staab itp 251 chapter 9 swl case presentation

8

Click here to load reader

Upload: staabjg

Post on 01-Jul-2015

450 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Staab   Itp 251   Chapter 9   Swl Case Presentation

System Development and Analysis

John Staab, CEO

Page 2: Staab   Itp 251   Chapter 9   Swl Case Presentation

Network Management Software

Wireless Network

Wireless Budget Plan - TCO

Security Plan

10 Tasks

Concurrent Tasks

Sequential Tasks

Page 4: Staab   Itp 251   Chapter 9   Swl Case Presentation

Advantages

Ease of scalability

Less cost

Convenience

Disadvantages

Reliability

Speed

Security

Page 5: Staab   Itp 251   Chapter 9   Swl Case Presentation

Installation Recommendation At least G-band Keep network speed up

Critical services should not be wireless Servers with critical applications should be connected to a

wired LAN.

Directional access points in strategic locations Concentrate wireless network strength inside the building to

prevent signal bleeding outside the facility

WiFi Protected Access version 2 (WPAv2) Encrypt wireless communication

Wireless Intrusion Prevention Sensor (WIPS) Detect and prevent wireless intrusions

Page 6: Staab   Itp 251   Chapter 9   Swl Case Presentation

Wireless Hardware

5 Access Points ($200/each) $1,000.00

Wireless Installation

Integrate wireless into existing infrastructure

$1250/day for 2 days $2,500.00

Training

Wireless training for staff $1,800.00

Maintenance

5 Years $25,000

Grand Total $30,300

Assumptions

*Wired infrastructure already in place

*10 Users per access point

*Critical services remain on wired network

*Highest level of encryption capable is used

Page 7: Staab   Itp 251   Chapter 9   Swl Case Presentation

Who is ultimately responsible for security?

Management is always ultimately responsible for anything that happens. However everyone is responsible, to some degree, because everyone can do their part to uphold the security of the network. Users can be made aware of best security practices, and held accountable if they fail to follow said practices. Management has to keep users informed of best practices and provide security training and requirements to users. The IT department is responsible for developing and applying security measures to the network.

Page 8: Staab   Itp 251   Chapter 9   Swl Case Presentation

Enterprise Resource Planning

Initial Cost of Ownership

Total Cost of Ownership

Scalability

Integration

Security

Client/Server Design

Tiers

Topology

Monitoring

All tasks are somewhat independent but come together when completed