C768 Task 2 - TASK 2: PROPOSAL FOR TECHNOLOGY SOLUTION TECHNICAL COMMUNICATION — C768 PDF

Title C768 Task 2 - TASK 2: PROPOSAL FOR TECHNOLOGY SOLUTION TECHNICAL COMMUNICATION — C768
Course Technical Communication
Institution Western Governors University
Pages 10
File Size 172.9 KB
File Type PDF
Total Downloads 74
Total Views 143

Summary

TASK 2: PROPOSAL FOR TECHNOLOGY SOLUTION
TECHNICAL COMMUNICATION — C768...


Description

C768 Task 2

1

Firewall Implementation Name Western Governors University

Signature:

Name

Date:

11/02/1988

C768 Task 2

2

Table of Contents Abstract..................................................................................................................................................3 Proposed Project for Seamus Company..................................................................................................4 D1. Proposed Solution.............................................................................................................................4 D2. Related Works Review.......................................................................................................................5 D3. Goals, Objectives, and Deliverables...................................................................................................6 D4. Projected Timeline............................................................................................................................7 D5. Resources and Costs..........................................................................................................................7 D6. Outcome............................................................................................................................................8 E. Justification and Proposal Highlights....................................................................................................8 G. Sources................................................................................................................................................9

C768 Task 2

3 Abstract

Sun Infotech proposes Seamus company to implement a firewall to address the want to improve the use of emerging technologies to enhance business. The current firewall in place is outdated and aged which is a high-risk factor when it comes to employee and customer information and the new firewall will help to protect Seamus company’s intellectual property and will ensure customer and employee information will be safe and secure, preventing data breaches from occurring. By implementing this new firewall Seamus company will be benefitted in many ways which include the company's Information technology team to less focus on monitoring and detection of possible intrusions attempts and spend time on other tasks needed for the business. Implementation of the firewall will help the company save hundreds of dollars in case of a cyberattack and hours spent recovering if such an event occurs. The project implementation is planned to be completed using the Cisco ASA firewall firepower 2130 which can support up to 5Gps of internet traffic and is scalable for future use. One time cost of this device will be 24,276 with a support fee each year after purchase. Support subscriptions can be purchased for 1 to 3 years. Longer the year of support purchase, the company can save money with oneyear subscription fees of $2500 and 3-year fees of $6000.Compared to $3000 paid yearly by Seamus this is a significant amount of cost-saving for the company. Our company Sun Infotech have been experts in the cybersecurity industry for the past 15 years and helping business and customers with the latest technology implementations and pride our selves being experts in firewall and security appliances. Sun Infotech team has engineers who are well experienced in the field who help in finding ways to save time and money for our valued customers.

C768 Task 2

4

C768 Task 2

5

Proposed Project for Seamus Company

D1. Proposed Solution Seamus company has been seeking to enhance its business by wanting to use more emerging technology and we at SunInfotech highly recommend taking advantage of the new firewall to address the issue of security and achieve this goal. With the expansion and growth of the company, it becomes a greater target for cybercriminals to take advantage of customer and employee information and to prevent such kind of unauthorized access to data, we propose to incorporate Cisco ASA firewall to existing IT Infrastructure and replace outdated technology currently being used which leaves a highly vulnerable path for cybercriminals. This new technology is well suited for defense against modern cyber threats and some of the features include World-class security controls, Consistent policy, and visibility, only authorized individuals can access company resources and can integrate powerful threat prevention capabilities into the existing network infrastructure.

We plan to implement the firewall in five different phases. During the first phase, our team will visit the Seamus company where the IT infrastructure is housed to understand the current workflow of devices and how the network and devices are configured. In the second phase, we will order the hardware, source the software to be installed in the device, and rack the device. The third phase will be to locate and remove old hardware. The fourth phase is to install and connect the new device to the network to make sure the network traffic of all devices flows through the firewall and is well connected and talking to the network. The final phase which is the fifth phase is to provide training for IT teams within Seamus company on how to administer the device.

C768 Task 2

6

D2. Related Works Review The first article reviewed,(Disha,2019), states that “The old or traditional firewall may deliver an average performance or reduced efficiency but modern firewalls are worth spending when it comes to a network security breach”.This is a very important factor that should be taken into consideration as the business grows. Due to many government regulations if a company has not taken proper measures to prevent attacks and customer or employee information is breached it would be very costly to deal with. Firewalls can automatically detect different types of attacks all will monitor all the types of traffic flowing through the device and the IT team will have full command over what is received and important. This will also help Seamus company to take proactive steps or action in case there are any vulnerabilities and patch the devices in the network before any attack occurs.

The second article reviewed,(Hardware firewall,n.d), points out some of the advantages of firewall which points out that a single device can protect every device connected to the network, which can cut back on the time and resources if it was monitored by software. Updating this single device means all the devices connected to the firewall is protected and safe from compromises and reduces the IT Team to update manually otherwise. As the device is up and running all the time unless it is turned off the company’s customer information, intellectual property, and employee information remains safe.

The third article reviewed,(What makes a strong firewall,n.d), shows some of the disadvantages of not having a firewall.” The potential impact of working without a firewall can be extremely damaging to an organization, even if machines only connect to a local network. Without a firewall, data packets can enter and exit the network freely, without any kind of monitoring or checking. This means that any kind of traffic, malicious data, and malware can enter and spread across the entire network of computers”.

C768 Task 2

7

If cybercriminals find that a company's network is identified as vulnerable it is very likely to be attacked which can cause serious downtime not only for the network but also for business operations an some of the implication to be dealt with includes financial loss and fine, theft of (customer, company, financial) data. There can be damage to reputation and operational disruption. Considering all these issues, investment in a single device like a firewall can be a great cost-saving and advantage to the company.

D3. Goals, Objectives, and Deliverables I.

Goal: The goal of implementing a firewall is to protect Seamus company’s customer, employee data from cyber attacks utilizing emerging technology to its IT infrastructure. With the implementation of a firewall, it can be assured that the company information and data are safe thereby saving the company from monetary loss and reputation in case a breach was to occur. a. Objective 1: To visit the company where the IT Infrastructure is housed and understand the workflow of devices to determine how the current network and devices are configured. i. Deliverable 1: Meet with the company's IT team to discuss current device configurations of the network. ii. Deliverable 2: Work with the IT team to decommission the current firewall and decide on to find a suitable rack and house the new firewall. b. Objective 2: To power up the device and install operating system software on the device to determine what features to be enabled and configured that matches current devices in the network. i. Deliverable 1: Schedule a meeting with the IT team and the Executive team to understand the needs and what feature would they like to activate on the device to make sure the business needs are met. ii. Deliverable 2: Provide suggestions during the meeting on best configurations and practices to optimize the device capabilities. c. Objective 3:Configure device and features as recommended by IT Team and Executives to meet the business need and set up network traffic to flow through the device. i. Deliverable 1: Set up and connect the new device to the network to test connectivity and monitor the performance of all network traffic. ii. Deliverable 2:Test and make sure the device performs well and can handle incoming traffic and make sure important traffic is allowed through needed for business and customers. d. Objective 4:To train Seamus company IT team on the new device and how to configure the device according to business need. Explain all the different settings available on the device and how to manage, update the device.

C768 Task 2

8 i. Deliverable 1: SunInfo tech will send engineers for three days who are expert and has good knowledge about the device to Seamus company and provide training for IT staff. ii. Deliverable 2:Make sure all the questions and concerns are addressed about the device by engineers. Train on how to monitor network traffic and performance.

D4. Projected Timeline Duration Description of deliverable

Projected start date

Anticipated end date

(hours or days) IT Infrastructure Inspection

6 Hr

11/19/2020

11/19/2020

Device set up

3 Hr

11/20/2020

11/20/2020

14 Hr

11/21/2020

11/22/2020

24 Hr

11/23/2020

11/25/2020

Device configuration and Testing Training IT Team

D5. Resources and Costs The resources needed to complete this project include Cisco ASA firewall firepower 2130, Network cables, Two 2-post mount brackets, Four fixed 1-G/10-G SFP+ ports, One fixed AC power supply module, UPS to protect equipment from power failure, Two engineers from SunInfotech to configure device, staff training. Description

Cost

Quantity

Duration

Total

Cisco ASA firewall firepower 2130

$24,276

1

$24,276

Network Cables

$60

4

$60

Two 2-post mount brackets

$42

2

$84

Four fixed 1-G/10-G SFP+ ports

$25

4

$100

AC power supply module

$36

1

$36

C768 Task 2

9

UPS

$235

Labor &Training

110/Hr

1

$235 41 Hr

$4510

Total

$29301

D6. Outcome The anticipated project outcome will be, a decrease in the support fees paid earlier by Seamus company for previous outdated technology. Increase in availability of Firewall with the added installation of UPS which will keep the device uptime. Fewer manhours spend on monitoring traffic and fixing the issue as the firewall will handle incoming traffic and take decisions on behalf of the IT Team in case of an attack.

Metric

What will be measured

Success measurement

Reduced Support fees

The cost of new equipment support fees of current vs previous hardware.

Range of decrease in cost from 5-10% will be considered as successful.

Increase of firewall availability

Increase in availability of firewall to monitor network traffic in case of a cyber-attack or power outage

Device uptime of 95-99 % to monitor traffic and power outage will be considered successful compared to old hardware which was at end of the life cycle.

Staff hours spend to troubleshoot and manage firewall equipment

The time it takes to troubleshoot and fix the issue

A decrease of 20-25% manhours spent vs the previous 40 -55% due to increased capability of new hardware will be considered as successful.

E. Justification and Proposal Highlights Sun Infotech proposes Seamus company to implement a firewall to address the want to improve the use of emerging technologies to enhance business. The current firewall in place is outdated and aged which is a high-risk factor when it comes to employee and customer information and the new firewall will help to protect Seamus company’s intellectual property and will ensure customer and employee information will be safe and secure, preventing data breaches from occurring. The new firewall has advanced features and capabilities which can help defend Seamus company against modern-day cyber-attacks. This new firewall device will also help the IT department spend fewer hours on monitoring and

C768 Task 2

10

troubleshooting as the device can automatically take action on behalf of the IT Team freeing up precious hours spend and this piece of hardware can be managed from one place. Sun Infotech have been experts in the cybersecurity industry for the past 15 years and helping business and customers with the latest technology implementations and pride our selves being experts in firewall and security appliances. Sun Infotech team has engineers who are well experienced in the field who help in finding ways to save time and money for our valued customers. We believe that this project should be of great priority as implementing this project will cost only $29,301 and the price spent is small compared to price to be paid if there was a cyberattack to occur and the company is liable for all the legal fees and reputation damage caused by an incident. Statistics had shown that cyber threats are increasing day by day and is only projected to increase as more and more companies incorporate technologies in IT Infrastructure.

G. Sources Disha. (2019, December 6) Hardware Firewall-An Overview. Retrieved from https://www.milesweb.com/blog/website-security/hardware-firewall-an-overview/ Hardware Firewall. (n.d.).Retrieved from https://www.fortinet.com/resources/cyberglossary/hardware-firewalls-better-thansoftware What makes a strong firewall. (n.d). Retrieved from https://ktsecure.co.uk/what-is/what-makes-a-strong-firewall/...


Similar Free PDFs