Implementation

profilelafette.szmmoqs

System Failured based:

Needs: Faster processors, Software and hardware compatibility, high system capacity, Information policies, security systems, and reputation for software vendors.

 

Need

Weight

Score

Weighted (Score * weight)

Faster system processors

3

6

18

Software and hardware compatibility

4

6

24

High system capacity

2

6

12

Information system policies

1

6

6

Security systems

6

6

36

High reputation for software and hardware vendors

5

6

30

PROBLEM DEFINITION: (You may use the problem definition from your proposal.)

 

 

PROPOSED IT SOLUTION: (What is the proposed solution or approach?)

 

 

BUSINESS & TECHNICAL CASE FOR TECHNOLOGY: (Discuss the cost-benefits of your chosen technology solution.  Also, justify the solution on the basis of the technology benefits to the user.):

 

Design Fundamentals:

 

 

 

REQUIREMENTS:  (The requirements for the project based on end-user profiles and organizational or problem-based needs and constraints should be provided here.  Each requirement should include a brief rationale or description of what drives the requirement.)

 

 

DESIGN METHODOLOGY:  (This section should describe in detail your approach in arriving at a final design.  Trade-offs made with respect to objectives, requirements, the broader context (security, social, ethical, etc.) and costs (initial and maintenance) should be explained.  Alternative designs which were considered should also be enumerated with a rationale for the chosen system design.)

 

 

FINAL DESIGN:  (The final design to the level of specific hardware and software should be presented in this section.  Network diagrams, IP addressing, networking and security standards, selected services, etc. should be included as relevant.  A budget for implementation of the system should also be included.)

 

 

 

Implementation:

 

PROOF-OF-CONCEPT:  (This section should demonstrate your progress, if any, in the initial implementation of your final design.  For instance, you may have already used virtualization to ‘build’ a subsystem.  You could then explain that process and initial results here.)

 

 

REFERENCES:  (Provide any APA references used in the design stage here.)

    • 7 years ago
    • 20
    Answer(1)

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      security_project.docx