Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Term project guidelines, Study Guides, Projects, Research of Computers and Information technologies

Project guidelines

Typology: Study Guides, Projects, Research

2014/2015

Uploaded on 08/28/2015

zxcvasdf21
zxcvasdf21 🇺🇸

2 documents

1 / 3

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
IDS 520: Enterprise Information Infrastructure Planning & Security
Term Project Assignment Guidelines
The term project will involve an ongoing review and analysis of the survivability and
performance characteristics of a case study IT infrastructure that reflects close to a real
world situation. By infrastructure, we mean the servers, databases, network switches,
power plant, software and operations that comprise a typical enterprise IT infrastructure.
In general, the case study can constitute any of the following:
An IT infrastructure that reflects a real-life public/private enterprise.
An IT infrastructure that is common within a particular type of firm or industry (e.g.
retail, hospital, airport, banking, finance, etc.)
An IT infrastructure that is commensurate with a new IT technology (e.g. storage
networks, security, Wi/Fi, Voice over IP, grid computing, etc.)
An IT infrastructure drawn from the course case studies provided.
You can choose a study that may be of personal interest to you. It can be one that is
reflective of the company or industry that you currently work in, or perhaps one that you
would like to become involved with in the future.
Each week you will also be conducting a step-by-step evaluation of the case study. Your
goal will be to produce a plan for an overhaul that improves the overall operating
characteristics of the infrastructure. You will compile your findings into a written report
that will be submitted at the end of the term. At that time, you will also unveil your plan
in a formal class presentation.
In any case, make sure that you choose a case study that has a substantial body of
available information associated with it. The links and information presented on the
Blackboard Web site are only cursory and high level. You will probably have to do some
investigative research on the case study using other sources. Fortunately, today there is a
multitude of information sources available, such as the Web and the University or local
libraries.
The team project will be divided into two parts as follows to coincide with the learning
modules:
Module 1: Enterprise Infrastructure Extreme Makeover
The first part of your project will be to evaluate an existing architecture and to renovate it
according to the business and operating needs and requirements of the particular
enterprise. In this process, you can engage any of the tools and techniques covered in the
course, as well as any other similar methodologies that you are familiar with. Your team
will present your re-designed architecture to class at the conclusion of this module. In
this process, you will have the opportunity to solicit input from other class members to
improve your designs. You will document your results in an interim project report to be
turned in as well. Please review the report and presentation guidelines that are described
further in this document.
PAGE 3
pf3

Partial preview of the text

Download Term project guidelines and more Study Guides, Projects, Research Computers and Information technologies in PDF only on Docsity!

IDS 520: Enterprise Information Infrastructure Planning & Security

Term Project Assignment Guidelines The term project will involve an ongoing review and analysis of the survivability and

performance characteristics of a case study IT infrastructure that reflects close to a real world situation. By infrastructure, we mean the servers, databases, network switches, power plant, software and operations that comprise a typical enterprise IT infrastructure.

In general, the case study can constitute any of the following:

  • An IT infrastructure that reflects a real-life public/private enterprise.
  • An IT infrastructure that is common within a particular type of firm or industry (e.g. retail, hospital, airport, banking, finance, etc.)
  • An IT infrastructure that is commensurate with a new IT technology (e.g. storage networks, security, Wi/Fi, Voice over IP, grid computing, etc.)
  • An IT infrastructure drawn from the course case studies provided.

You can choose a study that may be of personal interest to you. It can be one that is

reflective of the company or industry that you currently work in, or perhaps one that you would like to become involved with in the future.

Each week you will also be conducting a step-by-step evaluation of the case study. Your goal will be to produce a plan for an overhaul that improves the overall operating characteristics of the infrastructure. You will compile your findings into a written report that will be submitted at the end of the term. At that time, you will also unveil your plan in a formal class presentation.

In any case, make sure that you choose a case study that has a substantial body of available information associated with it. The links and information presented on the Blackboard Web site are only cursory and high level. You will probably have to do some investigative research on the case study using other sources. Fortunately, today there is a multitude of information sources available, such as the Web and the University or local libraries.

The team project will be divided into two parts as follows to coincide with the learning modules:

Module 1: Enterprise Infrastructure Extreme Makeover

The first part of your project will be to evaluate an existing architecture and to renovate it according to the business and operating needs and requirements of the particular enterprise. In this process, you can engage any of the tools and techniques covered in the course, as well as any other similar methodologies that you are familiar with. Your team will present your re-designed architecture to class at the conclusion of this module. In this process, you will have the opportunity to solicit input from other class members to improve your designs. You will document your results in an interim project report to be turned in as well. Please review the report and presentation guidelines that are described further in this document.

Module 2: Enterprise Infrastructure Security & Protection Plan The second part of your project will be to incorporate any improvements to the architecture that you developed for Module 1. You will then also develop a security and protection plan for your case study architecture. As before, you can engage any of the tools and techniques covered in the course, as well as any other similar methodologies that you are familiar with. You will then identify any additional features, devices, plans, procedures, etc. that are required to satisfy the firm’s security and protection needs. This may also require you to make additional modifications to the architecture defined in Module 1.

Your team will present your finalized architecture to class at the conclusion of this module. You will also document your results in a final project report to be turned in as well. The final report will include a revised Module 1 report, plus a new report documenting your security plan. Once again, please review the report and presentation guidelines that are described further in this document.

Guidelines for Reports The report should be designed to provide a convincing case for your analysis. You can use all or any of the information and material you have developed to date. On the average, reports are about 10-15 pages and should follow this outline:

I. Introduction:

  • Overview of the firm(s) you are studying
  • Current business issues and problems they have
  • Any findings from any earlier work
  • Statement and discussion of their problem(s) and needs under study
  • Goals and objectives of the study

II. Methodology:

  • A summary of the steps used to analyze the problem
  • Identify and justify any assumptions that you made in evaluating the problem

III. (^) Findings:

  • Present and discuss your analysis results. Use any diagrams, data, tables and information that you have developed.
  • Quantify the time, effort and expenses that would be involved in developing your solution.
  • Description of how the analysis would change if your assumptions were modified.

IV. Recommendations:

  • List the recommendations that you would make to the firm regarding the solution.
  • Back up your recommendations with reasons why they should be followed.

Guidelines for Presentations