cyberdyne systems (2)

28
Cyberdyne SYSTEMS

Upload: bryan-moss

Post on 18-Aug-2015

126 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Cyberdyne systems (2)

CyberdyneSYSTEMS

Page 2: Cyberdyne systems (2)

Who is Cyberdyne?

Lucio A GonzalezJordan Dracoulis

Allen SanfordBryan Moss

Page 3: Cyberdyne systems (2)

Business CaseWe will submitting a bid for a

infrastructure project for a banking software company.

They are moving to completely new building and need a network setup for developing there software.

The building is two levels with 75-100 employees on each floor, and 80% of them work from two labs in the building, while the other 20% are in offices.

Page 4: Cyberdyne systems (2)

Business case cont.

Along with the network they will require each person to a VoIP phone and also want secure WiFi through the entire building.

The stakeholders are the company along with all the employees, the banks they develop software for, and any investors.

Page 5: Cyberdyne systems (2)

Scope of Project

Physical set up of network Secure the network Provide network schema Build budget Buy required materials Set up all servers, work stations, routers, VoIP

phones, and Wi-Fi access points. Make suggestions for risk management plan and

disaster recovery.

Page 6: Cyberdyne systems (2)

Out of the scope

Physical security of building Installation of software for development Implementation of risk management planMaintaining the network once installedEnsuring they have enough bandwidth to

operate.Making policy’s and ensuring they are

enforced

Page 7: Cyberdyne systems (2)

Work Break Down

1. Place bid for infrastructure job 2. Choose the ISP for location 3. Create network topology 4. Order all equipment and materials for job

completion 5. Begin build out 6. Configure servers and workstations 7. Test Networks 8. Final Walkthrough

Page 8: Cyberdyne systems (2)
Page 9: Cyberdyne systems (2)
Page 10: Cyberdyne systems (2)
Page 11: Cyberdyne systems (2)
Page 12: Cyberdyne systems (2)
Page 13: Cyberdyne systems (2)
Page 14: Cyberdyne systems (2)
Page 15: Cyberdyne systems (2)
Page 16: Cyberdyne systems (2)

Budget/Bill of Material

Servers (12)PowerEdge M630 Blade Server $21,876.00

Workstations (200) Dell OptiPlex 3020 $120,000.00

Cable (85,000 FT) 1000 FT 24-Gauge CAT5e Cable $7,225.00

Switches (4)Cisco 200 Series Smart Switch $2,700.00

WAP (6) ZyXel NWA 1123-AC $1,200.00

Page 17: Cyberdyne systems (2)

Budget/bill of Materials cont.

Router (2) Cisco 1941/K9 $2,021.98

Phones (200)Cisco 794G Network VoIP Device $65,398.00

Monitors HP Business V193 $16,598.00

Server Racks (4) Tripp Lite SR42UB $4,539.96

Total $241,558.94

Page 18: Cyberdyne systems (2)

Risk I

Orange Creek Inc. Location is hacked and data distributed.

Trust in Orange Creek, Inc. will be lowered, resulting in loss in revenue as customers look elsewhere for software development.

Physical Firewall and IDS is installed between entire network and outside access. Lab Servers will not be made available via the WiFi network.

Page 19: Cyberdyne systems (2)

Risk II Orange Creek, Inc. employee is fired or laid off. Employee

then tries to distribute Orange Creek, Inc. data. Orange Creek, Inc. could suffer from loss of data due to

employee stealing from company. All employees will sign Non-Disclosure Agreement stating

that all Orange Creek, Inc. programs and information will not be distributed without express authorization from Orange Creek, Inc. supervisors.

Employees that are fired will have their access to building immediately revoked and be escorted off the premises by security. If necessary, an immediate change to all network passwords will be done following employee firing notification.

Page 20: Cyberdyne systems (2)

Risk III

Lost project data. Loss of server due to equipment failure. This could also be the result of a hard drive failure.

If there is an ongoing project on the server that has not been backed up, the data will be lost and the team will have to start the project over. This could result in a delay in project completion and/or a lost customer.

Daily incremental server backups to make sure there is little lost data. All server backups will be stored in an off-site, secure location to prevent data loss due to building destruction. 2 back-up servers will be available to make sure that the lost productivity is kept to a minimum.

Page 21: Cyberdyne systems (2)

Disaster Recovery Plan

Steps to be taken in case of a disaster: Contact CS in case of any disaster Continue operations at an off-site facility if the

disaster occurs that requires the replacement of facility or the employee’s to remain off site, within twenty four hours of disaster.

Precautionary security education, to employee’s to lessen the possibility of theft.

Monitor the computer security standards.

Page 22: Cyberdyne systems (2)

Disaster Recovery Plan Cont.

Manager’s responsibilities check list: Implement a disaster recovery plan for the

safety of their employee’s Contact the owners of Orange Creek Inc. and

contact CS. Help assess the damage done to equipment

and communicate that to CS. If necessary orchestrate the relocation of the

network site, communicate that to CS so that access to the back-up server can be networked.

Page 23: Cyberdyne systems (2)

Servers

• A Dell blade server is a stripped down server that is optimized to minimize physical space

Each server uses multiples OS’s such as Microsoft windows, UNIX/Linux and even Mac OS

Page 24: Cyberdyne systems (2)

Advantage of Blade Servers

Load balancing failover density Lower management cost Power consumption Flexibility and ease of upgrading Deployment of scalability File sharing and serving SSL encrypting web communication Virtualization

Page 25: Cyberdyne systems (2)

What the servers will do.

Web DHCP/DNS Application Citrix Q&A File/Print Email

Page 26: Cyberdyne systems (2)

Client Configuration

Each workstation will be equipped with Microsoft Windows 7 Enterprise

Microsoft Office Suite Professional Al work supported software will be utilized through the

Citrix environment

Example: Quality control Software Development

Page 27: Cyberdyne systems (2)

Security

Employees will gain access electronic badges at every entry way.

CAC card readers will be install onto every workstation limited access to hardware.

Employees will go through quarterly information and operation security training.

Server rooms and labs will be protected in 2 ways Badge scanner Number pad

Page 28: Cyberdyne systems (2)

Active Directory

Forest Functional Level: Windows Server 2008

Domain Functional Level: Windows Server 2008

Organizational Units: Supervisor, Human Resources, Accounting, Development Department, Testing Department, Administrators, and Employees