Group N – December 4 th, 2008 JEM Networking Solutions.

Slides:



Advertisements
Similar presentations
Basic Concepts of a Computer Network
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
ITT NETWORK SOLUTIONS. Quick Network Facts Constant 100 Mbps operation for users Infrastructure ready for 1000 Mbps operation to the user Cisco routing.
Company Equipment Upgrade Proposal. The Current Situation  It has been five years since Alt-F4 Inc. has upgraded any of it’s equipment.  200 Computers.
Custom’s K-12 Education Technology Council Presents… Custom Computer Specialists Server Technology Solutions Designed for NYCDOE Affordable and.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Crime and Security in the Networked Economy Part 4.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
MyFloridaMarketPlace Roundtable Technical/Networking Presentation March 19, :00 a.m. – noon.
IT Infrastructure: Software September 18, LEARNING GOALS Identify the different types of systems software. Explain the main functions of operating.
ABC Sporting Goods Network Design Proposal by: Ed Allen Justin Caldwell Lou Maccarone.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Concepts of Database Management Seventh Edition
Factors to be taken into account when designing ICT Security Policies
A Guide to major network components
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
CHAPTER Introduction to LANs. MODULE Purpose and Use of a Network.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Networking, Hardware Issues, SQL Server and Terminal Services Session VII.
Computerized Networking of HIV Providers Networking Fundamentals Presented by: Tom Lang – LCG Technologies Corp. May 8, 2003.
November 2009 Network Disaster Recovery October 2014.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
COEN 252 Computer Forensics
Concepts of Database Management Sixth Edition
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
IT Infrastructure Chap 1: Definition
Concepts of Database Management Eighth Edition
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
Solutions for BDMHS  JF&C is a highly qualified company that performs a wide variety if technical services in the Chicago land area to business, government.
Technical Details – SAN PHARMA SFA. Front End / Back End Details  ASP  ASP.net  XML  JAVA Script  DHTML  MS SQL SERVER.
Objective  CEO of a small company  Create a small office network  $10,000 and $20,000 Budget  Three servers (workstations)  Firewall device  Switch.
Medical Facility Network Design Presented By: Chelsea Collins Kara James Eric Lopez Trevor Norwood.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.
Chapter 2 Securing Network Server and User Workstations.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Introduction TO Network Administration
Install, configure and test ICT Networks
Networking Network Classification, by there: 3 Security And Communications software.
 Full scale audit of all their current network environment  Examination of the current security policy and physical security  Full scale audits will.
Assignment # 3 Networking Components By: Jeff Long.
Computer Security Sample security policy Dr Alexei Vernitski.
Introducing Windows Vista Lesson 1. Skills Matrix Technology SkillObjective DomainObjective # Understanding Windows Vista System Requirements Identify.
Component 8/Unit 1bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 1b Elements of a Typical.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Network Management Chapter 8 Semester 3 By Roger Lewis.
8 – Protecting Data and Security
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Level 2 Diploma Unit 11 IT Security
Web Server Administration
CHAPTER Introduction to LANs
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Introduction to the PACS Security
Presentation transcript:

Group N – December 4 th, 2008 JEM Networking Solutions

Critical Points  A network planned and built around redundancy should be implemented for facilitating XYZ Hospital’s needs and tasks. – 99.99% Uptime  A network that is easy to use, manipulate, and troubleshoot should be adopted.  As far as hardware it is XYZ Hospital’s best interest to disregard cost due to the nature of the business. However, JEM Networking will only supply the highest standards of price to quality products ratio.  All policies should govern the network to keep it secure, efficient, and productive.  A disaster recovery plan should be implemented in order to prepare for lost data, uncontrollable disasters, and hardware failure. Kight

Organized Layout  Buildings connected through VPN  Use of Switches, Routers, WAPs, P2PWAPs  Simple and EfficientDevices  Routers/Switches ◦ Cisco - Linksys Gigabit Security Router with VPN RVS4000 ◦ Cisco 24 Port 10/100btx 2- GBIC Ports DC-Pwrd STD Multilayer SW  P2PWAP/WAPs ◦ 5GHz Complete Wireless Bridge Kit ◦ Cisco - Linksys Wireless-G Exterior Access Points  CAT6 Cable Kight

Laptops  Dell Vostro 1310 ◦ Windows XP ◦ Core 2 Duo - 1.8GHz ◦ 3GB DDR2 ◦ 160 GB Hard DriveServers  Servers – Alpha / Bravo  IBM System x3350 ◦ Windows Server 2003 ◦ 8GB RAM ◦ RAID 0+1, 5 Capable ◦ Xeon 3.0Ghz/12MB/1333 MHz Workstations  Dell Precision T3400 ◦ Windows XP ◦ Intel Q GHz Processor ◦ 2GB RAM, DDR2 ◦ 160 GB Hard Drive ◦ 19” Widescreen Flat Panel Kennedy

McCaughan

McCaughan

McCaughan

McCaughan

McCaughan

Kennedy Quantity of ItemsHardware/DevicesPrice x2IBM x3350 Server$5500 Each x30CyberPower Cp600LCD 340W$30 Each x1 Guardian Elite 100 kW Generator $18,800 Each x61000ft Shielded CAT6 Cable$170 Each x1 Cisco Basic 5GHz Complete Wireless Bridge Kit $1000 Each x20 The Linksys Wireless-G Exterior Access Point $500 Each x25Dell Precision T3400$1020 Each x200Dell Vostro 1310 Laptops$729 Each x5 Cisco 24 Port 10/100btx 2- GBIC Ports DC-Pwrd STD Multilayer SW $3200 Each x4 Linksys 4 Port Gigabit Security Router with VPN RVS4000 $160 Each x5 D ell 2335dn Laser Printer $449 Each Total:$232,905

ESET  Firewall  Virus Protection  Anti-Spam Mail FilterWPA2  Wi-Fi Protected Access  Wi-Fi Alliance ApprovedPGP  Pretty Good Privacy  Data Encryption Security Software Barkiewicz

Hot Site  CA ARCserve  Replication and Failover to a replica server  Dual Back Up  Variety of OS support  Base SuiteUtilities  Onsite Hardware o Gas Generator o Backup Device Batteries Barkiewicz Disaster Recovery

Polices  Natural Disasters  Differential Backup Utilization  Dual Back-Up Planning  UPS ◦ Testing ◦ Usage  RAID 5 System Disaster Recovery Barkiewicz HardwareComputersSystem NetworkApplications Down Time:MAX 10 Minutes

 Policy ◦ Prohibit creation or distribution of offensive messages ◦ Accounts not to be used for personal reasons ◦ No expectation of privacy  Internet Hardware Policy ◦ Equipment must be administered by approved personnel ◦ Must be configured accordingly Network Policies Machnic

 Internet Access Policy ◦ Prohibited uses including sites with blocked content ◦ May not illegally copy material that is copyrighted ◦ No communication of sensitive material ◦ Must access Internet through approved firewall ◦ Users waive right to privacy  Wireless Communication Policy ◦ All wireless devices must comply with company policy ◦ Use of authentication techniques Network Policies Machnic

 Naming Conventions ◦ Primary server named Alpha; secondary named Bravo ◦ Other components use abbreviated hierarchy including building, department, component type, and number  MAINHRWS1 – MAIN building, Human Resources Department, Workstation, 1 Machnic

Security  Passwords ◦ Minimum 14 characters for administrators ◦ Minimum 7 characters for other users ◦ Combination of:  Numbers, letters and symbols  Both upper and lower case characters  No dictionary words ◦ Changed every 90 days ◦ Not based on personal information ◦ Ensures security to systems  Physical ◦ Computers and towers locked down at all times ◦ Activated password protection screen savers ◦ Biometric hand scanner used for securing server room Security Policies Machnic

Logging  Firewall ◦ Configured to detect emergencies ◦ Detects alerts, critical conditions and error messages ◦ Logs and detects multiple failed login attempts  Retention ◦ Health information: 6 Years ◦ Network and System logs: 90 days includes:  Operating system logs  records  Software violation logs  IDS software logs Security Policies Machnic

Access  User Account ◦ Made by management ◦ Consequences for misuse  Degrading performance of systems  Controlling systems  Create programs to gain unauthorized access ◦ Personal devices are prohibited  Wireless ◦ WAP abide by regulations and laws ◦ Require user authentication ◦ Wireless Passwords and data must be encrypted Security Policies Machnic

Group N