Setting Up a Network Project Part 1

In: Computers and Technology

Submitted By jinnzilla
Words 648
Pages 3
Kevin Flecker
NT-1230
7/31/14
Client Analysis, Project part 1
The first part of establishing a client-server network in the Home Hospice Care building would be establishing where the Access Points would be in the building for the WLAN, because the Windows 2008 server machine that is running Medical Manager is already set-up for the most part. Here is a diagram of the floor plan with the location of where the APs will be set-up. Each AP will be set-up with an omnidirectional antenna, with antenna gain features to ensure that signal is properly spread to all areas of the hospice through walls and other obstacles. I believe a wireless local area network is the best option.
Next, the servers for the file managers and three-in-one printer, copier, and fax machine must be set-up. These servers will also be running on Windows 2008 standard. The file machine needs to be its own dedicated box, so that there is no extra delay for managers and employees when files need to be read, wrote, and managed. A print server set-up with one three-in-one machine would be the easiest to set-up and cost-effective as well. This would be beneficial to all employees and easy to set-up on each workstation.
Windows 7 Professional edition would be the best idea for each workstation here at the company. Each workstation needs to have its own license purchased, but the benefits of having extended RAM capabilities is critical to the doctors/nurses here. Also, I think 6 notebook workstations would be a good standard for the doctors/nurses. They are always on the move, and they need these mobile workstations to accommodate their needs. The Office Manager, Intake Coordinators, Bereavement and Volunteer Counselors, Director of Professional Care, and the Admin will each need their own desktop workstations in their corresponding offices to be able to read/write and access files.…...

Similar Documents

Project Part 1,

...Project Part 1 : Multilayered Security Plan The safety and security of information owned by Richman Investments is extremely important and needs to monitored constantly. Through the following outline I hope to enhance the companies security, update systems and applications and ensure the integrity of the information stored on the network. The outlined areas will be monitored and reported monthly to senior management and will be updated as needed. The following outline will touch on each domain and will include security measures needed for those domains. 1.0 User Domain 2.1 Mobile storage disabled 2.2 Admittance to work area and computer with badge only. No visitors permitted 2.3 Multi-layered authentication with username/password and either token or biometrics 2.4 Training of new hires or quarterly training of current employees on security awareness 2.5 Security software with scanning capabilities to ensure no malware or virus intrusion is allowed. 2.0 Workstation 3.6 Hardware inventory taken quarterly to asses needs for new equipment or updates. 3.7 Software database examined to asses need for updates or antivirus renewal. 3.8 Different departments will be assessed groups in active directory to prevent authorization conflicts or confusion 3.9 Admittance to workstations will only be permitted with proper credentials, badge or token. 3.0 Lan 4.10 All cabinets and server rooms will be......

Words: 656 - Pages: 3

Project Part 1

...Security Threats Project Part 1: Current Security Threats The top three security threats that Aim Higher College faces are the following: * Mobile devices connecting to the network * Social Media * Compromised routers intercepting sensitive information These threats are the most common that any college faces. The threats have remained at the top of the list every year for a variety of reasons. This list of threats is also unique to college campuses. I will discuss each of the threats in this report. College students love new technology and each year smaller and more powerful devices are hitting the market. Students on the campus have a variety of devices ranging from cell phones, tablets, and laptops. These devices connect to the campus network and are used by students to check email, class schedules, get grades, and many other uses. The challenge is to allow these devices the necessary access and still have a secure network. Each device has to be checked for viruses, spyware, and other types of malware while still maintaining the C-I-A triad. A balance must be found between usability and security. Each time a remote device is connected to the network there is a possibility that the network can be compromised by one these devices. Every device should be authenticated, scanned, and identified. The use of social media has increased in recent years. Students and teachers both use things like Facebook, Myspace, and others. These applications have the......

Words: 326 - Pages: 2

Project Part 1 Microeconomics

...Lead Economist Laura From: Alex Anderson Subject: Project Part 1 After some research, I have come to a series of conclusions that I will explain in the document. To understand what type of economy the United States has, first we must consider the three types of economic outlines. These are central, market, and mixed economies. By taking a closer look at how each type of economy operates, and looking at examples of each, we can come to an understanding of what best fits the model of the United States. First, we will take a closer look at a central economy. This type of economy has its grounding in government rulings. At first description this sounds as though it would fit properly for the United States government as the government regulates taxes and tariffs on trade. However, in the case of a central economy system, the government makes all the economic decisions, preventing people (individuals or firms) from being able to affect the current market within the bounds of the system. This also has a very high chance to have a black market for many different good due to high government control. For example, if a certain good (milk) were to be set a low price, those who produce the milk may save some of it to sell to a black market for a better price on their good. Likewise, this control can be used in conjunction with knowledge of the average budget to fix prices so only people working for the highest power parts of the government can have excess capital to spend......

Words: 652 - Pages: 3

It255 Project Part 1

...Project Part 1 The seven domains of a typical IT Infrastructure are: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain. In this outline we will address several points of interest within each domain. This will help Richman Investments worldwide become one of the industry standards in security and access control. The following is a draft to be implemented across all branches of Richman Investments. User Domain Users can access systems applications and data depending upon their defined access rights. Vulnerabilities ✓ User inserts CDs and USB drives with personal photos music and videos. o Disable internal CD drives and USB ports, active antivirus scanning system examines all files on your computer’s hard drive and email attachments. ✓ Employee romance gone bad. o Track and monitor abnormal employee behavior, erratic job performance and use of IT infrastructure during off-hours. Workstation Domain Our organization’s staff should have the access necessary to be productive. Vulnerabilities ✓ Unauthorized access to workstation. o Enable password protection on workstation for access and auto screen lockouts for inactive times. ✓ Viruses, malicious code, or malware infects a user’s workstation or laptop computer. o Use workstation antivirus and malicious code policies, standards, procedures, and guidelines. Enable......

Words: 753 - Pages: 4

Project Part 1

...Project Part 1 The top three security threats that Aim Higher College faces are the following: Mobile devices connecting to the network, Social Media, and Compromised routers intercepting sensitive information. These threats are the most common that any college faces. The threats have remained at the top of the list every year for a variety of reasons. This list of threats is also unique to college campuses. I will discuss each of the threats in this report. College students love new technology and each year smaller and more powerful devices are hitting the market. Students on the campus have a variety of devices ranging from cell phones, tablets, and laptops. These devices connect to the campus network and are used by students to check email, class schedules, get grades, and many other uses. The challenge is to allow these devices the necessary access and still have a secure network. Each device has to be checked for viruses, spyware, and other types of malware while still maintaining the C-I-A triad. A balance must be found between usability and security. Each time a remote device is connected to the network there is a possibility that the network can be compromised by one these devices. Every device should be authenticated, scanned, and identified. The use of social media has increased in recent years. Students and teachers both use things like Facebook, Myspace, and others. These applications have the potential to transmit malware every time they are used on the......

Words: 543 - Pages: 3

Nt2580 Project Part 1

...PART 1 The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access. All of the servers will be virtual, and a backup of each server will be refreshed weekly and saved to cloud storage. All company data will be backed up and saved to cloud storage daily. All users requiring remote access will have a VPN set up with strict login requirements. These users will also have their laptops checked by the IT department on a monthly basis to ensure that they are in compliance with company security policy. Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access......

Words: 353 - Pages: 2

Project Part 1

...Project Part 1 I am the project manager for Global Communications, a multinational company that installs communication systems using a wide variety of communication technologies, ranging from stringing wire to fiber optics. While the corporate offices of Global Communications are located in the U.S., there are other divisions operating in the UK, Russia, Germany, France, Italy, China, India, Japan, Egypt, Mexico, and Argentina. The composition of project teams in Global Communications varies depending upon the project. However, a typical project team comprises a hardware engineer, a software engineer, a testing engineer, a network administrator, human resources for training, administrative support personnel, and computer programmers. A typical project involves drafting and design, procurement, and transportation and logistics. Recently, the Ministry of Communication of a small country in the Caribbean has approached Global Communications. The country has had a communication hardware failure that caused a breakdown of its entire communication system. My task as a project manager is to put together a project team that will ascertain the extent of the damage and recommend a course of action for the country to follow. I will begin this project by identifying the critical success factors (CSFs) necessary for the success of the project. Virtual teams are more complex because they cross boundaries related to time, distance, and organization (Duarte & Snyder, p.......

Words: 585 - Pages: 3

Setting Up Home Network

...Setting up a Home Network Srikanth Gunda Wilmington University 1. Overview of wireless networking technology There are various types of wireless network which are wireless Local Area Network (WLAN), Wireless personal Area Network (WPAN), Wireless mesh Network. Wireless networks are convenient in home network, small schools and offices. Wireless network are basically suitable to interconnect cell phones and computers, printers, TVs which helps in easy communication. Wireless network uses radio frequency rather than wire to communicate. Clients unite their gadgets which helps to communicate Wireless access points. The speed is relative to distance between the transmitter and receiver due to the utilization of radio frequency; consequently, the closer the client is to the transmitter the more the speed is. 2. Advantages of wireless networking technology Wireless networking technology gives various benefits to the household and office use, some of these benefits are below:- I. Most of the working class families have few computers which are arranged in various rooms. It is expensive, and time-consuming to introduce cables to a network that are situated in rooms which helps them to impart the broadband communication hence a wireless router resolves the issue. II. As the clients stay in the coverage of the signal, he/she can move their gadgets easily around the house. This protects hours of cable reconnection as the gadgets can get web by long wireless......

Words: 667 - Pages: 3

Nt2580- Project Part 1

...Project Part 1 Multi-Layered Security Plan Outline The following outline is to document the general security solutions for Richman investments, for all locations including head-quarters, for the safety of data and information that belongs to Richman Investments. This plan will be updated and submitted, every month by the networking division, to senior management along with a security plan for the month. 1. User Domain a. This Domain includes Individuals within an organization who access its information. b. An acceptable use policy to define what users can and cannot do with company IT information will be created. c. Managers should review security awareness training and review acceptable use policies with employees periodically. d. Internal CD drives and USB ports will be disabled. e. Content filtering and antivirus scanning on any downloaded media, and emails will be setup. f. Restrict access for users to only applications, data and systems needed to perform their job. g. Monitor and track employee behavior and their use of IT infrastructure during off hours. 2. Workstation Domain a. Systems where most users connect to the IT infrastructure. i. Workstations can be any desktop, laptop, or other device that connects to an organizations network. b. Password protection on all workstations. c. Auto screen lockout for inactive times. d. Strict access control procedures, standards, policies, and guidelines. e. All CD, DVD, and USB ports will be disabled. ...

Words: 779 - Pages: 4

Economics Project Part 1

...Project Part 1 Matthew Gist ITT Microeconomics ES2550 Roger Lignugaris April 19, 2015 Project Part 1 A. Does the United States have a comparative advantage in wingdings? Explain. It is cheaper to import wingdings than it is to produce them. If the US had a comparative advantage in wingdings, we would export them. Comparative advantage is that the countries with a comparative advantage in a certain good will specialize in and export that good. B. Discuss the effect of the tariff on the number of imports. The tariff decreases the import from 20 at the world price to 6 after the tariff.   The price increases from $6 to $8 for someone to buy a wingding in the US, which means the quantity demanded domestically is now 18 and the quantity supplied domestically is 12, which is only a shortage of 6 units that needs to be supplied. C. How did the imposition of the tariff change consumer surplus? The tariff decreased consumer surplus by the area with height 8-6 and base y = 26 and base z= 18. The area of this can be calculated by splitting the area into a rectangle and a triangle. The rectangle has an area of (8-6)x18=36 and the triangle has an area of (1/2)x(26-18)x2=8. Adding the two the consumer surplus went down by 44. D. How did the imposition of the tariff change producer surplus? Producer surplus increased after the tariff, by the area with height 8-6 and base y=6 and base z=12. The area of a trapezoid is just [(b1+b2)/2]xh, which is......

Words: 396 - Pages: 2

Project Part 1 Nt2580

...Michael Williams Nt2580 Project Security Domains and Strategies Keeping information assets secure is challenging for any business, regardless of its size. It seems there's no limit to the ingenuity and maliciousness of today's cybercriminals, hackers and identity thieves. In fact, hackers have become so sophisticated and organized that their operational methods are similar to those of traditional software development and business practices. When developing a multi-layered security plan, you must look at each of the seven domains of the IT infrastructure and increase security on each of those domains. Increasing the security on each of those seven domains will increase the overall security of the system and create a multi-layered security plan. In the user domain, one of the easiest ways for the system to be compromised is through the users. Simplicity of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year. This plan will give an overview of the security strategies that will be implemented at each level of the IT infrastructure for Richman Investments. 1) User Domain   a. Use security awareness training to instruct employees of Richman Investments security policies.   b. Audit user activity. 2) Workstation Domain  ......

Words: 470 - Pages: 2

Is3220 Project Part 1

...Security Project Part 1: Network Survey Project Part 2: Network Design Project Part 3: Network Security Plan ITT Technical Institute 8/4/15 Project Part 1: Network Survey Network Design and Plan Executive Summary: We have been engaged in business for some time, and have been very successful, however we need to re-examine our network configuration and infrastructure and identify that our network defenses are still reliable, before we make any changes. We need to take a hard look at our current configuration of host, services and our protocols within our organization. Data from a large number of penetration tests in recent years show most corporate networks share common vulnerabilities. Many of these problems could be mitigated by appropriate education in “hacker thinking” for technical staff. We will take a look at our security on routers and switches to make sure there are no leakages of data traffic. OBJECTIVE We have identified that we have loss some major accounts to competitors whose bids have been accurately just under our bid offers by exact amounts. We also believe due to shared reporting and public Web site functions that our Web servers have been compromised and our RFP documents have been leaked to competitors which enabled them to under bid us. We want to mitigate Web threats in the future; we realize the web is a mission critical business tool. We want to purchase new products and services, that will give us an edge and better protect our networks......

Words: 3355 - Pages: 14

Is 3440 Project Part 1

...INTRODUCTION (Task 1) First World Bank Savings and Loan (also referred to as “us”, “we”, “the company”, etc) has been investigating the use of a Linux-based infrastructure architecture. The task team has already made recommendations to evaluate and prototype this kind of set up. Key factors are cost of ownership, scalability, and reliability. Other factors that remain are maintaining confidentiality, integrity, and availability (the CIA triad), and ensuring stable, secure support of the over $100,000,000 in transactions completed annually. As a financial institution, we must also bear in mind compliance with the Gramm-Leach-Bliley Act (GLBA), as well as the Payment Card Industry Data Security Standard (PCI-DSS) since we process credit card transactions, and the Sarbanes-Oxely Act (SOX) as we are publically traded. Regardless of all these factors, rough estimates indicate we can save close to $4,000,000 in licensing fees alone by moving to a Linux-based infrastructure. Despite the open source nature of Linux, we should be able to meet all of the technical, legal, and security needs for this transition. TECHNICAL INFRASTRUCTURE NEEDS (Task 2) Thanks to the task team assigned to this project, an outline of what the network and routing needs has already been completed. The following services will be required to support: • A database server o Recommended solution: DBMS MySQL • A Web server o Recommended solution: Apache • A file server o Recommended solution: Red...

Words: 1376 - Pages: 6

Course Project Part 1

...BUSN379 Course Project Part 1 Task 1: Assessing loan options for AirJet Best Parts, Inc. 1. Regions Best (1+ .1317/12)^12 -1 =0.14 EAR = 14% National First (1+ (6.75+3.25)/2)^2 -1 =.1025 EAR = 10.25% 2. Based on my calculations I would choose the National First loan because the EAR is only 10.25%. The EAR for the Regions Best loan is 14%. The ideal EAR for the company would be the smallest rate. 3. (1+8.6/12)^12 -1 = 8.95%. Monthly payment 8.95% of $6,950,000 = $622,025. By taking a smaller amount loan will save them money that they will need to pay back in the end. If they don’t borrow enough they may end up closing because they ran out of money to get their feet off the ground. It all comes down to saving money now and taking that chance of starting quickly, or spending money now to get the factory set up and make money later. Task 2: Evaluating Competitor’s Stock 1. Lockheed Martin Corporation as of May 12, 2012 Price: 85.21 Dividend: 4.00 Rate of Return 4*(1+.05)/85.21 + .05 =.1204 =12.04% 2. Current Share Price Rate of Return = 12.04% 1.50*(1+.01) / (.1204-.01) =$13.72 3. Preferred Stock Price 1.5 / .1204 =$12.46 I would assume that the stockholder would want the current price to be higher than the preferred price because that would mean the stock is doing better than projected to be...

Words: 521 - Pages: 3

It255 Project Part 1

...IT255 Project Part 1 4/1/12 User Domain Vulnerabilities * CD dives and usb ports Disable internal drives and usb ports and enable auto antivirus scanning for any inserted media and email attachments * User destruction of data or systems Restrict access to job essential systems/applications. Keep write permissions to a minimum. Workstation Domain Vulnerabilities * Download of photos music and videos from the internet Enable content filtering and workstation auto antivirus scans for all new files * Desktop/laptop application software vulnerabilities Establish a software vulnerability upgrade procedure and push software and security patches in a timely manner LAN Domain Vulnerabilities * Unauthorized access to LAN Implement security measures to gain access to data closets/centers. ie. Access ID cards. * Securing confidentiality of data transmissions via WLAN Use encryption for all wireless transmissions on the WLAN. LAN-to-WAN Domain Vulnerabilities * Router, firewall, and network OS software vulnerabilities Apply security fixes and software patches right away with a 0 day WoV * Unauthorized network probing Disable ping, probing, and port scanning on all external network enabled devices in the domain. WAN Domain Vulnerabilities * Easy to eavesdrop on Use VPN’s and encryption for all transmissions * DoS, DDoS attacks Enable filters to firewalls and router WAN interfaces to block TCP SYN and ping. Remote Access Domain...

Words: 290 - Pages: 2

Eps9 Law & Order: SVU - Season 20 (2018) | surfer 16 | The Astronomer's Wife by Kay Boyle