

Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Project guidelines
Typology: Study Guides, Projects, Research
1 / 3
This page cannot be seen from the preview
Don't miss anything!
IDS 520: Enterprise Information Infrastructure Planning & Security
Term Project Assignment Guidelines The term project will involve an ongoing review and analysis of the survivability and
performance characteristics of a case study IT infrastructure that reflects close to a real world situation. By infrastructure, we mean the servers, databases, network switches, power plant, software and operations that comprise a typical enterprise IT infrastructure.
In general, the case study can constitute any of the following:
You can choose a study that may be of personal interest to you. It can be one that is
reflective of the company or industry that you currently work in, or perhaps one that you would like to become involved with in the future.
Each week you will also be conducting a step-by-step evaluation of the case study. Your goal will be to produce a plan for an overhaul that improves the overall operating characteristics of the infrastructure. You will compile your findings into a written report that will be submitted at the end of the term. At that time, you will also unveil your plan in a formal class presentation.
In any case, make sure that you choose a case study that has a substantial body of available information associated with it. The links and information presented on the Blackboard Web site are only cursory and high level. You will probably have to do some investigative research on the case study using other sources. Fortunately, today there is a multitude of information sources available, such as the Web and the University or local libraries.
The team project will be divided into two parts as follows to coincide with the learning modules:
Module 1: Enterprise Infrastructure Extreme Makeover
The first part of your project will be to evaluate an existing architecture and to renovate it according to the business and operating needs and requirements of the particular enterprise. In this process, you can engage any of the tools and techniques covered in the course, as well as any other similar methodologies that you are familiar with. Your team will present your re-designed architecture to class at the conclusion of this module. In this process, you will have the opportunity to solicit input from other class members to improve your designs. You will document your results in an interim project report to be turned in as well. Please review the report and presentation guidelines that are described further in this document.
Module 2: Enterprise Infrastructure Security & Protection Plan The second part of your project will be to incorporate any improvements to the architecture that you developed for Module 1. You will then also develop a security and protection plan for your case study architecture. As before, you can engage any of the tools and techniques covered in the course, as well as any other similar methodologies that you are familiar with. You will then identify any additional features, devices, plans, procedures, etc. that are required to satisfy the firm’s security and protection needs. This may also require you to make additional modifications to the architecture defined in Module 1.
Your team will present your finalized architecture to class at the conclusion of this module. You will also document your results in a final project report to be turned in as well. The final report will include a revised Module 1 report, plus a new report documenting your security plan. Once again, please review the report and presentation guidelines that are described further in this document.
Guidelines for Reports The report should be designed to provide a convincing case for your analysis. You can use all or any of the information and material you have developed to date. On the average, reports are about 10-15 pages and should follow this outline:
I. Introduction:
II. Methodology:
III. (^) Findings:
IV. Recommendations:
Guidelines for Presentations