iss capstone team

26
We can tackle your IT needs we do it All The Time ALPHA TEAM TECHNOLOGIES

Upload: jonathan-fuller

Post on 13-Apr-2017

80 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ISS CAPSTONE TEAM

We can tackle your IT needs we do it All The Time

ALPHA TEAM TECHNOLOGIES

Page 2: ISS CAPSTONE TEAM

Credentials 27 years experience meeting IT challenges.

Since 1988, Alpha Team Technologies has helped businesses of all sizes become market leaders by reducing their IT costs, increasing business productivity, and streamlining their IT operations.

15 member team. No stock, no public trade. When you succeed we

succeed. Alpha Team whether it is providing daily onsite IT support, a helpdesk

for your employees to call, or to monitor your IT resources, Alpha Team has the right toolset and the customer-focused mindset to keep your business going. Integrated IT's superior and well-certified. Professional Services team is also there guiding you and your IT infrastructure through the ocean of choices, so when it comes time to make a change to your IT infrastructure, you can be rest-assured that it will only be the one that fits your needs.

Page 3: ISS CAPSTONE TEAM

What we can do for you? Baseline and standardize current IT

infrastructure Provide IT Policies, Procedures, and

Standards Improve current procedures to mitigate

risk to the company

Page 4: ISS CAPSTONE TEAM

Current Infrastructure Problems Performance and availability requirements vary

between organizations. Having the required personnel on staff to make

sure your network meets the required fully functional security standards is a large time and money sink for most organizations.

Security at all points must be maintained — malware can and will attack where you are vulnerable whether via Endpoints, email, or web access.

Down Time and Money Lost

Page 5: ISS CAPSTONE TEAM

State the problemand Down Time

Page 6: ISS CAPSTONE TEAM

Where Does It Hurt? What is currently a boundary today?

Not being compliant with state and Federal laws. What is Hindering your growth?

The lack of knowledge of today standards and Best practices. How can we help you?

Over the years working with a diverse set of clients, we have seen pretty much everything that can go wrong with a network and understand that to have successful key infrastructure in place, it must be built correctly from the start. Your business, technical, as well as operational requirements for uptime, performance, security, and resiliency guide the goals and expectations. Whether it’s a brand new environment or and existing infrastructure that needs rehabilitation, we have the expertise and experience to help you build the environment your business demands.

Page 7: ISS CAPSTONE TEAM

Planning Recognize challenges and needs of the

business.Keeping up with the marketPlanning aheadCash flow and financial managementProblem solvingThe right systemsSkills and attitudesWelcoming change

Plan, Approve then Implement.Equipment Purchase PlanBudget Summary by ProjectImplementation Plan |Project ApprovalInstruction Allocation Budget Request Form

Page 8: ISS CAPSTONE TEAM

Backups File and Folder based with Retention

policy based on need Bare Metal Backup for full system restore

on critical systems. Both types of backups will be uploaded to

onsite and offsite cloudberry AWS DRP for disasters

Page 9: ISS CAPSTONE TEAM

OS and Hardware Assessment of the current OS and Hardware in

place.Upgrade XP to Windows 7 or Windows 8 (workstation and Mobile device’s)Upgrade Windows Server 2003 to 2012

Determine replacement requirementsSome of the current hardware will be compatible for current upgrades and will be allocated for the current infrastructure

Set plan for future upgrade planwill the hardware be compatible for future upgrades

Page 10: ISS CAPSTONE TEAM

Patching and Updates Current Patching will be updated and

maintained. All systems will be set with scheduled

outage points for these updates to ensure they are kept up to date.

Page 11: ISS CAPSTONE TEAM

Company Security Employee Background Check Physical and Logical access controls Monitoring and Anti-Malware software Users- Policies, Standards, and

Procedures. This includes the Acceptable Use Policy for users.

Page 12: ISS CAPSTONE TEAM

Anti-Malware Webroot meets Company Compliance as

well as Federal Compliance and will be able to be installed and managed on all platforms.

Sonicwall Firewall TZ series to block non-essential ports and protect against know threats.

Page 13: ISS CAPSTONE TEAM

Offsite Access RDP- SSL certificate to secure data. VPN- High level Encryption for VPN tunnel

access Hosted company resources- Ensure they

meet compliances.

Page 14: ISS CAPSTONE TEAM

Encryption What is your important data? Protect the important data with

encryption and Encryption methods. Data in transit we will be implementing

Email and VPN tunneling Encryption. All company travel equipment will use

Dekart for full disk Encryption and Secure File shredding.

Page 15: ISS CAPSTONE TEAM

Business Impact Analysis

How will your business be affect during an outage?

What will you do during an outage? How fast can you be back online? All of these will be covered to ensure you

business remains online no matter what the circumstances.

Page 16: ISS CAPSTONE TEAM

Business Continuity Plan Purpose – Baseline and reduce IT costs Backups – Use of Cloudberry onsite and

offsite for Disaster recovery Plan Users- Monitoring of users and training as

this is the biggest security threat.

Page 17: ISS CAPSTONE TEAM

DRP Disaster Recovery Plan Minimize downtime if there is an outage

event. Plan to implement ready for getting

online as soon as possible.

Page 18: ISS CAPSTONE TEAM

Implementation Ensure Confidentiality, Integrity, and

Access are all maintained. Webroot an managed through Web

console for global management GPO, Agent monitor, and Standards to

centralize control

Page 19: ISS CAPSTONE TEAM

Penetration Test Objective- Determine current Risks,

Threats, and Vulnerabilities. Permission- To what and how this test will

occur will be cleared first. Testing all layers of the infrastructure will

provide a more accurate map of the vulnerabilities.

Users will be the primary group to test.

Page 20: ISS CAPSTONE TEAM

Gap Analysis Identified gaps, recommended

methodologies by which to resolve them are resolved.The domains within the IT infrastructure that are affected will be covered.

Some gaps include missing BCP, BIA, and DRP.Also missing are dedicated IPS and IDS, best practice, antivirus, and monitoring policies.

Page 21: ISS CAPSTONE TEAM

Risk Assessment• Identifying the hazards.• Evaluating the associated risks.• Controlling the risks.• Create Standards and Procedures to mitigate

Potential risk factors

Page 22: ISS CAPSTONE TEAM

Risks, Threats, Vulnerabilities

A1-Injection – 1# Threat involves injecting data to a trusted source.

Cross Site Scripting – Users attack websites to redirect other users, deface, or hijack user sessions

Security Misconfiguration – This is a common threat that is easy to avoid with Risk assessment and penetration test.

Page 23: ISS CAPSTONE TEAM

System Hardening After Risk, Threats, and Vulnerabilities

have been identified a plan to harden the network and systems will be implemented.

All none essential services will be disabled unless required.

Page 24: ISS CAPSTONE TEAM

Risk Mitigation Implement fixes or layers of defense for

know vulnerabilities Monitor vulnerabilities and risk areas Separation of duties can mitigate one

employee causing more damage.

Page 25: ISS CAPSTONE TEAM

Project Schedule This Project will be scheduled and

completed in a month’s time. The weekends will not be part of the

scheduling.

Page 26: ISS CAPSTONE TEAM

Overall Cost Man hours = $137000 Materials, Services and Licensing =

$150000 Initial setup and Management = $57000

Total Cost = $342000