Você está na página 1de 44

The Broadway Caf

Place where people meet


and business happens
http://www.cohesioncase.com/security/index.html

Security
Group 3:
Kash Patel
Sophie Peterson
Tom Randazzo
Joel Ortiz
Zohaib Nasir
Samar Patel

Page |1

Table of Contents
Planning - Kash Patel, Sophie Peterson
Problem Statement.2
Systems Request2-3
Project Scope.3-4
Feasibility Analysis4-7
Work Breakdown Structure7-8
Gantt Chart..9
Analysis - Joel Ortiz, Tom Randazzo
Threats (physical and electronic).9-10
Security Policies...10-12
Requirements (functional and nonfunctional)..12-13
Activity Diagram (As-Is, To-Be)..13-18
Use Case Diagram19-22
Design - Zohaib Nasir, Samar Patel
Class Diagram...23
Graphical User Interface...24-30
Windows Navigation Diagram.31-32
Floor Plan..33
Deployment Diagram.34
Backup Strategy.35
Physical Security35-37
Appendix
Contract38
Sources.39

Page |2

Planning
Problem Statement
Security has been an ongoing problem for the Broadway Caf due to the lack of
technological upgrades performed over the years. Problems such as vandalism, stolen equipment,
and customer personal information have been the main issues. The Caf must be brought into the
21st century, which will give it the technical advancements it needs to control the main issues.
This will involve adding cameras to the floor plan. As well as installing an internet security
system to keep out advanced criminals. Since today crime is not only done at the organization
but throughout the internet.
What the systems will intend to do is upgrade and reengineer the steps that the security
system will take. There will be a third party that will come and set up the security system for the
Broadway Caf and teach the organization to use it. The system will aim to stop all theft and
protect the organization from internal and external threats.

Systems Request
Project Sponsor Broadway Caf Owner
Business Need

1. Moving company/business in to the modern day


2. Security and confidentiality of customers
3. Protection from unauthorized access

Business 1. Create a secure environment for both customers and staff


Requirements 2. Provide protection from internet security issues
3. Video and electronic security
Business Value 1.
2.
3.
4.

Customer Satisfaction
Business Management
Asset Security
Identity Protection

Page |3

Special Issues or
1. Limited to what anti-virus offers.
Constraints
2. Blind spots in camera locations

Project Scope
Project Title: Broadway Caf IT Security Implementation
Start Date: 3/31/15

End Date: 6/02/15

Team Members:
Kash Patel
Sophie Peterson
Tom Randazzo
Joel Ortiz
Zohaib Nasir
Samar Patel
Purpose: The goal of this project is to implement a modern day security system to the
Broadway Caf. So that we can aim to minimize internal and external crimes such as
vandalism, stolen equipment, and customer personal information.
Justifications: The Broadway Cafs systems have been outdated and easy to breach. In order
to protect the customers and staff, from identity theft and physical harm. As well as minimize
the rise in internal and external crimes. The system must be revamped.
Deliverables:

A network security system that involves the use of firewall protection, virus protection, a

secure network, and proper backup.

A physical security system that records human interaction inside and outside the Broadway

Caf.

Page |4

New security policies that regulate the system to create a more secure environment.

Assumptions:

We are building everything in-house as opposed to outsourcing it

A need for improvement on security

Company profitable enough to sustain business

System should have capability to increase capacity

Stakeholders:

Broadway Caf Employees

Broadway Caf Managers

Customers

Project Sponsor

All those who are also involved or affected by the actions of the Broadway Caf

Feasibility Analysis
The implementation of this new security system will help protect Broadway Caf from
potential security breaches. It is important that Broadway Caf has a strong security system that
will protect the caf from unauthorized access and misuse. The security system will not only give
Broadway Caf a competitive advantage but will also decrease the risk of their customers
information getting hacked. This new security system will secure customer records and financial
information.

Technical feasibility (Can We Build It?):

Page |5

The overall risk of the project is low due to the long term costs being low compared to
the high benefits of implementing this security system. This is a medium sized project because
there is little to no current security system. Broadway Caf is unfamiliar with the technology
needed so there will need to be a hiring of IT experts to design and install the security system.

Economic feasibility (Can We Afford It?):


Broadway Caf will be able to afford this security system. The benefits of implementing
this system out way the costs.
Hardware/Software Cost Details:
Item

Quantity

Price/Unit

Total Costs

Dell Inspiron 20
3034 1252BLK
Signature Edition

$449.00

$1,347.00

Windows Server
2012 R2 Essentials

$501.00

$501.00

Office 365 Small


Business Premium

1
$150.00
(Yearly Subscription)

$150.00/Year

Symantec Endpoint
Protection 12.1
Small Business
Edition

$30.00/Year

$90.00/Year

Microsoft Azure

12
(Monthly
Subscription)

$5.00

$60.00/Year

Connected Pro
Wireless8-Channel
520 TVL 1TB
Surveillance System

$699.99

$699.99

Sentry Safe Wall


Safe-7150

$139.99

$139.99

Page |6

Motorola -

$132.99

$132.99

$89.99

$89.99

SURFboard eXtreme
DOCSIS 3.0
Wireless-N Cable
Modem and Gigabit
Router - Black

APC Back-UPS 350

Total Costs:

$3,210.96

Organizational Feasibility (Will it be used?):


Project Champion:

Dr. Grant

Senior Management:

Kash Patel, Sophie Peterson, Tom


Randazzo, Joel Ortiz, Zohaib Nasir, Samar
Patel

Users:

Employees, management, and owners

Aligned with business:

Fluently

Implementing this new security system will not only increase customers because it will
be more secure but also will protect the company's capital assets. The new system will insure that
Broadway Cafs customer payment information is more secure. The employees, management,
and owners need to be trained because they will be unfamiliar with the technology and systems.
It will take approximately 2-3 weeks.

Work Breakdown Structure


Task Name

Duration

Start

Finish

Broadway Caf IT
Security

51 days

Tue 3/31/15

Tue 6/9/15

Predecessors

Page |7

Implementation
Getting Started

16 days

Tue 3/31/15

Tue 4/21/15

Create Contract

1 day

Thu 4/16/15

Thu 4/16/15

Create Outline

2 days

Fri 4/17/15

Mon 4/20/15

Task Milestone

0 days

Tue 4/21/15

Tue 4/21/15

5 days

Tue 4/21/15

Mon 4/27/15

Figure our problem


statement

1 day

Tue 4/21/15

Tue 4/21/15

System Request

2 days

Tue 4/21/15

Wed 4/22/15

Project Scope

2 days

Thu 4/23/15

Fri 4/24/15

Task Milestone

0 days

Mon 4/27/15

Mon 4/27/15

Create Feasibility
Analysis

7 days

Fri 5/1/15

Mon 5/11/15

Technical
Feasibility

2 days

Fri 5/1/15

Sat 5/2/15

Economic
Feasibility

3 days

Tue 5/5/15

Thu 5/7/15

Organizational
Feasibility

2 days

Thu 5/7/15

Fri 5/8/15

WBS and Gantt


Chart

1 day

Sun 5/10/15

Sun 5/10/15

0 days

Mon 5/11/15

Mon 5/11/15

5 days

Mon 5/11/15

Fri 5/15/15

1 day

Mon 5/11/15

Mon 5/11/15

1 day

Tue 5/12/15

Tue 5/12/15

18

2 days

Thu 5/14/15

Fri 5/15/15

19

Planning

Task Milestone
Analysis
Electronic and
Physical Threats
Security Policies
Requirements
(Functional and
Nonfunctional)

Page |8

task Milestone

0 days

Fri 5/15/15

Fri 5/15/15

10 days

Mon 5/18/15

Fri 5/29/15

Activity Diagrams

3 days

Mon 5/18/15

Wed 5/20/15

Use-Case Diagrams

2 days

Thu 5/21/15

Fri 5/22/15

23

Class Diagrams

3 days

Sat 5/23/15

Tue 5/26/15

24

2 days

Wed 5/27/15

Thu 5/28/15

25

0 days

Fri 5/29/15

Fri 5/29/15

5 days

Mon 6/1/15

Fri 6/5/15

Anti-Software

1 day

Mon 6/1/15

Mon 6/1/15

Floor Plan

1 day

Wed 6/3/15

Wed 6/3/15

Task Milestone

0 day

Fri 6/5/15

Fri 6/5/15

Implementation

2 days

Mon 6/8/15

Tue 6/9/15

Documentation
Sign-off

1 day

Mon 6/8/15

Mon 6/8/15

Present Project

1 day

Tue 6/9/15

Tue 6/9/15

Task Milestone

0 days

Tue 6/9/15

Tue 6/9/15

Create Diagrams

Deployment
Diagram
Task Milestone
Create GUI

Gantt Chart

17

22

29

28

33

Page |9

Analysis
Threats (physical and electronic)
The most common threats to the security can be technical and physical.
Electronic Threats:

Security Architecture does not exist.


Unpatched Client Software or Applications.
Phishing/Targeted attacks.
Poor Configuration.
Removable media.

P a g e | 10

Cloud Computing.
Physical Threats:

Insider jobs.
Poor passwords.
Insufficient backup recovery.
Improper destruction.
Physical security.

Security Policies
Security policies can make the difference from one day to the next. With technology
being so advanced it is easy for businesses to be hacked and customer information to be lost.
That's why security policies are some of the most important actions to keep up to date. The
security policies that we recommend are
Access Control Policy
This policy is to control and monitor the company's incoming and outgoing traffic through the
network. The policy monitors the company's access to external resources, such as the internet
and the access from other companys resources as well. This helps to keep the network secure.

Password Policy
This policy is to give each user a password to secure all user accounts. It also gives all
requirements of the password such as length and characteristics.

Backup Policy
This policy is stated to secure a backup of all information. It gives all information on the backup
such as how it's stored and for how long.

P a g e | 11

Firewall Policy
This policy is used to control what ports on the network are blocked or allowed. It also tells who
is allowed to be in control of the control console.

Virus incident and security incident


This policy splits up the actions of getting a virus or security issue in 6 steps. Each virus or
security incidents must be
-Prepared
-Identified
-Contain
-Eradicated
-Recovered
-Viewed for lessons learned

Client Update Policy


This policy will allow you to update any customer that hasnt been coming to the coffee shop in
the past year. By updating customers it allows you to get rid of unwanted data which allows you
to be more secure when it comes to fraud.

Server configuration, patch update, and modification policies.


These policies will help insure that your security is constantly up to date. This is because if there
are any bugs associated with the data base it makes it easier for hackers to come in. By fixing the
bugs and keeping close patrol of the server it minimizes risk

P a g e | 12

Requirements (functional and nonfunctional)


1. Functional

Record viruses and security incidents


Update customer and staff information
Delete customer and staff information
Insert customer and staff information
Weekly system audit
2. Nonfunctional
Operational

The system will pair with the existing sales system.


The system will also pair with the company computer
Performance

The system must update every 15 minutes


The system should be running at all times
Network traffic must be monitored
The system will automatically back up each night
The system will run a virus protection
Security

Only managers can access staff information


New password is required every month
The system can only be accessed outside by the owner and control console
The system will be accessed by all administrators
Cultural and political

Company policy restricts access to specific network ports

Activity diagram (As-Is)


After viewing the as-is systems it was easy to tell that the only security measures the
Broadway Caf implemented was out dated. The systems had no signs of any technological
advancements. It mainly consisted of the employee locking the door at night to count down the

P a g e | 13
register. Then once counted they would lock the register and then lock the door behind once the
place was clean and they left.

P a g e | 14

Activity Diagram (To-Be)


The new to-be system implements an online and in store security system. This adds all
the aspects and policies that come with it such as camera security system, anti-virus protection,
system backups, and staff password protection. With these new implementations it will allow an
additional clientele and protection from all future threats from this new addition.

P a g e | 15

P a g e | 16

P a g e | 17

P a g e | 18

P a g e | 19

To-Be Use case diagram

P a g e | 20

P a g e | 21

P a g e | 22

P a g e | 23

Design
Class Diagram

P a g e | 24

Graphical User Interface

P a g e | 25

Microsoft Azure
This graphical user interface (GUI) is made by Microsoft and is a bought backup cloud
service called Microsoft Azure. The GUI for Microsoft Azure shows that it will allow Broadway
Caf to create an annual schedule for backing up their database. As well as keep track of all the
successful and failed backups performed.

P a g e | 26

Symantec Endpoint Protection 12.1 Small Business Edition


The graphical user interface below are for the anti-virus software that will be used in
order to secure the Broadway Caf. The software that we have decided to use is Symantec
Endpoint Protection 12.1 Small Business Edition for 3 User, that last one year. This protection
plan has been completely formed around small businesses. The endpoint protection software lets
you go into specific details when it comes to monitoring your internet security. It allows you to
monitor and maintain a secure small business, by giving you graphical data and keeping logs of
the security issues.

P a g e | 27

P a g e | 28

P a g e | 29

P a g e | 30

P a g e | 31

P a g e | 32

P a g e | 33

P a g e | 34

Windows Navigation Diagram


Microsoft Azure

P a g e | 35

Symantec Endpoint Protection 12.1 Small Business Edition

P a g e | 36

Floor plan

P a g e | 37

P a g e | 38

Deployment diagram

P a g e | 39

Backup Strategy

Network attached storage (NAS)


Upload daily financial information to the cloud to ensure proper back up.
Backup batteries in case of power outage.
Test backup procedures twice a month
Back up video footage

Physical Security
All registers will be secured and can only be opened with a unique employee pin. All

transactions will be monitored on a daily basis to ensure proper accounting for the register.
The shop will be consistently secure even when closed with:
Door gates
Windows with security bars
Security Cameras viewing all angles of the store
Secured Safe in the back office

Safe storage unit in the back office to safe keep money and other company documents
We will have insurance coverage in all major areas. Coverages could include:
Product Liability Insurance
Information System Insurance
Business Income insurance
Hardware/Software insurance

Hardware:

Dell Inspiron 20 3034 1252BLK Signature Edition All-in-One


19.5 HD Touchscreen
4GB Memory with a 500GB 5400 RPM HDD Hard Drive
Intel Celeron N2830 2.16GHz with Intel Burst Technology
Connected Pro Wireless 8-Channel 5200 TVL 1TB Surveillance System with 6 Wireless

Cameras
Indoor/Outdoor Cameras

P a g e | 40

Hard Drive Size 1TB-1.9TB


HDMI Port, Night Vision, USB Connection
APC Back-UPS 350
210 Watts,350VA Input 120V/Output 120V
8 Hours of Recharge Time
Motorola - SURFboard eXtreme DOCSIS 3.0 Wireless-N Cable Modem and Gigabit Router Black
Both Modem and Router Capabilities
Downstream data speeds up to 300 Mbps and upstream data speeds up to 120 Mbps

Software:

Windows Server 2012 R2 Essentials


Logical Processors:320
Physical Memory:4 TB
Virtual processors per host: 2,048

Office 365 Small Business Premium


Can be used on up to 5 PCs or Macs
Offers Word, Excel, PowerPoint, Outlook and Access
1-year subscription and includes 25GB for mailbox
Symantec Endpoint Protection 12.1 Small Business Edition
Microsoft Azure

Appendix

P a g e | 41

CONTRACT AGREEMENT
By: Project Team
Responsibilities

To effectively communicate with one another.


To hold up your portion of the project.
To be willing to help one another.
To respectively address one another with issues or concerns.
To address meeting times and other forms of communications within two days.
To show up at a respectable time when meetings are addressed.
To deliver work on due dates that are assigned.
To give effort in the work that is provided.
To work as a team and provide constructive feedback.

When these responsibilities are disobeyed the team member will be punished. The rest of the
team will agree to a score that will be given to the individuals who have not abided by the
responsibilities listed above.
Roles
Kash Patel
Sophie Peterson
Thomas Randazzo
Joel Ortiz
Samar Patel
Zohaib Nasir

(Planning)
(Planning)
(Leader, Analysis)
(Analysis)
(Design)
(Design)

P a g e | 42
By signing this contract you are stating that you have read and agreed to the terms and conditions of this
team.

Signatures
Print Name:__________________________

Signature:_________________________

Date:_____________

Print Name:__________________________

Signature:_________________________

Date:_____________

Print Name:__________________________

Signature:_________________________

Date:_____________

Print Name:__________________________

Signature:_________________________

Date:_____________

Print Name:__________________________

Signature:_________________________

Date:_____________

Print Name:__________________________

Signature:_________________________

Date:_____________

Sources
Material
http://buy.symantec.com/estore/clp/productdetails/pk/endpoint-protection-small-business-edition
($30.00)
http://www.microsoft.com/en-us/server-cloud/products/windows-server-2012-r2essentials/Purchasing.aspx ($501.00)
http://www.bestbuy.com/site/motorola-surfboard-extreme-docsis-3-0-wireless-n-cable-modemand-gigabit-router-black/9962417.p?id=1218202944998&skuId=9962417 ($132.99)
http://www.microsoftstore.com/store/msca/en_CA/pdp/Dell-Inspiron-20-i3043-1252BLKSignature-Edition-All-in-One/productID.309066800?
tduid=93db187353ed71a137d3a6f2453de11f ($449.00)
http://azure.microsoft.com/en-us/pricing/ ($5.00)
http://www.microsoftstore.com/store/msusa/en_US/pdp/productID.273508300?
VID=277031700&srccode=cii_17588969&cpncode=42-605844042&WT.mc_id=US_datafeed_Google ($150.00)
http://www.homedepot.com/p/Defender-Connected-Pro-Wireless-8-Channel-520-TVL-1TBSurveillance-System-with-6-Wireless-Camera-21312/205068193 ($699.99)
http://www.sentrysafe.com/Products/72/7150_Wall_Safe (139.99)
http://www.apc.com/products/resource/include/techspec_index.cfm?
base_sku=BK350&ISOCountryCode=US&gclid=Cj0KEQjw4qqrBRDE2K_z7Pbvjo8BEiQA39
AImRHBks2ZhKN7dDRJlDmG6Gm_wKlh8oUrsV4gIZHLWOgaAhIf8P8HAQ ($89.99)

P a g e | 43

Nonmaterial
http://www.cohesioncase.com/security/index.html
http://www.comptechdoc.org/independent/security/recommendations/secpolicy.html

Você também pode gostar