100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
Eerder door jou gezocht
Summary bmis 520 it infrastructure phase 2.docx BMIS_520 IT Infrastructure Project Phase II Liberty University IT Infrastructure Project Phase II Several businesses have been growing over the past few years. This growth has led them to add branches in diff€7,32
In winkelwagen
Summary bmis 520 it infrastructure phase 2.docx BMIS_520 IT Infrastructure Project Phase II Liberty University IT Infrastructure Project Phase II Several businesses have been growing over the past few years. This growth has led them to add branches in diff
49 keer bekeken 0 keer verkocht
Vak
UMGC
Instelling
University Of Maryland - University College
bmis 520 it infrastructure phase BMIS_520 IT Infrastructure Project Phase II Liberty University IT Infrastructure Project Phase II Several businesses have been growing over the past few years. This growth has led them to add branches in different locations of large towns and various parts o...
bmis 520 it infrastructure phase 2docx bmis520 it infrastructure project phase ii liberty university it infrastructure project phase ii several businesses have been growing over the past few
Geschreven voor
University Of Maryland - University College
UMGC
Alle documenten voor dit vak (241)
Verkoper
Volgen
helperatsof1
Ontvangen beoordelingen
Voorbeeld van de inhoud
BMIS_520
IT Infrastructure Project Phase II
Liberty University
IT Infrastructure Project Phase II
Several businesses have been growing over the past few years. This growth has led them
to add branches in different locations of large towns and various parts of their network. For these
businesses to thrive in this business world, they must remain interconnected and secure from
cyber threats. These threats are becoming more frequent nowadays because of the rise in
technology (Gupta & Agarwal, 2017). All this has led to many companies employing experts in
various sections like the department of Information Communication Technologies and the
networking section. However, this was not considered necessary in the past years since the
technology had not advanced. People were still using traditional business models that involved
hard copies more than soft copies or paper and pen rather than computers. For business processes
to connect effectively and efficiently, all these branches of the companies need to be connected.
These companies should consider buying or developing software that runs in a network allowing
communications between staff or computer users in different locations. Nowadays, many
companies design a network with servers that can give services such as hosting websites, email
services, automatic IP address issuance, HTTP services, FTP services, and many more
(Vijayalakshmi et al., 2016). Also, the networks are designed in ways that allow different types
of devices to connect by implementing wireless technologies with the latest standards.
In this project, the JoshCook Global hospital network will be redesigned by the network
administrator in such a way that it supports 1000 devices and it can connect to the various
offices. To implement this Wide Area Network, we will have to connect these offices using
third- party Internet service providers to create a single network that connects the various local
,area networks (open.edu, 2021). The network needs to be one whereby a doctor from different
locations of JoshCook Global hospital can communicate and work effectively with the individual
staff at the various offices. The WAN network to be constructed requires to be carefully
designed not to affect the regular running of the hospital when simple issues arise. The goal is to
ensure that no vulnerabilities are portrayed in the wide-area network design to avoid packet loss,
latency, jitters, cyber threats of offline branches due to the outage of a link to a WAN (Metzler
& Ashton, 2015). A modern approach with the latest technologies should be implemented by
Josh Cook global hospital (Cisco Press). This new network infrastructure design aims to
improve the performance and handle traffic by ensuring that the current network's reliability,
availability, and serviceability are checked appropriately.
Literature Review
For better implementation of the network, specific critical issues have to be
looked at during the design phase. Network security is one of the common issues that arise in the
WAN and LAN networks. According to UC Berkley (2021), when an organization
accommodates many computers in the network, there is a probability that some of the computers
will be managed by nonprofessionals such that these machines won't have a track of whatever
function they shall perform. To better implement security in the JoshCook Global Hospital
network, a virtual private network should be set up, which will help create a secure tunnel that
will help protect data, voice, and other types of traffic passing through that network (Singh &
Gupta, 2016). However, the VPN works best if the computers connected via it remain in the
office. Nowadays, most attacked companies are affected due to the computers configured to
work from home (Furnell & Shah, 2020). This network setup will tunnel most of the data being
transmitted through the network to prevent unauthorized access.
Security patches will be added to the system after short periods to keep track of
the latest malware threats. The system will also use corporate antimalware to attain complete
domain security (Fovino, Carcano, Masera & Trombetta, 2009). To solve this issue of many
, computers, JoshCook Global Hospital will have to use certification on the entry that the IT
auditing team shall automatically issue for any new computer in the network. Also, the authority
enforcing the IT standards and policies in the hospital requires to be increased. A database on the
inventory of all the devices connected in the hospital network needs to be set up. UC Berkley
(2021) also suggests that an adequate count of resources must be set up in place so that hospital
complies with minimum standards. Most of the problems found include a lack of experts; lack of
software; lack of hardware, lack of members of staff required to keep things running in the
corporation or institution trying to secure their networks. Lack of compliance with standards may
lead to denial of access to the network. System data must be kept safe and classified before
identifying the owners of devices connected to the network. If the hospital fails to abide by these
rules, it may all resort to violating the federal government's laws or the state.
In JoshCook hospital, technology devices require to keep being refreshed, and this should
be made a priority in all the offices to implement adequate security (Dini & Tiloca, 2010). For
that, a cost-effective budget must be made to ensure that these systems comply with the law. An
audit group from IT should be created that shall be responsible for reviewing security plans,
conducting audits for policy compliance, and giving advice to other individual teams on how to
comply with the laws. The team must provide cost-effective and proper services. The team must
also set up a practical budget process to ensure that small departments and organizations have
obtained a new set of hardware that ensures law compliance adheres. We shall use the latest
Antivirus software to protect the connected devices against malware attacks. According to Zhang
& Ma (2021), antivirus software and other programs should be accessed via the FTP servers by
the network technicians, which should be centralized in every office building. Each shall be
accessible from other facilities. The computers in JoshCook hospital shall all be registered in the
company’s domain before being used by the staff based on the staff number of the specific
person who shall be using that particular computer. Only the computers in the network domain
shall have access to the software in the FTP servers.
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper helperatsof1. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €7,32. Je zit daarna nergens aan vast.