Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………

Slides:



Advertisements
Similar presentations
Agenda Benefits of Campus LAN Other Benefits Survey Prerequisities
Advertisements

D2 – ICT Don’t worry about IT. Services offered  Desktop support 2000, XP, Vista, Windows 7 \ Windows 8.1  Windows Server and Windows SBS 2000\2003\2008.
Case Study: Pat Lee’s Home PC Network Chapter 1a Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall May only.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Module 3 Windows Server 2008 Branch Office Scenario.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Computer Networks IGCSE ICT Section 4.
CHAPTER Introduction to LANs. MODULE Purpose and Use of a Network.
Sample Diagram.
Case Study: Pat Lee’s Home PC Network Chapter 1a Updated January 2007 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
By: Amy Simon  What happened to my student’s project?  Why can’t I access my lesson in the computer lab?  I know I saved it… somewhere…  WHERE DID.
Computerized Networking of HIV Providers Networking Fundamentals Presented by: Tom Lang – LCG Technologies Corp. May 8, 2003.
Senior Design – Spring 2009 Richard Gory Focus: Networking & Web.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Chapter 7: Using Windows Servers to Share Information.
ENAM ENAM - INFRA Project 2013.
Networks What are they and how do they work? What is a Network?  Hardware and software data communication system  Two or more devices connected for.
Securing Microsoft® Exchange Server 2010
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
CELFRAME ®. CELFRAME ® Agenda  CELFRAME  CELFRAME.IC (OS suited for Intranet and Communications Servers)‏  CELFRAME.GT (Communications.
Computer Networks Unit 1 – BTA 3O Ms. Chytra. Introduction to Networks Most people working in an office with more than a few computers will be using some.
IT Infrastructure Chap 1: Definition
© British Telecommunications plc BT Managed Services Innovate
Solutions for BDMHS  JF&C is a highly qualified company that performs a wide variety if technical services in the Chicago land area to business, government.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
THE CVR NETWORK. The CVR Local Area Network (LAN)  The purpose of the network is to enhance productivity, provide users with access to resources, and.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Module 11: Remote Access Fundamentals
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Networks.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Labs. Session 1 Lab: Designing Network Infrastructure in Windows Server 2008 Exercise 1: Preparing for a Network Infrastructure Design Exercise 2: Designing.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.
Module 11: Designing Security for Network Perimeters.
NETWORK INFRASTRUCTURE SECURITY Domain 5. Computer Security “in short, the average computer is about as secure as a wet paper bag, and it is one of the.

NIZHAL KANINI Nizhal Kanini has ventured into IT Industry with a dynamic team of qualified professionals to offer a comprehensive portfolio of Computer-
ClinicalSoftwareSolutions Patient focused.Business minded. Slide 1 Opus Server Architecture Fritz Feltner Sept 7, 2007 Director, IT and Systems Integration.
MT. CARMEL BAPTIST CHURCH NETWORK OVERHAUL L. Kennerly Newlin Networking and Database.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Introduction to Networking. What is a Network? Discuss in groups.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
 Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives,
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Dr. Pipat Sookavatana. IT for Business Communication and Information Exchange Web access File and Printer Sharing Information Access Advertisement.
City of Hyattsville City Council IT Briefing October 19, 2015 dataprise.com | #ITinRealLife.
WARCS (Wide Area Remote Control for SPring-8)‏ A. Yamashita and Y.Furukawa SPring-8, Japan Control System Cyber-Security Workshop (CS)2/HEP Oct
3.1 Types of Servers.
Working at a Small-to-Medium Business or ISP – Chapter 8
3.1 Types of Servers.
3.1 Types of Servers.
Information Technology (IT) Department
IS4550 Security Policies and Implementation
Unit 27: Network Operating Systems
ISMS Information Security Management System
IS4680 Security Auditing for Compliance
12 STEPS TO A GDPR AWARE NETWORK
CHAPTER Introduction to LANs
Presentation transcript:

Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………

Group Presentation Background  Start-up company (SOHO) dealing with web-based educational software  Staff strength - 4 software developers - 1 admin - 1 manager - 1 director  B2C and B2B applications  IT Infrastructure not present

Group Presentation Project Overview  Study requirements  Design IT Infrastructure  Develop Project Plan  Develop Disaster Recovery Plan (DRP)  Budget & Project Plan Approval  Implement, monitor & review project  User Training  User Acceptance  User Support  Identify Critical Success Factors

ISP Router DC, Exchange, File & Print server T1 connection Switch Mail Relay Server Web/Application Server Cluster Print server & printer Firewall Appliance De-militarized Zone Switch

Group Presentation Hardware & Software  1x Firewall Appliance  1x Router  2x 24 port 10/100 Switch  1x A3/A4 Printer  1x Printer Server (or built-in JetDirect card for HP printers)  1x Domain Controller, Exchange and File Server  2x Web Servers (for cluster)  1x Mail Relay Server  5x PCs & 2x Notebooks  Tape Drives

Group Presentation Software  4x MS Server 2003  7x MS Windows XP  2x MS Exchange 2003  7x MS Office 2003  Symantec Antivirus Corporate Edition (11 licenses)  Data Backup Software

Group Presentation Security  Firewall  NAT  Anti-virus Software for both Servers & Clients  Secure authentication of user logons  User education  Security and Password Policy  Mail Relay server reduces the vulnerability of the Exchange server

Group Presentation Implementation  Install & Setup  Develop Test Plan  Commissioning & Testing  “Go Live”

Group Presentation Deliverable Acceptance  User Training  User Acceptance

Group Presentation DRP & Support  Test Daily Tape Backup  Test Disaster Recovery Plan  Test and review Support Plan  Develop FAQ for end users

Group Presentation Future Development  Intrusion Detection System (IDS)  Wireless LAN  Separate Database Server (NAS or SAN)  Remote Access (Outlook Web Access, VPN, SSL- VPN)  VoIP

Group Presentation Conclusion  The design actually incorporates network security  Proposed enhance security and data management for future expansion  Ensure good SLA and bandwidth utilization are provided by the Internet providers  Redesign infrastructure for High Available (HA) if budget allows  Ensure Critical Success Factors are monitored and met