100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
Summary bmis 520 it infrastructure phase 2.docx BMIS_520 IT Infrastructure Project Phase II Liberty University IT Infrastructure Project Phase II Several businesses have been growing over the past few years. This growth has led them to add branches in diff €7,32   In winkelwagen

Samenvatting

Summary bmis 520 it infrastructure phase 2.docx BMIS_520 IT Infrastructure Project Phase II Liberty University IT Infrastructure Project Phase II Several businesses have been growing over the past few years. This growth has led them to add branches in diff

 49 keer bekeken  0 keer verkocht
  • Vak
  • Instelling

bmis 520 it infrastructure phase BMIS_520 IT Infrastructure Project Phase II Liberty University IT Infrastructure Project Phase II Several businesses have been growing over the past few years. This growth has led them to add branches in different locations of large towns and various parts o...

[Meer zien]

Voorbeeld 3 van de 17  pagina's

  • 17 mei 2021
  • 17
  • 2020/2021
  • Samenvatting
avatar-seller
BMIS_520
IT Infrastructure Project Phase II


Liberty University

IT Infrastructure Project Phase II


Several businesses have been growing over the past few years. This growth has led them

to add branches in different locations of large towns and various parts of their network. For these

businesses to thrive in this business world, they must remain interconnected and secure from

cyber threats. These threats are becoming more frequent nowadays because of the rise in

technology (Gupta & Agarwal, 2017). All this has led to many companies employing experts in

various sections like the department of Information Communication Technologies and the

networking section. However, this was not considered necessary in the past years since the

technology had not advanced. People were still using traditional business models that involved

hard copies more than soft copies or paper and pen rather than computers. For business processes

to connect effectively and efficiently, all these branches of the companies need to be connected.

These companies should consider buying or developing software that runs in a network allowing

communications between staff or computer users in different locations. Nowadays, many

companies design a network with servers that can give services such as hosting websites, email

services, automatic IP address issuance, HTTP services, FTP services, and many more

(Vijayalakshmi et al., 2016). Also, the networks are designed in ways that allow different types

of devices to connect by implementing wireless technologies with the latest standards.


In this project, the JoshCook Global hospital network will be redesigned by the network

administrator in such a way that it supports 1000 devices and it can connect to the various

offices. To implement this Wide Area Network, we will have to connect these offices using

third- party Internet service providers to create a single network that connects the various local

,area networks (open.edu, 2021). The network needs to be one whereby a doctor from different

locations of JoshCook Global hospital can communicate and work effectively with the individual

staff at the various offices. The WAN network to be constructed requires to be carefully

designed not to affect the regular running of the hospital when simple issues arise. The goal is to

ensure that no vulnerabilities are portrayed in the wide-area network design to avoid packet loss,

latency, jitters, cyber threats of offline branches due to the outage of a link to a WAN (Metzler

& Ashton, 2015). A modern approach with the latest technologies should be implemented by

Josh Cook global hospital (Cisco Press). This new network infrastructure design aims to

improve the performance and handle traffic by ensuring that the current network's reliability,

availability, and serviceability are checked appropriately.

Literature Review


For better implementation of the network, specific critical issues have to be

looked at during the design phase. Network security is one of the common issues that arise in the

WAN and LAN networks. According to UC Berkley (2021), when an organization

accommodates many computers in the network, there is a probability that some of the computers

will be managed by nonprofessionals such that these machines won't have a track of whatever

function they shall perform. To better implement security in the JoshCook Global Hospital

network, a virtual private network should be set up, which will help create a secure tunnel that

will help protect data, voice, and other types of traffic passing through that network (Singh &

Gupta, 2016). However, the VPN works best if the computers connected via it remain in the

office. Nowadays, most attacked companies are affected due to the computers configured to

work from home (Furnell & Shah, 2020). This network setup will tunnel most of the data being

transmitted through the network to prevent unauthorized access.


Security patches will be added to the system after short periods to keep track of

the latest malware threats. The system will also use corporate antimalware to attain complete

domain security (Fovino, Carcano, Masera & Trombetta, 2009). To solve this issue of many

, computers, JoshCook Global Hospital will have to use certification on the entry that the IT

auditing team shall automatically issue for any new computer in the network. Also, the authority

enforcing the IT standards and policies in the hospital requires to be increased. A database on the

inventory of all the devices connected in the hospital network needs to be set up. UC Berkley

(2021) also suggests that an adequate count of resources must be set up in place so that hospital

complies with minimum standards. Most of the problems found include a lack of experts; lack of

software; lack of hardware, lack of members of staff required to keep things running in the

corporation or institution trying to secure their networks. Lack of compliance with standards may

lead to denial of access to the network. System data must be kept safe and classified before

identifying the owners of devices connected to the network. If the hospital fails to abide by these

rules, it may all resort to violating the federal government's laws or the state.


In JoshCook hospital, technology devices require to keep being refreshed, and this should

be made a priority in all the offices to implement adequate security (Dini & Tiloca, 2010). For

that, a cost-effective budget must be made to ensure that these systems comply with the law. An

audit group from IT should be created that shall be responsible for reviewing security plans,

conducting audits for policy compliance, and giving advice to other individual teams on how to

comply with the laws. The team must provide cost-effective and proper services. The team must

also set up a practical budget process to ensure that small departments and organizations have

obtained a new set of hardware that ensures law compliance adheres. We shall use the latest

Antivirus software to protect the connected devices against malware attacks. According to Zhang

& Ma (2021), antivirus software and other programs should be accessed via the FTP servers by

the network technicians, which should be centralized in every office building. Each shall be

accessible from other facilities. The computers in JoshCook hospital shall all be registered in the

company’s domain before being used by the staff based on the staff number of the specific

person who shall be using that particular computer. Only the computers in the network domain

shall have access to the software in the FTP servers.

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper helperatsof1. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €7,32. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 77254 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€7,32
  • (0)
  Kopen