SlideShare ist ein Scribd-Unternehmen logo
1 von 2
ITEC-4750-01 Networking & Information Assurance Team


                     Input, Output, & Procedures
Project Name: ITEC 4750 Senior Capstone Network Project
Team Members: Paul Szczepaniak, Teresa Barron, Brittany Gilstrap, Paul Spilman,
               Alexander Wang, Ronald Norton, Kimberly Pate & Jerry Bryan
Project Manager: Jerry Bryan
Date: Tuesday, September 27, 2011



Prepared By
 Document Owner(s)                           Project/Organization Role
 Brittany Gilstrap                           Scope Manager

 Paul Spilman                                Hardware Specialist




Project Closure Report Version Control
 Version     Date        Author              Change Description
 1           9/27/11     Brittany Gilstrap   Create document.

 2

 3




                                                                                  1
Project Input


 Project input includes the cost to cover purchases of software, hardware (servers, desktops,
 printers, and phone systems), ISP charges, installation fees, and maintenance fees. The
 budget has been set to cover all costs. Other inputs include the time expected to plan out the
 network, implementing the network, and maintaining the network. Also, the people it will take
 to get all of this work done on time, and accurately.




Project Output


 Project output includes the network developed overall which makes up a public network for
 outside users, private network for inside users, servers for data storage and email usage,
 desktops with appropriate software for FreeMax users, a website for customers to browse,
 and security to protect against intrusion or attacks.




Project Procedures


 Project procedures include planning out the project, implementing the project, ordering all
 software and hardware, purchase services through ISPs, installing the networks, hardware,
 software, cabling, setting up the network and security, and maintaining the network.




                                                                                                  2

Weitere ähnliche Inhalte

Was ist angesagt?

eForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teasereForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teasereForensicsMag
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial SectorLIFARS
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
Dragos 2019 ICS Year in Review
Dragos 2019 ICS Year in ReviewDragos 2019 ICS Year in Review
Dragos 2019 ICS Year in ReviewDragos, Inc.
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Innovators
 
Out Go The Lights: An enlightening discussion of IoT automation security By D...
Out Go The Lights: An enlightening discussion of IoT automation security By D...Out Go The Lights: An enlightening discussion of IoT automation security By D...
Out Go The Lights: An enlightening discussion of IoT automation security By D...EC-Council
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Agora Group
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
Network security basics
Network security basicsNetwork security basics
Network security basicsSkillspire LLC
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentationsathiyamaha
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughSavvius, Inc
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...IEEEMEMTECHSTUDENTPROJECTS
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHMAN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHMIJNSA Journal
 

Was ist angesagt? (20)

eForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teasereForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teaser
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial Sector
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Beyond The Dark Hacking Screen
Beyond The Dark Hacking ScreenBeyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
 
Supply Chain Attack Backdooring Your Networks
 Supply Chain Attack Backdooring Your Networks   Supply Chain Attack Backdooring Your Networks
Supply Chain Attack Backdooring Your Networks
 
Dragos 2019 ICS Year in Review
Dragos 2019 ICS Year in ReviewDragos 2019 ICS Year in Review
Dragos 2019 ICS Year in Review
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for Nonprofits
 
Out Go The Lights: An enlightening discussion of IoT automation security By D...
Out Go The Lights: An enlightening discussion of IoT automation security By D...Out Go The Lights: An enlightening discussion of IoT automation security By D...
Out Go The Lights: An enlightening discussion of IoT automation security By D...
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
Network security basics
Network security basicsNetwork security basics
Network security basics
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHMAN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
How Does Cybersecurity Relate to Safety?
How Does Cybersecurity Relate to Safety?How Does Cybersecurity Relate to Safety?
How Does Cybersecurity Relate to Safety?
 

Andere mochten auch

Final Report Summary Group Effort
Final Report Summary Group EffortFinal Report Summary Group Effort
Final Report Summary Group Effortbrittanyjespersen
 
Incident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase JournalIncident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase Journalbrittanyjespersen
 
Creative Adventures final project
Creative Adventures final projectCreative Adventures final project
Creative Adventures final projectAditya Sadh
 

Andere mochten auch (7)

Methods Hackers Use
Methods Hackers UseMethods Hackers Use
Methods Hackers Use
 
Final Report Summary Group Effort
Final Report Summary Group EffortFinal Report Summary Group Effort
Final Report Summary Group Effort
 
Ubuntu VOIP & IM
Ubuntu VOIP & IMUbuntu VOIP & IM
Ubuntu VOIP & IM
 
Incident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase JournalIncident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase Journal
 
Creative Adventures final project
Creative Adventures final projectCreative Adventures final project
Creative Adventures final project
 
File Encryption
File EncryptionFile Encryption
File Encryption
 
Project Scope Statement
Project Scope StatementProject Scope Statement
Project Scope Statement
 

Ähnlich wie Input, Output, and Procedures

Overall Project ScenarioCorporation Techs provides remote and on.docx
Overall Project ScenarioCorporation Techs provides remote and on.docxOverall Project ScenarioCorporation Techs provides remote and on.docx
Overall Project ScenarioCorporation Techs provides remote and on.docxhoney690131
 
The Greenway Bank Presentation
The Greenway Bank PresentationThe Greenway Bank Presentation
The Greenway Bank PresentationSherrod Butler
 
Gregory yee _resume
Gregory yee _resumeGregory yee _resume
Gregory yee _resumeGreg Yee
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureFiras Alsayied
 
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docxRunning Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docxtoltonkendal
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Securitydocomusa
 
Key Assignment DraftGreat progress has been made on the design of .docx
Key Assignment DraftGreat progress has been made on the design of .docxKey Assignment DraftGreat progress has been made on the design of .docx
Key Assignment DraftGreat progress has been made on the design of .docxsleeperfindley
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network SecurityIRJET Journal
 
Sagar_Ware_Resume
Sagar_Ware_ResumeSagar_Ware_Resume
Sagar_Ware_ResumeSagar Ware
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...IJSRED
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxssuserfb92ae
 

Ähnlich wie Input, Output, and Procedures (20)

Overall Project ScenarioCorporation Techs provides remote and on.docx
Overall Project ScenarioCorporation Techs provides remote and on.docxOverall Project ScenarioCorporation Techs provides remote and on.docx
Overall Project ScenarioCorporation Techs provides remote and on.docx
 
Mike najarian resume
Mike najarian resumeMike najarian resume
Mike najarian resume
 
The Greenway Bank Presentation
The Greenway Bank PresentationThe Greenway Bank Presentation
The Greenway Bank Presentation
 
Gregory yee _resume
Gregory yee _resumeGregory yee _resume
Gregory yee _resume
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
NEtwork Security Admin Portal
NEtwork Security Admin PortalNEtwork Security Admin Portal
NEtwork Security Admin Portal
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docxRunning Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
Key Assignment DraftGreat progress has been made on the design of .docx
Key Assignment DraftGreat progress has been made on the design of .docxKey Assignment DraftGreat progress has been made on the design of .docx
Key Assignment DraftGreat progress has been made on the design of .docx
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
 
Scott A Boggs
Scott A BoggsScott A Boggs
Scott A Boggs
 
Luc resume
Luc resumeLuc resume
Luc resume
 
FinalDocument
FinalDocumentFinalDocument
FinalDocument
 
DanOlaru-cv-IT
DanOlaru-cv-ITDanOlaru-cv-IT
DanOlaru-cv-IT
 
Sagar_Ware_Resume
Sagar_Ware_ResumeSagar_Ware_Resume
Sagar_Ware_Resume
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
 
Raghunathreddy Updated Resume
Raghunathreddy Updated ResumeRaghunathreddy Updated Resume
Raghunathreddy Updated Resume
 

Input, Output, and Procedures

  • 1. ITEC-4750-01 Networking & Information Assurance Team Input, Output, & Procedures Project Name: ITEC 4750 Senior Capstone Network Project Team Members: Paul Szczepaniak, Teresa Barron, Brittany Gilstrap, Paul Spilman, Alexander Wang, Ronald Norton, Kimberly Pate & Jerry Bryan Project Manager: Jerry Bryan Date: Tuesday, September 27, 2011 Prepared By Document Owner(s) Project/Organization Role Brittany Gilstrap Scope Manager Paul Spilman Hardware Specialist Project Closure Report Version Control Version Date Author Change Description 1 9/27/11 Brittany Gilstrap Create document. 2 3 1
  • 2. Project Input Project input includes the cost to cover purchases of software, hardware (servers, desktops, printers, and phone systems), ISP charges, installation fees, and maintenance fees. The budget has been set to cover all costs. Other inputs include the time expected to plan out the network, implementing the network, and maintaining the network. Also, the people it will take to get all of this work done on time, and accurately. Project Output Project output includes the network developed overall which makes up a public network for outside users, private network for inside users, servers for data storage and email usage, desktops with appropriate software for FreeMax users, a website for customers to browse, and security to protect against intrusion or attacks. Project Procedures Project procedures include planning out the project, implementing the project, ordering all software and hardware, purchase services through ISPs, installing the networks, hardware, software, cabling, setting up the network and security, and maintaining the network. 2