IT190 Unit 9 Final Project
Outcomes addressed in this assignment:
Discuss how to protect your computer from malware
Describe a firewall and privacy issues
Explain how to create secure passwords
Identify how to maintain backups and protect your data
Proposal
The accounting firm, for which you work as an IT administrator, consisting of 40 employees has just merged with a smaller firm consisting of 10 employees. The smaller firm does not have an IT administrator on staff. As a result of the merger, a new building has been purchased to accommodate the additional employees in the city’s downtown historical district. (See attached floor plans below.)
The building has been included on the city’s register of historic buildings. The building has significant architectural features on the interior that must be maintained in compliance with the city’s historic landmark district and zoning ordinance. As a result, the interior can be updated only to make it structurally sound. All other architectural features must be maintained or restored to the same state as when the building was constructed.
Currently, the employees of the smaller firm are using older model Dell computers (circa 2005) with a Windows XP operating system. They are using a peer to peer network. Their employees are currently using Microsoft Small Office Accounting® Software, Microsoft Works, and Internet Explorer. They use avast!® (free version) for malware
protection. Backups are performed by individuals when they feel it is necessary. There is no company standard for backup.
Your company is also in desperate need of hardware updates. Most employees are using older systems with Windows XP. A couple of newer employees are using Windows Vista. You have a client/server network using Windows 2000 server. Your accountants use either Intuit® QuickBooks® or Sage® Peachtree® software. You are currently using SymantecTM AntivirusTM Corporate protection. Your company currently performs full back-ups monthly, differential backups weekly, and incremental backups nightly. These backups are made to an onsite server.
You now need to integrate all of the employees onto a single network. Your boss has requested that you prepare a proposal for integration to present to the city council and the investors. Remember, as well, that as an accounting firm, security is of the utmost importance. The chapter references following each question should give you a good starting point for your research. Your proposal should consider the following:
Computers for each employee (Marketing has indicated a preference for Macs due to their graphic capability). Be sure to include the make, model, and price for each computer you recommend. (Chapter 1)
Be sure to include the hardware requirements for each model and why you are making the recommendations that you are. You should summarize the key hardware requirements for each computer – for instance, hard drive storage, RAM, CPU information, etc. For each component, be certain to explain why this is an important consideration and how it will benefit your company. (Chapters 2, 6)
Application software requirements for each computer (Chapters 3, 4)
Accountingsoftware(reviewwhatthecompaniesarecurrentlyusing.What functions do they have? Will you keep one or both of the current options, or
choose something new? Why?)
Graphicdesignsoftware(formarketing)–remember,theywillbeusingthis
for designing such items as the company logo, website, yellow page
advertisements along with other marketing materials.
Browser – explain why you chose the particular browser (i.e. security,
convenience, ease of use, etc…)
Security–becertaintodiscussthecompanies’originalsecuritymeasures.
Are they appropriate? Why or why not? Then consider both physical and
logical security options for your network.
Anyadditionalsoftwareyoufeelwillbenecessary
Operating system recommendations for all computers. (Chapter 5)
Explain the reasoning behind your choice. Why did you choose this browser for your particular firm?
Network operating system recommendation (Chapter 7)
Network hardware – you should include anything you think you will need based on your reading from the book and any web research that you have done. (Chapter 7)
Backup System – remember that you should consider the location of your backup, and not just the software and schedule. (Chapter 9)
Additional devices that employees may require (PDAs, Cell Phones, Printers, Scanners, etc. (TiF – IT Ethics, Chapter 8)
Security – how will you secure your system? Remember to include both physical and logical security in your discussion. (Chapter 9)
Remember to give your justification for each of your decisions. Don’t just provide a list of your final recommendations. Assume that your audience has only basic computer knowledge. Also, please be sure to cite your sources! Everything should be summarized in your own words!