Capstone Official (1)
-
Upload
sedjro-koakanou -
Category
Documents
-
view
226 -
download
0
Transcript of Capstone Official (1)
Project Manager:Israel Delgado
Financial Coordinator:Erich Jones
Network Administrator:Ryan O’Hanlan
Security Advisor: Sedjro Koakanou
In a world of new technology, we at Project X Inc. promise to bring our
business clients up to date in accordance with the best
technologies at a price that no one can beat.
Investment protection Quality assurance Cost effective solutions Flexibility Customer satisfaction World class support
Project X Inc. has been contacted by the “C&M Medical” to design, set up, and implement a complete new network for their conjoining medical offices. We are bringing the future to C&M Medical.
C&M Medical provided us with a budget of $425,000 and at Project X Inc. we will make every dollar that you invest in our company completely worth its value.
At our company , we are proud of what we do and want to make you proud of your business operations as well.
All funds required for this project need to be calculated, investigated and approved by our Project Manager within two weeks from signing the contract.
Outdated standalone workstations of different ages running Windows 98
Patient data stored on different personal computers or hard copy records
Dot matrix printers with proprietary software Billing and insurance both use low-end
printers and machines with 54Kbps Modem
Novel 4.5 server Provides all the network services
East and West offices PC’s connect by Peer to Peer
Remote offices have legacy point-to-point dedicated circuit
No networking capabilities between offices Shared Billing and Insurance software
LAN needs centralized and updated to ensure high transfer speeds, low chance of bottlenecking, and redundant connectivity
Billing and insurance needs centralized for any site access
Upgrade workstations, servers, and all network equipment
Wireless laptops, Tablets for dictation, and VoIP phone service for all sites
Disaster recovery plan with BCP
8 workstations at each office with 2 workstations for backup and further potential growth
Routers for wireless access with laptops, phones, and tablets
Main office estimates 4,000 ft. of cat6 cabling Remote office estimates 4,000 ft. of cat6
cabling total Easy access to printer/copiers
Meet your growing business demands with next-generation power and flexibility in a 2-socket, 2U rack server. Achieve flexibility and scalability from over double the memory capacity of previous server generations and easy life cycle manageability.
Intel® Xeon® E5-2620 processor, 16GB memory, and 500GB hard drive
Speed- 10/100Mbps
Product Type:Router
Fast Ethernet
10 Expansion Slots
Rack-mountable
Wall Mountable
Compatible Rack Unit:1U
Number of Network (RJ-45) Ports:2
Total Number of Ports:2
Expansion Slot Type:AIM
HWIC, NME, PVDM
Product Name:2811 Integrated Service
Flash Memory:64 MB
Standard Memory:256 MB
Wire-speed performance for 10/100/1000 connectivity and wire-speed 10 Gigabit Ethernet uplinks 136-Gbps switching fabric with 102-Mpps forwarding rate for Layer 2 through 4 Power-supply redundancy for nonstop operation 1+1 redundant hot-swappable internal AC or DC power supplies Robust Security Prevention of man-in-the-middle and IP-spoofing attacks Access control lists (ACL) Secure Shell (SSH) Protocol versions 1 and 2 Simple Network Management Protocol Version 3 (SNMPv3) for secure remote access and
network management Comprehensive management Dedicated 10/100 console port and dedicated 10/100 management port Remote in-band management through SNMP
Security and performance. Hand in hand. As a Next-Generation Firewall for medium-size organizations, the
Dell™ SonicWALL™ Network Security Appliance (NSA) 5600 makes it easy for organizations to be both secure and productive. Coupled with Dell’s patented1 Reassembly-Free Deep Packet Inspection® (RFDPI) single-pass threat prevention engine, Dell SonicWALL Next-Generation Firewalls provide industry leading protection, performance, and scalability with the highest number of concurrent connections, lowest latency, no file size limitations and superior connections per second in their class.
Up to 300Mbps Wireless Data Rates
IEEE 802.11a/b/g/ndraft 2.0, IEEE 802.11i, IEEE 802.3af
Ethernet Port 1 10/100/1000 auto-
sensing RJ-45 port forEthernet and Power over Ethernet (PoE); 1 RJ-45
800 GB (Native)/1.60 TB (Compressed)
Linear Serpentine LTO Ultrium 4 (Read/Write) SCSI 1/2H Internal
The PowerVault™ TL2000 tape library offers simple and affordable tape automation for organizations whose data-protection needs have outgrown autoloader technology. It's the solution of choice for small- and medium-sized businesses that require affordable, easy-to-use, automated tape backup and archiving.
Centralize your storage and backups Private cloud anywhere access . Always-on data security. Raid-enabled for additional protection. Make automatic, continuous backups of
multiple PC and Mac computers Store files in a secure, central location Access and manage files remotely with
private cloud features using Internet-connected computers, tablets and smartphones
Create cost-effective, private cloud storage
Encrypt individual files to entire volumes of data
Transport large files using external drives
4th Gen Intel Windows 7 Professional 64-
bit, 4GB DDR3 500GB Hard Drive Integrated HD Graphics 3 Year Basic Hardware Service
+3 Year NBD Limited OS After Remote Diagnosis
▪ 3rd Gen Intel® Core™ i7 processor
▪ Windows 7 Pro
▪ Intel® HD 4000 graphics
▪ 12GB RAM
▪ 256GB SSD
▪ Up to 9 hours battery life
▪ Anti-glare display
Intel Core i5 CPU
10.1-inch full HD 10-point Multi-Touch Display
Built with Type Cover
64GB of internal storage
MicroSDXC Slot
dual webcams
The Cisco Unified IP Phone 7941G:
A high-resolution, graphical 4-bit grayscale display (320 x 222)
Support for double-byte characters and Unicode text to benefit Extensible Markup Language (XML) application developers
Support for IEEE standard 802.3af inline power and Cisco inline power
• corporate-strength functionality
• enhanced security
• centrally managed
• single mailbox integration
• push delivery from corporate applications
31 copies per minute
auto-duplexing
auto-document feeder
large 500 sheet paper tray
80 GB hard drive
Wireless printing
Print from mobile devices
Shared over a network
We are going to optimize your offices by saving you money in
the long run
That occurs when implementing virtualization to your servers
Virtualization means we are turning one physical server into
several virtual servers
Reduces power and cooling costs
Reduces space consumption
Easiest Windows to use ever: Simplify your PC with new
navigation features like Aero Shake, Jump Lists, and Snap. .
Easy to network Back up your complete system over
a network. Faster and more secure. Windows XP Mode for business
flexibility you. Designed to make your PC sleep
and resume quicker Takes full advantage of 64-bit PC
hardware and memory.
DescriptionWindows Server 2008 Enterprise delivers an enterprise-class platform for deploying business-critical applications. Help improve availability with clustering and hot-add processor capabilities. Help improve security with consolidated identity management features. Reduce infrastructure costs by consolidating applications with virtualization licensing rights. Windows Server 2008 Enterprise provides the foundation for a highly dynamic, scalable IT infrastructure. Windows Server Hyper-V, the next-generation hypervisor-based server virtualization technology, allows you to make the best use of your server hardware investments by consolidating multiple server roles as separate virtual machines (VMs) running on a single physical machine. With Hyper-V you can also efficiently run multiple different operating systems—Windows, Linux, and others—in parallel, on a single server, and fully leverage the power of x64 computing. Hyper-V provides a dynamic, reliable, and scalable virtualization platform combined with a single set of integrated management tools to manage both physical and virtual resources, enabling you to create an agile and dynamic data center.
New photo, video, and text effects for creating standout documents and presentations
New communication tools in Outlook 2010 to help you stay in touch and organized
Makes it easier to manage things in the office, at home, or in between
Clarify and manage your financial data with new and improved analysis tools, charts, templates and color formatting in Excel 2010.
The new Microsoft Office Backstage view replaces the traditional File menu found on previous versions of Microsoft Office.
This makes it easier to navigate tasks, as well as access and manage files.
Office in the Cloud. Full Featured Exchange 2010 Total control of your services Mobile freedom Enterprise-grade security world-class datacenters 99.999% uptime business-protecting benefits:SpamStopper,
VirusStopper, and Outlook Backup tools
Desktops will be physically locked to desks for theft prevention
Screen Protectors will be added to maintain monitor life
Roles will be implemented with AD to ensure safety of protected files
Main Building
West Building
South Building
East Building
North Building
Ethernet
WirelessRouter
Ethernet
WirelessRouter
HIPAA, the Health Insurance Portability and Accountability
Act of 1996, Public Law 104-191, was designed to improve
the efficiency and effectiveness of the health care system. It
included “Administrative Simplification” provisions that
required the U.S. Department of Health and Human Services
(HHS) to adopt national standards for electronic health care
transactions. At the same time, Congress recognized that
advances in electronic technology could erode the privacy of
health information. Consequently, Congress incorporated into
HIPAA provisions that mandated the adoption of federal
privacy protections for individually identifiable health
information.
HIPAA VIOLATIONS Minimum Penalty Maximum Penalty
Individual did not know (and by exercising reasonable diligence would not have known) that he/she violated HIPAA
$100 per violation, with an annual maximum of $25,000 for repeat violations (Note: maximum that can be imposed by State Attorneys General regardless of the type of violation)
$50,000 per violation, with an annual maximum of $1.5 million
HIPAA violation due to reasonable cause and not due to willful neglect
$1,000 per violation, with an annual maximum of $100,000 for repeat violations
$50,000 per violation, with an annual maximum of $1.5 million
HIPAA violation due to willful neglect but violation is corrected within the required time period
$10,000 per violation, with an annual maximum of $250,000 for repeat violations
$50,000 per violation, with an annual maximum of $1.5 million
HIPAA violation is due to willful neglect and is not corrected
$50,000 per violation, with an annual maximum of $1.5 million
$50,000 per violation, with an annual maximum of $1.5 million
Our company goes true steps of thinking's that are only related to everything's related to HIPAA and also analyzed by our headquarters guys ,that are the ones going deeply in the HIPAA requirements as far as personal identity until all the transactions and communications between our respected doctors (our clients) and their own patient , who are the one putting all the trust in all of us.
Matter fact all our works are highly appreciated and feed back from our clients are always positives.
TIA/EIA-222 standard applies to steel antenna towers and antenna supporting structures for all classes of communications service, such as AM, FM, TV, VHF, Cellular/PCS, Microwave, unlicensed frequency bands, etc. The standard utilizes wind and ice loading criteria based on an annual probability. The standards was originally designed for the United States however it may also be adapted for international applications provided the appropriate basic wind speed (highest-Km/Mile) and ice loading is available.
The main intention of the standard is to serve the public interest and protect the public safety through eliminating misunderstanding between manufacturers and purchasers. The information contained in the standard represents the accepted industry practices in the design of steel antenna supporting structures and is revised every five years to maintain its modern state of tower design practiced within the industry. This standard ensures that buyers have the opportunity to specify and obtain the highest quality product available for any given application.
Accredited by the American National Standards Institute (ANSI), EIA provides a forum for the industry to develop standards and publications in our major technical areas: electronic components, consumer electronics, electronic information, telecommunications, and Internet security. Standards committees are managed by various sectors, TIA oversees the telecommunications sector.
Implementing WPA2 Enterprise encryption with 802.1X authentication provides the best Wi-Fi security for businesses.
The Enterprise mode of WPA2 gives you dynamic encryption keys distributed securely after a user logins with their username and password or provides a valid digital certificate. Users never see the actual encryption keys and they aren't stored on the device. This protects you against rogue or terminated employees and lost or stolen devices.
In this enterprise environment mode , the Doctor office private sections will be having all doors , finger scanners , batch readers and pass codes verification systems before letting any authorized employee accessing this location with a (one time ) turning door that will only allow the entrance of one employee , then will be asking the other employee to authenticate his self before letting him enter as well , if there were more than one person accessing this location.
Endpoint Security File Security Mail Security Gateway Security Mobile Security Endpoint Antivirus Remote
Administration
Physical Security addresses actions you can take to protect buildings, property and assets against intruders.
It is composed of different security systems and mechanism , all designed to protect a physical place against intruder and any one else wanted to access a resource without authorization.
Security cameras will be added inside and outside of all the offices and workplaces.
All of the offices will be monitored by a system of surveillance cameras that will be taking live of all activities happening in the offices
Cameras will be also installed in the restricted areas for the security of the information's handled by both hospital.
Reception rooms will monitored by cameras for the security of all the personnel working in this hospital.
The U.are.U 4500 reader is a USB fingerprint reader featuring an elegant, sleek design with a soft, cool blue glow and, of course, the unsurpassed performance DigitalPersona is known for.
Made for power-users and shared environments, the 4500 is the natural choice for those that want and need the very best.
24 hour recovery time objective Servers will be configured in Raid Daily backups Backups replicated off-site. All servers will be replicated to Virtual machines
to insure fast recovery. All branch offices will have their servers
configured as read-only DC. Shares will be replicated using DFS and with
multiple paths a 4 terabyte NAS on the network for storage.
A training plan will be a step by step required security training that needs to be administered to every employee in this doctor office. All employees will be taking a mandatory security class and also they all will be receiving a well oriented company security requirement of the doctor office.
Products Cost Description
Hardware
Network equipment 98,858.41$ Servers, Switches, Routers, etc.
Office equipment 15,541.18$ Copiers, printers, cameras, etc.
User equipment 129,053.35$ Workstations, tablets, IP phones, etc.
Software 19,639.57$ Windows 7, Office, Server 2008…
Subtotal 263,092.51$
Shipping (flat fee) 500.00$
Labor (flat rates) 154,000.00$ $150 / hour. Total hours determined by project size
Total Cost 417,592.51$
Project XCost Analysis
Our client from the doctor office, wanted to upgrade their hospital systems by making it more useful with today new technologies. They also wanted to have it expended to their other offices where they could be able to remote into and also be able to access the other office wireless.
We as the provider of this new technology, are listening to their needs and also are making sure that any of their demand and preoccupations are ours and that any of their satisfactions are our victory.
So how about we make a deal and work together to provide each other with great business opportunities?
Any questions?
Source Picture Description
Slide Reference
http://www.lightyear.net/ Binary tunnel Networks
http://www.aclogik.com/empresa/software.html
Keyboard program
Software
http://techtelling.com/2013/03/01/hp-cyber-security-report-shows-vulnerabilities-on-the-rise/
Logical padlocks Security
http://lawfirmsuccess.wordpress.com/2013/05/15/court-case-to-decide-future-of-ftc-regulation-of-firm-cyber-security-systems/
Finger print detection
Physical security
http://meship.com/Blog/2011/03/20/cloud-becoming-a-major-disaster-recovery-strategy/
Computer on fire Disaster recovery
http://www.loopnet.com/Listing/17971420/1255-Corporate-Dr-Irving-TX/
Office building Office building lalyout
Safeguards HIPAA essentials Physical security American Medical Association Enterprise encryption