1662513544882
docx
keyboard_arrow_up
School
Jomo Kenyatta University of Agriculture and Technology *
*We aren’t endorsed by this school
Course
MBA
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
6
Uploaded by Prof.Yano
1
Unit 2 - Individual Project
Student’s Name:
Institutional Affiliation:
Course:
Date:
2
Unit 2 - Individual Project
Developing a successful information system solution is a challenge for any business. It
requires proper design, network infrastructure, risk mitigation, development, implementation,
and maintenance. If any of these requirements are overlooked or not addressed with the
uttermost precision, it is most likely that the IT solution will fail or often glitch when users are
accessing it. Similarly, it is crucial to ensure that the proposed IT solution (Mince) for Crostini,
Inc. is developed concerning all requirements for any information system solution. This success
can be guaranteed through proper system analysis.
Document the solution component of the IT Solution based on the Capstone
Scenario.
Crostini, Inc. has specific requirements and expectations for the Mince IT solution. There
are various components for the IT solution. Some of these components are hardware, software,
access to the network, and security.
Hardware Components of the IT Solution
Hardware components have a significant role in automating some tasks and improving
customer service in any IT solution. Similarly, different hardware components will play a
significant role in the Mince IT solution, a cloud infrastructure. One such component is the
hypervisor acting as a Virtual Machine Manager for the solution. It will allow sharing of cloud
resources among different tenants. Another component is the development software that allows
the deployment of the Mince application to the cloud. Besides deployment, the development
software will make updating the application in the cloud easy. The other component is storage.
Since the IT solution is based on cloud infrastructure, storage will be used to keep multiple
3
replicas just in case one storage resource does not work. The last components are the network
and server. The server helps monitor resource sharing and perform allocation or de-allocation if
necessary. Further, the network plays a significant role in cloud infrastructure. It offers a
platform for data flow so users can connect to cloud services over the Internet.
Software Components of the IT Solution
The software components of the IT Solution can be associated with creating an operating
system for Mince cloud service that will allow customer management. The developed software
we are a service and thus can be regarded as SaaS. It is however crucial to note that there has to
be testing and deployment that allows proper fixing of the application before it goes live. Bearing
that SaaS is easy to use, it will be a very good solution for our customers.
Access to Network as a Component of the IT Solution
Different users will have access to the software and network. These users include
customers, employees, contractors, and guests. The network will be accessed in different ways,
such as through Wireless LANs, Virtual Private Networks, LAN connections, and WAN
connections. VPN will enable all company employees working remotely to access Mince admin
sites, which will regulate access to company sites, which plays a significant role in preventing
unauthorized access.
Security as a Component of the IT Solution
Besides the little security protocol established by VPN, the IT solution will be composed
of other security measures to protect all users. Some security measures include cloud
authentication, policies, firewalls, and technologies to protect the company’s cloud-based system.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
With proper security measures, all data will be protected from the wrong users making the
platform reliable and safe for everyone[CITATION Ric09 \l 1033 ].
A Detailed Network Diagram for Crostini IT Solution (Mince)
5
Explanation of the Network Architecture
The detailed Network Diagram for Crostini IT Solution (Mince) is composed of various
components that represent how information flows and the inter-relationship between the
activities involved in the project. Employees who work remotely will utilize Virtual Private
Network to access the company’s website and data. Grating access through the VPN will need
authorization, for example, by logging into the system. The connection will then transverse
through devices such as Routers, Servers, Load Balancers, and Firewalls until it gets to the
database. Components such as Load balancers help to prevent server upload and thus enhance
the availability of the IT solution[ CITATION Sam17 \l 1033 ]. The database comprises all the
information a user may want on the platform. For everyday uses, such vendors utilize a standard
ISP access point to access various website data, but their access is restricted to other components
of the network diagram, such as firewalls.
Identification of On-premises and Cloud-based Network Components
Some of the components of the Network Diagram are on-premises, while others are
cloud-best. On-premises network components can be accessed by employees[CITATION
Yur15 \l 1033 ]. These include Routers, Firewalls, and Wireless LAN technology. It is important
to note that even though on-premises components are highly secure because they are easy to
monitor, they require additional installation costs and configuration. Additionally, the cloud-
based network components can be accessed from the cloud. These include load balancers, web
servers, and databases. Cloud-based features allow on-demand availability of information by
users from the cloud.
6
References
Kissel, R., & Technology, N. I. (2009).
Small business information security: the fundamentals.
Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and
Technology.
Paradkar, S. (2017).
Mastering Non-Functional Requirements.
Packt Publishing, Birmingham.
Yuri Diogenes, J. G. (2015).
Enterprise Mobility Suite Managing BYOD and Company-Owned
Devices.
Pearson Education.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help