM PAPER INSTRUCTIONS FOR STUDENTS

This final project asks you to draw upon all that you have learned, integrate five sources provided during the semester, and demonstrate your skills in scholarly research and analysis through the use of five sources from scholarly journals, books, or other forms of research. You must develop an original thesis/argument containing several parts. And, as you prove each part of your thesis in the paragraphs that follow, you will cite sources and provide direct quotations. The formatting of your paper, your in-text citations, and your references page should all adhere to APA formatting guidelines. The minimum length of this essay is 1500 words and the final product should be free of obvious grammatical and stylistic errors.

Here are some resources to help with your writing:

APA Formatting: In-Text Citations
APA Formatting: References List
APA Formatting: Sample Paper
Developing A Thesis
Prewriting and Outlining Your Essay
What is a scholarly source?
NOEL Studio for Academic Creativity
EKU Library’s Scholarly Databases
Author’s Rules for Writing: Stephen King
The easiest way to write a strong essay is to start with a thesis that previews your paper. Such theses tend to contain a coordinating junction such as “because.” For example, “Military veterans often struggle with reintegration because of the differences between collectivists and individualistic cultures, the common disabilities caused during deployments, and public perceptions of veterans in college and the workplace.” The thesis statement typically comes at the end of the first paragraph, following an anecdote or fact that introduces the topic. This thesis statement is also the outline of the paper as each phrase following the word “because” is a main point.

The first part of the essay would discuss the differences between collectivists and individualistic cultures, quoting sources that provide evidence of how the military is collectivist and civilian cultures are individualistic. It is best to write one paragraph per source. So, in using multiple sources to prove a main point, you will end up breaking that main point down into sub arguments. You would follow this same pattern in examining the other main points about disabilities and public perceptions of veterans.

After you have used evidence to prove your thesis there are two more things to do. First, you want to show that you have considered opposing viewpoints by writing a “rebuttal paragraph.” This paragraph comes just before the conclusion. If you encountered any sources during the research phase that did not support your argument, but that you felt were not convincing enough to change your mind, cite them in your rebuttal and explain why your view remains the same.

Lastly, you just need to write your conclusion. Begin by restating your thesis and reviewing some of the evidence covered in your main points. End the essay strong with a call to action, suggestions for further research, or by explaining how your argument addresses the problems presented in the essay in a new way.

Writing research essays is not easy. It requires lots of reading. You sometimes have to revise your argument based on the new evidence you find. Essays require many drafts, and sometimes it helps to work with a peer or tutor to catch the mistakes you may have missed. You are encouraged to reach out to the classmates you worked with this semester to facilitate peer review. The NOEL Studio for Academic Creativity provides online and in-person consultations to help guide your writing. And the EKU Library’s staff can be very helpful in procuring sources. You have learned a lot. You have a lot of resources at your disposal. You got this.

TERM PAPER PROMPT

You are a Human Resources Specialist for a large corporation with 5,000 employees in various branches throughout the world. The CEO of the company has made a public commitment to increase the number of veterans it hires and the Executive Vice President of Talent Relations has tasked you with researching trends among military veterans to determine the likely outcomes for your company should it meet this goal.

Specifically, you have been asked to complete a report that addresses the positive qualities veterans bring to the work place. You must also address the unique challenges veterans face when reintegrating into civilian life and employment, proposing ways for the company to accommodate the needs of those veterans it chooses to hire. These accommodations may include trainings about military culture and misconceptions about veterans. They may take into consideration the unique needs of veterans with disabilities. Or, they may address the ways in which your company inducts and trains its employees given the types of training military veterans are used to receiving. Importantly, your report should not take a deficit-based approach that presents veterans as a burden. Such an approach would marginalize veteran employees and go against the stated intent of the CEO. Your goal is to highlight the strengths and diversity veterans will bring to the company while proposing internal changes that will help them integrate more smoothly.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

It is believed that the social status of people with disability (PWD) has improved in Hong Kong in the recent decades

Guideline for Term Paper

  • Language: English
  • Typed, A4 paper with 1.5-line spacing
  • Font: 12; Times New Roman
  • Length: 2000 words (Bibliography is not counted)
  • Bibliography is a must.Any format will do (APA, MLA…etc)
  • Submit your term paper via Turnitin on Moodle.
  • Cover Page: Please type your name, student ID and question number on cover page.
  • Topic:
    • It is believed that the social status of people with disability (PWD) has improved in Hong Kong in the recent decades.To what extent do you agree?Which model of disability is useful in understanding and helping the PWD in Hong Kong?
    • A)How many people with disability are there in HK?You may choose 1-2 type(s) of disability as your focus of discussion in this paper.
    • B)Do you think the representation of people with disability has been changing in the media over the years?You may explore the image of PWD in the news, the mass media as well as that on the social media (e.g. youtube).

    • C)What are the problems and difficulties faced by people with disability and chronic illness? With reference to the medical and social model of disability, what are the cause of that above problems?

    • D)What are the changes in social policy and regulation that help the people with disability?How far are they helpful to the PWD?Are there any essential needs of PWDs that are not addressed? 

    • E)Conclude your paper by summarising the situation of PWD and your stance on which model of disability is more useful for us to understand and help the PWD.You may suggest what else should be done to improve the situation of PWD.
    ×××which include: Major theme/question, key concepts and arguments, useful resources (website, journals or book chapter). ×××
 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Contingency Planning in Action

Term Paper: Contingency Planning in Action

Create a hypothetical organization with details including geographic location(s), number of employees in each location, primary business functions, operational and technology details, potential threats to the business and its technology, and anything else that you believe is relevant to the business.

Assume this organization is lacking in its contingency planning efforts and requires assistance in ensuring these efforts are appropriately addressed to increase its overall security and preparedness posture.

Write a ten to fifteen (10-15) page paper in which you:

Provide an overview of the organization and indicate why contingency planning efforts are needed and how these efforts could benefit the business.
Develop a full contingency plan for the organization. Include all subordinate functions / sub plans, including BIA, IRP, DRP, and BCP efforts.
Determine the policies and procedures that would be needed for all contingency planning efforts. Detail the role of the policy / procedure, and explain how each would help achieve the goals of these efforts.
Detail the processes to utilize in order to fully implement the contingency plan and its components, and explain the efforts to consider in maintaining the plans.
Create a hypothetical incident scenario where the contingency planning efforts would need to be utilized and detail: a. How the plan is sufficiently equipped to handle the incident. b. a timeline for the incident response and recovery efforts.
Identify any ethical concerns that are specific to this organization and its incident response personnel (especially the CP Team Leader), and explain how to plan for these concerns.
Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:

Explain risk management in the context of information security.
Develop a disaster recovery plan for an organization.
Summarize the various types of disasters, response and recovery methods.
Compare and contrast the methods of disaster recovery and business continuity.
Explain and develop a business continuity plan to address unforeseen incidents.•Describe crisis management guidelines and procedures.
Describe detection and decision-making capabilities in incident response.
Develop techniques for different disaster scenarios.
Evaluate the ethical concerns inherent in disaster recovery scenarios.
Use technology and information resources to research issues in disaster recovery.
Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

ORGANIZATIONAL CHANGE AND DEVELOPMENT

MANAGEMENT 450

ORGANIZATIONAL CHANGE AND DEVELOPMENT

SPRING 2016

TERM PAPER GUIDELINES

ORGANIZATION SUMMARY

In this section, describe the company and its current position.  Include information about the mission, vision and corporate/business strategy, and strategic goals.  Consider the following in your overview:

·  Mission

·  Vision

·  Values

·  Guiding Principles

·  Culture

·  Management

·  Management Style

·  Structure

·  Financials

·  Market Position

ORGANIZATION PROBLEMS/CHALLENGES

In this section, outline the problems and/or challenges currently facing the organization.  Use the article provided as a starting point.  Research at least two other sources to ensure that you have thoroughly identified the major changes that are facing the organization.

CAUSES

In this section, conduct a SWOT analysis to seek the sources of the problems that are leading to the need for change.

INTERNAL

Strengths and Weaknesses

·  Resources

·  Capabilities

·  Core Competencies

EXTERNAL

Opportunities and Threats

·  General Environment

·  Industrywide

·  Direct Competition

ANALYSIS

Determine the Performance Gap.  Utilize the Diagnostic Models to facilitate the analysis of the organization system. Identify the Systems Affected (all).  Which of the Basic Strategies to change should be utilized?  Determine the appropriate OD Interventions and the levels of each activity (see Table 7.1- the various activities listed in this table are amplified in future chapters).  Why do you believe each OD Intervention (activity) would be useful to the change process?  Be specific in your discussion, using the concepts from the course. Creating a Stream Analysis Chart with suggested activities and hypothetical timelines may be helpful in this process.  This analysis should lead you to various alternatives for the organization for managing change.  What resistance, if any, might you anticipate with the various interventions?  What can be done to mitigate resistance?  How can you ensure engagement?

FINAL RECOMMENDATIONS AND SUMMARY

After you have explored the various alternatives (OD Interventions/actions), recommend those that you think will be most successful and describe why you think these would lead to successful change for the organization.  How do you expect the organization to transform?

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Write a ten to fifteen (10-15) page paper in which you complete the following three (3) Parts

This term paper involves putting together the various concepts learned throughout this course. You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting there three (3) different services. Once you have fully designed your network, you will need to provide three (3) workflow diagrams explaining how your designed network handles the three (3) different transactions. The first is an internal user sending an email using his / her corporate email address to a user on the Yahoo domain with an arbitrary address of user534@yahoo.com. The second workflow diagram should show a user initiating an FTP session from inside your network to the arbitrary site of ftp.netneering.com. The third workflow is an externally located employee initiating a VPN session to corporate in order to access files on the Windows desktop computer, DT-Corp534-HellenS, at work.

Write a ten to fifteen (10-15) page paper in which you complete the following three (3) Parts. Note: Please use the following page breakdown to complete your assignment:

Overall network diagram: One (1) page
Datapath diagrams: Three (3) pages (one for each diagram)
Write-up: six to ten (6-10) pages
Part 1
Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you’ve designed from the user or endpoint device to the Internet cloud, and everything in between, in which you:
Follow the access, core, distribution layer model.
Include at a minimum:
Authentication server (i.e. Microsoft Active Directory)
Routers
Switches (and / or hubs)
Local users
Remote users
Workstations
Files share (i.e. CIFS)
Mail server
Web servers (both internal and external)
Firewalls
Internet cloud
Web proxy
Email proxy
FTP server (for internal-to-external transport)
Explain each network device’s function and your specific configuration of each networking device.
Design and label the bandwidth availability or capacity for each wired connection.
Part 2
Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
Local user sends email to a Yahoo recipient. Local (corporate) user having email address jonny.hill@Corp534.com sends an email to user534@yahoo.com.
Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.
Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
Local user, Jonny Hill, transfers file using ftp through the Internet to another company’s site (ftp.netneering.com). He has to access the secure shell using his active directory credentials to authenticate to the ftp server (linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to ftp.netneering.com.
Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.
Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop, DT-Corp534-HellenS. Hellen uses a browser to initiate her VPN connection. By browsing to https://VPNaccess.corp534.com, she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built.
Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.
Explain how your overall design protects the organization from both inside and outside attacks. Give examples.
Explain how your layered design compensates for possible device failures or breaches in network security.
Determine whether any possible bottlenecks exist in your design.
Explain how to make the file transfer process more secure.
Part 3
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.
The specific course learning outcomes associated with this assignment are:
Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used in IP networking.
Identify network security tools and discuss techniques for network protection
Describe the foundational concepts of VPNs.
Design a secure network to address a business problem.
Use technology and information resources to research issues in network security design.
Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.
Click here to view the grading rubric.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Analysis and Design Document

TopBike

This assignment consists of two (3) sections: analysis and design document, a requirements document, and a project plan that is created through the use of MS Project. You must submit the three (3) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

Imagine that you, a systems architect leading a consulting team, are asked to perform a systems analysis and design to help TopBike implement a software system that can improve their profits and save costs.

Section 1: Analysis and Design Document

  1. Write a ten to twelve (10-12) page paper in which you:
    1. Identify the business problems that TopBike has.
    2. Determine the analysis technique for this project and explain why.
    3. Determine the methodology for this project and explain why.
    4. Identify the roles (i.e., system analyst, developer) for the team and explain their responsibilities.
    5. Explain how to conduct requirements gathering sessions and determine the tools to use.
    6. Create the functional model, structural model, and behavioral model with class diagrams through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
    7. Create a design document with a data management layer.
    8. Draw a physical architecture diagram for the final solution through the use of graphical tools in Microsoft Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. .
    9. Explain the human-interface design considerations.
    10. Explain the steps for developing test cases and describe how they help the overall project.
    11. Determine the change management process and post implementation strategy for the project and product.
    12. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 2: Requirements Document

  1. Create a requirements document that includes:
    • Functional and nonfunctional requirements for TopBike.
    • Nonfunctional requirements for TopBike.
    • Use cases and their descriptions.

Section 1 and 2 of this assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

Section 3: Project Plan

Use Microsoft project to:

  1. Develop the project plan. The project plan must:
  • Record all tasks, subtasks, resources, and time related to the project.
  • Outline the planning, analysis, design, and implementation phases.
  • Identify the key milestones of your project.

The specific course learning outcomes associated with this assignment are:

  • Explain and apply object-oriented analysis techniques.
  • Compare and contrast different roles needed in systems analysis and design.
  • Compare and contrast requirements gathering among traditional and iterative project methods.
  • Procure, document, and scope IT project requirements with use cases.
  • Describe object-oriented modeling, structural modeling, and behavioral modeling.
  • Develop class diagram based on business scenarios.
  • Create a business requirements document that conforms to the Unified Modeling Language standard.
  • Apply the project requirements steps of eliciting, analyzing, documenting, and testing to address and solve a proposed business problem.
  • Determine the steps and principles of design modeling with UML.
  • Describe how societal mores and social media impact the design of human-computer interactions.
  • Describe the impact of contemporary computing architecture to the physical architecture design.
  • Describe how to gather nonfunctional requirements and its importance for overall IT project success.
  • Explain the importance of change management and post-implementation support and how they impact business and overall enterprise.
  • Describe and design test cases that uncover software bugs.
  • Develop a business requirements document that addresses and solves a proposed business problem.
  • Use technology and information resources to research issues in procuring and designing project requirements.
  • Write clearly and concisely about project requirements and design topics using proper writing mechanics and technical style conventions.
 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

ORGANIZATIONAL CHANGE AND DEVELOPMENT

MANAGEMENT 450

ORGANIZATIONAL CHANGE AND DEVELOPMENT

SPRING 2016

TERM PAPER GUIDELINES

ORGANIZATION SUMMARY

In this section, describe the company and its current position. Include information about the mission, vision and corporate/business strategy, and strategic goals. Consider the following in your overview:

· Mission

· Vision

· Values

· Guiding Principles

· Culture

· Management

· Management Style

· Structure

· Financials

· Market Position

ORGANIZATION PROBLEMS/CHALLENGES

In this section, outline the problems and/or challenges currently facing the organization. Use the article provided as a starting point. Research at least two other sources to ensure that you have thoroughly identified the major changes that are facing the organization.

CAUSES

In this section, conduct a SWOT analysis to seek the sources of the problems that are leading to the need for change.

INTERNAL

Strengths and Weaknesses

· Resources

· Capabilities

· Core Competencies

EXTERNAL

Opportunities and Threats

· General Environment

· Industrywide

· Direct Competition

ANALYSIS

Determine the Performance Gap. Utilize the Diagnostic Models to facilitate the analysis of the organization system. Identify the Systems Affected (all). Which of the Basic Strategies to change should be utilized? Determine the appropriate OD Interventions and the levels of each activity (see Table 7.1- the various activities listed in this table are amplified in future chapters). Why do you believe each OD Intervention (activity) would be useful to the change process? Be specific in your discussion, using the concepts from the course. Creating a Stream Analysis Chart with suggested activities and hypothetical timelines may be helpful in this process. This analysis should lead you to various alternatives for the organization for managing change. What resistance, if any, might you anticipate with the various interventions? What can be done to mitigate resistance? How can you ensure engagement?

FINAL RECOMMENDATIONS AND SUMMARY

After you have explored the various alternatives (OD Interventions/actions), recommend those that you think will be most successful and describe why you think these would lead to successful change for the organization. How do you expect the organization to transform?

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Write a ten to fifteen (10-15) page paper in which you complete the following three (3) Parts

This term paper involves putting together the various concepts learned throughout this course. You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting there three (3) different services. Once you have fully designed your network, you will need to provide three (3) workflow diagrams explaining how your designed network handles the three (3) different transactions. The first is an internal user sending an email using his / her corporate email address to a user on the Yahoo domain with an arbitrary address of user534@yahoo.com. The second workflow diagram should show a user initiating an FTP session from inside your network to the arbitrary site of ftp.netneering.com. The third workflow is an externally located employee initiating a VPN session to corporate in order to access files on the Windows desktop computer, DT-Corp534-HellenS, at work.

Write a ten to fifteen (10-15) page paper in which you complete the following three (3) Parts. Note: Please use the following page breakdown to complete your assignment:

Overall network diagram: One (1) page
Datapath diagrams: Three (3) pages (one for each diagram)
Write-up: six to ten (6-10) pages
Part 1
Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you’ve designed from the user or endpoint device to the Internet cloud, and everything in between, in which you:
Follow the access, core, distribution layer model.
Include at a minimum:
Authentication server (i.e. Microsoft Active Directory)
Routers
Switches (and / or hubs)
Local users
Remote users
Workstations
Files share (i.e. CIFS)
Mail server
Web servers (both internal and external)
Firewalls
Internet cloud
Web proxy
Email proxy
FTP server (for internal-to-external transport)
Explain each network device’s function and your specific configuration of each networking device.
Design and label the bandwidth availability or capacity for each wired connection.
Part 2
Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
Local user sends email to a Yahoo recipient. Local (corporate) user having email address jonny.hill@Corp534.com sends an email to user534@yahoo.com.
Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.
Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
Local user, Jonny Hill, transfers file using ftp through the Internet to another company’s site (ftp.netneering.com). He has to access the secure shell using his active directory credentials to authenticate to the ftp server (linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to ftp.netneering.com.
Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.
Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop, DT-Corp534-HellenS. Hellen uses a browser to initiate her VPN connection. By browsing to https://VPNaccess.corp534.com, she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built.
Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.
Explain how your overall design protects the organization from both inside and outside attacks. Give examples.
Explain how your layered design compensates for possible device failures or breaches in network security.
Determine whether any possible bottlenecks exist in your design.
Explain how to make the file transfer process more secure.
Part 3
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.
The specific course learning outcomes associated with this assignment are:
Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used in IP networking.
Identify network security tools and discuss techniques for network protection
Describe the foundational concepts of VPNs.
Design a secure network to address a business problem.
Use technology and information resources to research issues in network security design.
Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.
Click here to view the grading rubric.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"