Infrastructure Design Overview In this third course project deliverable, you will create an infrastructure design that considers the key elements
USE TEMPLATE THAT IS ATTACHED.
Infrastructure Design
Overview
In this third course project deliverable, you will create an infrastructure design that considers the key elements of software, hardware, security, and business process flow for your e-commerce startup company. You will also use graphical tools to create a supporting data flow diagram (DFD) for your infrastructure design. The infrastructure design provides an opportunity to visualize the key elements and how they are connected for maximum effectiveness.
This assignment consists of two-parts:
Part 1: Infrastructure Design
You will create an 8–10-page infrastructure design document to include key technical elements for your hypothetical e-commerce company’s information systems infrastructure.
Instructions
Infrastructure Design
Create an 8–10-page infrastructure design document in which you:
- Identify the major hardware and software components of your hypothetical e-commerce company's information systems infrastructure.
- Design your e-commerce company's hardware (database and proxy servers, network equipment) and software (analytics, big data, API, content management) from a size, scale, type, and interoperability standards perspective.
- Document the potential security vulnerabilities and a security design for your e-commerce company.
- Use graphical tools to create a data flow diagram (DFD) for your e-commerce company.
- Use three sources to support your writing.
- Choose sources that are credible, relevant, and appropriate.
- Cite each source listed on your source page at least one time within your assignment.
- Access the library or review library guides for help with research, writing, and citation.
Running head: – Infrastructure Design 1
– Infrastructure Design 8
[Title Here, up to 12 Words, on One to Two Lines]
By Name Student
Information Technology Capstone
Overview
This should be all new and 100% original outlining this part of the move project. Give a high-level summary here, maybe written after you’ve completed the rest of the document. The best overviews will cover all the important points with little detail. When the reader sees something they want more detail on, they’ll keep reading. This is sometimes also known as an introduction or an executive summary. In the business world, this is one of the most important parts because it may be the only part the executives will read
1. Major Software and Hardware Components
This part of the document speaks to all the hardware you’ll need to install in your new location and what it’s used for or will be used for. The hardware will need software that supports your business. Describe the software. Details on installation will be covered in the next section but costs, and the hours required and dates of the installation as they are shown on your Gantt chart will be needed as well as anything in particular that your business will specifically need.
2. Hardware and Software Design
The hardware design will be specific for your company. What kind of processors do you need for your company? What kind of bandwidth for the network? The Internet? How much space on cloud servers? What about desktops? Mobile devices? Give specifics including model numbers and performance on each item.
For software, talk all about how it works. Does it integrate with other systems? Payroll? Billing? Banking? ERP? Do you partner with an online shopping cart provider? How does it work? Enough detail here that someone could come along behind you and continue the project if you were unable to do so.
3. Potential security vulnerabilities and Security Design
You’ve got security concerns. We all do. Identify and document particular avenues of attack on your company and areas where you have great risk to the business. This would be a great place to employ some study if you’re not a security concentration major. When you have done that, talk about the steps you’re going to take to mitigate the risk and minimize your company’s exposure to threats. Are you going to partner with a company to provide security? Employ software? Hire a security staffer or send your networker(s) to training? Detail as much as you can in terms of being prepared.
4. Data Flow Diagram (DFD).
This is a visual representation of how the data is going to flow through your processes. For example, customer initiates a transaction and shops. They put products in the shopping cart and then are asked to check out, or are they sent back to the place they were shopping before? What are the steps for checking out? If your business is all about consulting on web design, what is the flow of the process for the project with the customer? What about the internal flow from the sales staff to the programmers/designers? Adapt as many processes with as much detail as you can to give the reader a good understanding that you’ve mastered the idea of data flow diagramming. Use Visio, MS Paint, Word, PowerPoint, etc to create a diagram. Do not just download one from the web. Include your diagram here via screen shot. Don’t forget to add a caption to it as shown here in the template. You’ll need a narrative explaining anything in the diagram that wasn’t covered above, but at a minimum explain the diagram. ½ page for each diagram at the largest and ½ page description. https://www.gliffy.com/blog/what-is-a-data-flow-diagram is a good site that also explains about data flow diagrams. You do not need to buy anything for this. You can get Visio for no charge the same way you got MS Project. See the week one landing page in Blackboard for instructions or click on the Microsoft Azure for Education link on the left navigation pane. (See fig. 1)
Figure 1-Data Flow Diagram from https://www.gliffy.com/blog/what-is-a-data-flow-diagram
5. Optional: Paste your Gantt Chart here.
Use Microsoft Project to update the previously created Gantt chart with the major and minor tasks identified in the infrastructure design document. In the real world, you would include a cut and paste of the high-level of your Gantt Chart here. In this project, you can export your Gantt Chart as a PDF identifying the major and minor tasks, illustrating dependency relationships between activities. You must also submit your MS Project file to “show your work” If you include your Gantt Chart, it can be ½ page in size. Use one to three pages to describe the detail of each step of your project. Keep in mind that this will change as we progress throughout the class. We do want to have a plan in place before we kick off the project, and this will be it.
References Use three NEW sources to support your writing. (Remove these instructions) Choose sources that are credible, relevant, and appropriate. Cite each source listed on your source page at least one time within your assignment. Access the library or review library guides for help with research, writing, and citation. AlHinai, Y. S. (2020). Disaster management digitally transformed: Exploring the impact and key determinants from the UK national disaster management experience. International Journal of Disaster Risk Reduction, 51. https://doi.org/10.1016/j.ijdrr.2020.101851 Aydogdu, U. F. (2013). Technological Dimensions of Defence Against Terrorism. IOS Press. Boeke, S. (2018). National cyber crisis management: Different European approaches. Governance, 31(3), 449–464. https://doi.org/10.1111/gove.12309 Centre of Excellence Defence Against Terrorism. (2008). Responses to Cyber Terrorism. IOS Press. CYBERSECURITY. (n.d.). Retrieved November 21, 2020, from https://www.cisa.gov/cybersecurity Gazley, B., & Brudney, J. L. (2005). Volunteer Involvement in Local Government after September 11: The Continuing Question of Capacity. Public Administration Review, 65(2), 131–142. https://doi.org/10.1111/j.1540-6210.2005.00439.x Gheorghe, A. V., Tatar, U., & Gokce, Y. (2017). Strategic Cyber Defense: A Multidisciplinary Perspective. IOS Press. Jakobi, A. P. (2016). Non-state Actors and Global Crime Governance: Explaining the Variance of Public-private Interaction. British Journal of Politics & International Relations, 18(1), 72–89. https://doi.org/10.1111/1467-856X.12064 Kerrigan, M. (2018). Homeland Security. National Highlights Inc. Porche, I. I. R. (2020). Cyberwarfare: An Introduction to Information-Age Conflict. Artech House. Provan, K. G., & Kenis, P. (2008). Modes of network governance: Structure, management, and effectiveness. Journal of Public Administration Research and Theory, 18, 229–252. Qiqi Jiang, Chuan-Hoo Tan, Choon Ling Sia, & Kwok-Kee Wei. (2019). Followership in an Open-Source Software Project and Its Significance in Code Reuse. MIS Quarterly, 43(4), 1303–1319. https://doi.org/10.25300/MISQ/2019/14043 TRAUTMAN, L. J., & ORMEROD, P. C. (2018). Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things. University of Miami Law Review, 72(3), 761–826. Ward, M. (2020). State of the States: THIS YEAR’S TECHNOLOGY TRENDS AND PERSPECTIVES FROM NASCIO. Capitol Ideas, 2, 37.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.