Discuss mobile security risks.

Words: 745
Pages: 3
Subject: Uncategorized

Option #1: Developing a Technology Proposal for a Startup For this option of the Portfolio Project, assume that you have been hired as an IT expert by a small startup company to develop a technology project proposal that outlines a technology plan to set up an office for approximately 20 office staff members. Half of the office will work with desktop computers and the remaining with laptop computers using wireless networks. Employees will be permitted to use their own mobile devices on the network. The office will need at least one networked laser printer that employees can print to from the network. Each desktop computer will require access to the wired network and all the laptop computers will require wireless network access. All computers should be able to print to the network and access the internet. This Portfolio includes two milestones—in Modules 3 and 6—in which you will develop Phases 1 and 2 of your Portfolio Project. This week you will complete Phase 3. For the final submission, you will include Phases 1 and 2 which should be revised as necessary based on feedback received from your instructor. The Portfolio Project, Technology Proposal, includes the following: Phase 1 Project Deliverables: This section will be completed in the Module 3 Portfolio Milestone. For the final project submission in Module 8, include everything completed in that milestone and revised according to instructor feedback. For your convenience, those instructions are repeated here: Problem Statement: A desсrіption of the purpose and need for the IT project for the business office. A desсrіption of the problem(s) the proposal is trying to solve. Project Deliverables: A desсrіption of the required hardware components and software necessary to configure computer systems for the business office. This should include technical reasons for your component choices. In the Module 1 Portfolio Milestone, you began assembling a list of computer hardware and components. This should have included desktop and laptop computers, peripherals, network components (wired and wireless), and the specifications required to set up the proposed office network, including the following: Type of motherboard Type of power supply Type of processor and memory Types of storage and storage capacity Types of wired and wireless network interface cards Types of laser printers and specifications Types of expansion cards (if necessary) for expanding ports Types of monitors and specifications Specifications for laptop computers. Also include the following as part of your Phase 1 submission: Type of operating system 32-bit or 64-bit version Video and printers support. Phase 2 Project Deliverables: This section will be completed in the Module 6 Portfolio Milestone, Option #1. For the final project submission in Module 8, include everything completed in that milestone and revised according to instructor feedback. For your convenience, those instructions are repeated here: Project Beneficiaries:Write a desсrіption of all who will derive direct benefit from this phase of the project and explain how they will benefit. Project Deliverables:Write a desсrіption of the computer-network hardware necessary to set up the computer networks and the necessary software and protocols. Include the following topics: Routers and switches Wireless access points Hardware and software firewalls Network Intrusion Detection Systems (NDIS) Cables and connectors required for the physical network Logical and physical network topologies Which IP address versions (IPv4 or IPv6) will be utilized and why IP address pool for the network Domain Name System (DNS) and Dynamic Host Control Protocol (DHCP) solution. Phase 3 Project Deliverables: This section is written this week, in Module 8, and is based on the milestones in Modules 3 and 6. Virtualization:Based on what you learned about virtualization and cloud computing in Module 7, discuss how virtualization or cloud computing might benefit the project currently or in the future. Mobile Devices:Discuss mobile security risks. How will you secure mobile devices? This will require developing a ‘bring your own device’ policy (BYOD). Policies:Write an acceptable-use policy that addresses responsible network use and the consequences for noncompliance. Incident response:How will failures in security, hardware, and software be addressed? Backup and restore:Describe how systems and data will be backed up and restored.

Let Us write for you! We offer custom paper writing services Order Now.

REVIEWS


Criminology Order #: 564575

“ This is exactly what I needed . Thank you so much.”

Joanna David.


Communications and Media Order #: 564566
"Great job, completed quicker than expected. Thank you very much!"

Peggy Smith.

Art Order #: 563708
Thanks a million to the great team.

Harrison James.


"Very efficient definitely recommend this site for help getting your assignments to help"

Hannah Seven