They have a magnificent team. These people are always kind and willing to listen to your concerns or issues. Better yet, your assignment is always ready before the time, they usually send you a draft to double-check before they finalize your paper.
IT Management: Undergraduate: Research Paper: English (U.S.): 17 pages/4675 words:MLA
3 sources due in 2 days
ANALYSIS: 1. Project topic AND description: In preparation for a network security inspection there were multiple deficiencies noted making the system non-compliant with Department Of Defense standards. These deficiencies included the lack of an approved SSP for any servers. This project will cover all of the changes and documentation that are needed to bring the system back into compliance.
2. Project purpose and goals: The purpose of the project is to achieve system security compliance with both Windows server 2012R2, MSSQL 2014 and IIS while maintaining functionality of both public and private facing websites and databases. Any deviation from security checks must be documented and approved.
DESIGN and DEVELOPMENT: 1. Explain why the problem and technological solution you have proposed are worthy of study: If the system is not brought into compliance standards it will be shutdown which will have a direct and significant impact on training in the Army. The sites hosted cover unclassified intelligence community training, IT training and Communications training. There are instructional videos being hosted that are used worldwide and by deployed forces that aid in set up configuration and maintenance of equipment needed to support warfighters.
2. Projected outcomes and deliverables: Projected outcomes are to have a system that is secure to the maximum extent possible with proper documentation to allow for continued operations. The SSP will be submitted for approval. All server, website and database names will be removed from the documentation. In addition the checklists used will be the publicly available DISA checklists to ensure there is no Ã¢â‚¬Å“Official Use OnlyÃ¢â‚¬Â material included.
3. Estimated number of hours for the following: i. Planning and design: The initial assessment to gauge current level of compliance takes 16 hours per database server and another 16 hours for each Webserver. With 4 webservers and 1 database server it will take 80 hours to plan out what steps are needed to achieve compliance. Some of these tasks can be run concurrently between two administrators with assessment being completed on 2 servers at a time. Therefore 80 man-hours would be 40 work hours. ii. Development: Because there are no additional contractors or supplies needed this phase should be relatively quick. Collecting the requirements together will take an additional 24 hours. The biggest portion is assigning specific tasks between the two administrators which should be accomplished within another 8 hours. iii. Documentation: Making necessary changes and documenting those changes will take another 80 man-hours. Creating the SSP and having it ready for submission should take an estimated 40 hours. iv. Total: 232 man-hours.
4. Projected completion date: 10 January 2019 IMPLEMENTATION and EVALUATION: 1. Describe how you will approach the implementation of your project: Project will be completed by completing publicly available checklists to verify settings in IIS, MSSQL and Windows Server 2012R2 conform to set standards. Once those checks are made then those products will be set to conform to the standards to the maximum extent possible with an exceptions being documented in the SSP. The final evaluation of successful implementation will be an outside organization inspecting the system for compliance IAW DOD standards.
The following are the requirements for the
A. Write an abstract (suggested length of 200Ã¢â‚¬â€œ250 words) of the project you have selected. Include each of the following:Ã¢â‚¬Â¢ an IT business problem under investigationÃ¢â‚¬Â¢ a proposed solutionÃ¢â‚¬Â¢ the project management concerns of concurrently managing multiple projects and how you plan to allocate resourcesÃ¢â‚¬Â¢ the project stakeholders and an explanation of the needs of each stakeholder groupÃ¢â‚¬Â¢ the key points of your implementation proposalÃ¢â‚¬Â¢ the metrics you will use to measure the proposed and actual outcomes of this project
B. Write a needs analysis for the project design and development phase. Include each of the following:Ã¢â‚¬Â¢ the problem and its causesÃ¢â‚¬Â¢ the impact of the problem on each identified stakeholder groupÃ¢â‚¬Â¢ how the solution aligns with industry standards, laws, and regulations
C. Write a cost analysis for project design and development. Include each of the following:Ã¢â‚¬Â¢ the itemized costs for hardware, software, licensing, time, labor, and total costsÃ¢â‚¬Â¢ a justification of these costs using research to support your claims
D. Perform a risk assessment to include each of the following:Ã¢â‚¬Â¢ the quantitative and qualitative risks associated with your solutionÃ¢â‚¬Â¢ a cost/benefit analysis for each riskÃ¢â‚¬Â¢ a completed Ã¢â‚¬Å“MSITM Capstone Risk RegisterÃ¢â‚¬Â template attachmentÃ¢â‚¬Â¢ an explanation how you would mitigate each of these risks
E. Justify your approach to the problem you are solving.
F. Write a project management plan to manage multiple projects concurrently. Include each of the following:Ã¢â‚¬Â¢ the resources needed to design and execute the projectÃ¢â‚¬Â¢ a justification of each resource used in the projectÃ¢â‚¬Â¢ your plans for allocating resourcesÃ¢â‚¬Â¢ the existing gaps that a successful project plans to fill and how this will impact other active projects
G. Write a project plan to design, develop, test, and implement the solution that you chose. Include each of the following:Ã¢â‚¬Â¢ scopeÃ¢â‚¬Â¢ assumptionsÃ¢â‚¬Â¢ project phasesÃ¢â‚¬Â¢ timelinesÃ¢â‚¬Â¢ dependenciesÃ¢â‚¬Â¢ risk factorsÃ¢â‚¬Â¢ important milestonesÃ¢â‚¬Â¢ details of the project launchÃ¢â‚¬Â¢ an explanation of your strategy for implementationÃ¢â‚¬Â¢ documentation deliverablesÃ¢â‚¬Â¢ hardware and software deliverablesÃ¢â‚¬Â¢ how the final output will be assessed within an evaluation framework of industry standards, regulations, or other accepted criteria
H. Acknowledge sources, using APA-formatted in-text citations and references, for content that is quoted, paraphrased, or summarized.
I. Demonstrate professional communication in the content and presentation of your submission.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more