cyberdyne systems (2)
TRANSCRIPT
CyberdyneSYSTEMS
Who is Cyberdyne?
Lucio A GonzalezJordan Dracoulis
Allen SanfordBryan Moss
Business CaseWe will submitting a bid for a
infrastructure project for a banking software company.
They are moving to completely new building and need a network setup for developing there software.
The building is two levels with 75-100 employees on each floor, and 80% of them work from two labs in the building, while the other 20% are in offices.
Business case cont.
Along with the network they will require each person to a VoIP phone and also want secure WiFi through the entire building.
The stakeholders are the company along with all the employees, the banks they develop software for, and any investors.
Scope of Project
Physical set up of network Secure the network Provide network schema Build budget Buy required materials Set up all servers, work stations, routers, VoIP
phones, and Wi-Fi access points. Make suggestions for risk management plan and
disaster recovery.
Out of the scope
Physical security of building Installation of software for development Implementation of risk management planMaintaining the network once installedEnsuring they have enough bandwidth to
operate.Making policy’s and ensuring they are
enforced
Work Break Down
1. Place bid for infrastructure job 2. Choose the ISP for location 3. Create network topology 4. Order all equipment and materials for job
completion 5. Begin build out 6. Configure servers and workstations 7. Test Networks 8. Final Walkthrough
Budget/Bill of Material
Servers (12)PowerEdge M630 Blade Server $21,876.00
Workstations (200) Dell OptiPlex 3020 $120,000.00
Cable (85,000 FT) 1000 FT 24-Gauge CAT5e Cable $7,225.00
Switches (4)Cisco 200 Series Smart Switch $2,700.00
WAP (6) ZyXel NWA 1123-AC $1,200.00
Budget/bill of Materials cont.
Router (2) Cisco 1941/K9 $2,021.98
Phones (200)Cisco 794G Network VoIP Device $65,398.00
Monitors HP Business V193 $16,598.00
Server Racks (4) Tripp Lite SR42UB $4,539.96
Total $241,558.94
Risk I
Orange Creek Inc. Location is hacked and data distributed.
Trust in Orange Creek, Inc. will be lowered, resulting in loss in revenue as customers look elsewhere for software development.
Physical Firewall and IDS is installed between entire network and outside access. Lab Servers will not be made available via the WiFi network.
Risk II Orange Creek, Inc. employee is fired or laid off. Employee
then tries to distribute Orange Creek, Inc. data. Orange Creek, Inc. could suffer from loss of data due to
employee stealing from company. All employees will sign Non-Disclosure Agreement stating
that all Orange Creek, Inc. programs and information will not be distributed without express authorization from Orange Creek, Inc. supervisors.
Employees that are fired will have their access to building immediately revoked and be escorted off the premises by security. If necessary, an immediate change to all network passwords will be done following employee firing notification.
Risk III
Lost project data. Loss of server due to equipment failure. This could also be the result of a hard drive failure.
If there is an ongoing project on the server that has not been backed up, the data will be lost and the team will have to start the project over. This could result in a delay in project completion and/or a lost customer.
Daily incremental server backups to make sure there is little lost data. All server backups will be stored in an off-site, secure location to prevent data loss due to building destruction. 2 back-up servers will be available to make sure that the lost productivity is kept to a minimum.
Disaster Recovery Plan
Steps to be taken in case of a disaster: Contact CS in case of any disaster Continue operations at an off-site facility if the
disaster occurs that requires the replacement of facility or the employee’s to remain off site, within twenty four hours of disaster.
Precautionary security education, to employee’s to lessen the possibility of theft.
Monitor the computer security standards.
Disaster Recovery Plan Cont.
Manager’s responsibilities check list: Implement a disaster recovery plan for the
safety of their employee’s Contact the owners of Orange Creek Inc. and
contact CS. Help assess the damage done to equipment
and communicate that to CS. If necessary orchestrate the relocation of the
network site, communicate that to CS so that access to the back-up server can be networked.
Servers
• A Dell blade server is a stripped down server that is optimized to minimize physical space
Each server uses multiples OS’s such as Microsoft windows, UNIX/Linux and even Mac OS
Advantage of Blade Servers
Load balancing failover density Lower management cost Power consumption Flexibility and ease of upgrading Deployment of scalability File sharing and serving SSL encrypting web communication Virtualization
What the servers will do.
Web DHCP/DNS Application Citrix Q&A File/Print Email
Client Configuration
Each workstation will be equipped with Microsoft Windows 7 Enterprise
Microsoft Office Suite Professional Al work supported software will be utilized through the
Citrix environment
Example: Quality control Software Development
Security
Employees will gain access electronic badges at every entry way.
CAC card readers will be install onto every workstation limited access to hardware.
Employees will go through quarterly information and operation security training.
Server rooms and labs will be protected in 2 ways Badge scanner Number pad
Active Directory
Forest Functional Level: Windows Server 2008
Domain Functional Level: Windows Server 2008
Organizational Units: Supervisor, Human Resources, Accounting, Development Department, Testing Department, Administrators, and Employees