IT security

IT security

Consider the overall team project solution (hardware and software) relative to security. Create and submit a 3–4-page Word document defining your recommendations concerning security. Be sure to articulate reasons for specific choices. Include in your document an explanation about the relationship between the IT security policy and the chosen security mechanisms for your overall solution. Be prepared to discuss your thoughts with the team’s Security Specialist about the following

Disaster recovery

Password creation and protection

Remote access

Routers and switches security

Wireless communication

Server security

Acceptable encryption

E-mail

Capstone Project Scenario

A former dot com company, Verbania, Inc., shut down in 2001 because of the Internet bubble burst. It is attempting to reinvent and launch itself once again. It is looking for a complete information technology (IT) solution that includes hardware, software, networking, and security, among other requirements. Verbania’s core product will be a social networking Web site and mobile application that rivals the big names that currently represent social media. It is attempting to find the best features and consolidate them into its product. The company is looking to establish its headquarters in the Silicon Valley region in California. The executives at Verbania are looking for your company to propose a solution that will endure future Internet trends.

The basic user requirements for the social networking solution must include but are not limited to the following:

Creating an account and a profile

Creating discussion forums and posting

Search capability for people

Gaming component

Calendar component for reminders

Instant messaging and Voice Over Internet protocol (VOIP)-type calling between friends

Secure account and email feature

Availability seven days a week

The basic company requirements for the social networking solution must include but are not limited to the following:

Collect, store, back up, and mine user data to better understand users.

Integrate collected data with customer relationship management (CRM) to improve business and customer support processes.

Analyze user patterns, behavior, and generated traffic to present to advertisers.

Requested functionality for the social networking application includes the following:

Account setup and log-in functionality

Creating a profile

Adding or removing friends

Posting to a discussion area

Solution preview for the order on IT security

IT Security

APA

1087 words