Escolar Documentos
Profissional Documentos
Cultura Documentos
Security
Group 3:
Kash Patel
Sophie Peterson
Tom Randazzo
Joel Ortiz
Zohaib Nasir
Samar Patel
Page |1
Table of Contents
Planning - Kash Patel, Sophie Peterson
Problem Statement.2
Systems Request2-3
Project Scope.3-4
Feasibility Analysis4-7
Work Breakdown Structure7-8
Gantt Chart..9
Analysis - Joel Ortiz, Tom Randazzo
Threats (physical and electronic).9-10
Security Policies...10-12
Requirements (functional and nonfunctional)..12-13
Activity Diagram (As-Is, To-Be)..13-18
Use Case Diagram19-22
Design - Zohaib Nasir, Samar Patel
Class Diagram...23
Graphical User Interface...24-30
Windows Navigation Diagram.31-32
Floor Plan..33
Deployment Diagram.34
Backup Strategy.35
Physical Security35-37
Appendix
Contract38
Sources.39
Page |2
Planning
Problem Statement
Security has been an ongoing problem for the Broadway Caf due to the lack of
technological upgrades performed over the years. Problems such as vandalism, stolen equipment,
and customer personal information have been the main issues. The Caf must be brought into the
21st century, which will give it the technical advancements it needs to control the main issues.
This will involve adding cameras to the floor plan. As well as installing an internet security
system to keep out advanced criminals. Since today crime is not only done at the organization
but throughout the internet.
What the systems will intend to do is upgrade and reengineer the steps that the security
system will take. There will be a third party that will come and set up the security system for the
Broadway Caf and teach the organization to use it. The system will aim to stop all theft and
protect the organization from internal and external threats.
Systems Request
Project Sponsor Broadway Caf Owner
Business Need
Customer Satisfaction
Business Management
Asset Security
Identity Protection
Page |3
Special Issues or
1. Limited to what anti-virus offers.
Constraints
2. Blind spots in camera locations
Project Scope
Project Title: Broadway Caf IT Security Implementation
Start Date: 3/31/15
Team Members:
Kash Patel
Sophie Peterson
Tom Randazzo
Joel Ortiz
Zohaib Nasir
Samar Patel
Purpose: The goal of this project is to implement a modern day security system to the
Broadway Caf. So that we can aim to minimize internal and external crimes such as
vandalism, stolen equipment, and customer personal information.
Justifications: The Broadway Cafs systems have been outdated and easy to breach. In order
to protect the customers and staff, from identity theft and physical harm. As well as minimize
the rise in internal and external crimes. The system must be revamped.
Deliverables:
A network security system that involves the use of firewall protection, virus protection, a
A physical security system that records human interaction inside and outside the Broadway
Caf.
Page |4
New security policies that regulate the system to create a more secure environment.
Assumptions:
Stakeholders:
Customers
Project Sponsor
All those who are also involved or affected by the actions of the Broadway Caf
Feasibility Analysis
The implementation of this new security system will help protect Broadway Caf from
potential security breaches. It is important that Broadway Caf has a strong security system that
will protect the caf from unauthorized access and misuse. The security system will not only give
Broadway Caf a competitive advantage but will also decrease the risk of their customers
information getting hacked. This new security system will secure customer records and financial
information.
Page |5
The overall risk of the project is low due to the long term costs being low compared to
the high benefits of implementing this security system. This is a medium sized project because
there is little to no current security system. Broadway Caf is unfamiliar with the technology
needed so there will need to be a hiring of IT experts to design and install the security system.
Quantity
Price/Unit
Total Costs
Dell Inspiron 20
3034 1252BLK
Signature Edition
$449.00
$1,347.00
Windows Server
2012 R2 Essentials
$501.00
$501.00
1
$150.00
(Yearly Subscription)
$150.00/Year
Symantec Endpoint
Protection 12.1
Small Business
Edition
$30.00/Year
$90.00/Year
Microsoft Azure
12
(Monthly
Subscription)
$5.00
$60.00/Year
Connected Pro
Wireless8-Channel
520 TVL 1TB
Surveillance System
$699.99
$699.99
$139.99
$139.99
Page |6
Motorola -
$132.99
$132.99
$89.99
$89.99
SURFboard eXtreme
DOCSIS 3.0
Wireless-N Cable
Modem and Gigabit
Router - Black
Total Costs:
$3,210.96
Dr. Grant
Senior Management:
Users:
Fluently
Implementing this new security system will not only increase customers because it will
be more secure but also will protect the company's capital assets. The new system will insure that
Broadway Cafs customer payment information is more secure. The employees, management,
and owners need to be trained because they will be unfamiliar with the technology and systems.
It will take approximately 2-3 weeks.
Duration
Start
Finish
Broadway Caf IT
Security
51 days
Tue 3/31/15
Tue 6/9/15
Predecessors
Page |7
Implementation
Getting Started
16 days
Tue 3/31/15
Tue 4/21/15
Create Contract
1 day
Thu 4/16/15
Thu 4/16/15
Create Outline
2 days
Fri 4/17/15
Mon 4/20/15
Task Milestone
0 days
Tue 4/21/15
Tue 4/21/15
5 days
Tue 4/21/15
Mon 4/27/15
1 day
Tue 4/21/15
Tue 4/21/15
System Request
2 days
Tue 4/21/15
Wed 4/22/15
Project Scope
2 days
Thu 4/23/15
Fri 4/24/15
Task Milestone
0 days
Mon 4/27/15
Mon 4/27/15
Create Feasibility
Analysis
7 days
Fri 5/1/15
Mon 5/11/15
Technical
Feasibility
2 days
Fri 5/1/15
Sat 5/2/15
Economic
Feasibility
3 days
Tue 5/5/15
Thu 5/7/15
Organizational
Feasibility
2 days
Thu 5/7/15
Fri 5/8/15
1 day
Sun 5/10/15
Sun 5/10/15
0 days
Mon 5/11/15
Mon 5/11/15
5 days
Mon 5/11/15
Fri 5/15/15
1 day
Mon 5/11/15
Mon 5/11/15
1 day
Tue 5/12/15
Tue 5/12/15
18
2 days
Thu 5/14/15
Fri 5/15/15
19
Planning
Task Milestone
Analysis
Electronic and
Physical Threats
Security Policies
Requirements
(Functional and
Nonfunctional)
Page |8
task Milestone
0 days
Fri 5/15/15
Fri 5/15/15
10 days
Mon 5/18/15
Fri 5/29/15
Activity Diagrams
3 days
Mon 5/18/15
Wed 5/20/15
Use-Case Diagrams
2 days
Thu 5/21/15
Fri 5/22/15
23
Class Diagrams
3 days
Sat 5/23/15
Tue 5/26/15
24
2 days
Wed 5/27/15
Thu 5/28/15
25
0 days
Fri 5/29/15
Fri 5/29/15
5 days
Mon 6/1/15
Fri 6/5/15
Anti-Software
1 day
Mon 6/1/15
Mon 6/1/15
Floor Plan
1 day
Wed 6/3/15
Wed 6/3/15
Task Milestone
0 day
Fri 6/5/15
Fri 6/5/15
Implementation
2 days
Mon 6/8/15
Tue 6/9/15
Documentation
Sign-off
1 day
Mon 6/8/15
Mon 6/8/15
Present Project
1 day
Tue 6/9/15
Tue 6/9/15
Task Milestone
0 days
Tue 6/9/15
Tue 6/9/15
Create Diagrams
Deployment
Diagram
Task Milestone
Create GUI
Gantt Chart
17
22
29
28
33
Page |9
Analysis
Threats (physical and electronic)
The most common threats to the security can be technical and physical.
Electronic Threats:
P a g e | 10
Cloud Computing.
Physical Threats:
Insider jobs.
Poor passwords.
Insufficient backup recovery.
Improper destruction.
Physical security.
Security Policies
Security policies can make the difference from one day to the next. With technology
being so advanced it is easy for businesses to be hacked and customer information to be lost.
That's why security policies are some of the most important actions to keep up to date. The
security policies that we recommend are
Access Control Policy
This policy is to control and monitor the company's incoming and outgoing traffic through the
network. The policy monitors the company's access to external resources, such as the internet
and the access from other companys resources as well. This helps to keep the network secure.
Password Policy
This policy is to give each user a password to secure all user accounts. It also gives all
requirements of the password such as length and characteristics.
Backup Policy
This policy is stated to secure a backup of all information. It gives all information on the backup
such as how it's stored and for how long.
P a g e | 11
Firewall Policy
This policy is used to control what ports on the network are blocked or allowed. It also tells who
is allowed to be in control of the control console.
P a g e | 12
P a g e | 13
register. Then once counted they would lock the register and then lock the door behind once the
place was clean and they left.
P a g e | 14
P a g e | 15
P a g e | 16
P a g e | 17
P a g e | 18
P a g e | 19
P a g e | 20
P a g e | 21
P a g e | 22
P a g e | 23
Design
Class Diagram
P a g e | 24
P a g e | 25
Microsoft Azure
This graphical user interface (GUI) is made by Microsoft and is a bought backup cloud
service called Microsoft Azure. The GUI for Microsoft Azure shows that it will allow Broadway
Caf to create an annual schedule for backing up their database. As well as keep track of all the
successful and failed backups performed.
P a g e | 26
P a g e | 27
P a g e | 28
P a g e | 29
P a g e | 30
P a g e | 31
P a g e | 32
P a g e | 33
P a g e | 34
P a g e | 35
P a g e | 36
Floor plan
P a g e | 37
P a g e | 38
Deployment diagram
P a g e | 39
Backup Strategy
Physical Security
All registers will be secured and can only be opened with a unique employee pin. All
transactions will be monitored on a daily basis to ensure proper accounting for the register.
The shop will be consistently secure even when closed with:
Door gates
Windows with security bars
Security Cameras viewing all angles of the store
Secured Safe in the back office
Safe storage unit in the back office to safe keep money and other company documents
We will have insurance coverage in all major areas. Coverages could include:
Product Liability Insurance
Information System Insurance
Business Income insurance
Hardware/Software insurance
Hardware:
Cameras
Indoor/Outdoor Cameras
P a g e | 40
Software:
Appendix
P a g e | 41
CONTRACT AGREEMENT
By: Project Team
Responsibilities
When these responsibilities are disobeyed the team member will be punished. The rest of the
team will agree to a score that will be given to the individuals who have not abided by the
responsibilities listed above.
Roles
Kash Patel
Sophie Peterson
Thomas Randazzo
Joel Ortiz
Samar Patel
Zohaib Nasir
(Planning)
(Planning)
(Leader, Analysis)
(Analysis)
(Design)
(Design)
P a g e | 42
By signing this contract you are stating that you have read and agreed to the terms and conditions of this
team.
Signatures
Print Name:__________________________
Signature:_________________________
Date:_____________
Print Name:__________________________
Signature:_________________________
Date:_____________
Print Name:__________________________
Signature:_________________________
Date:_____________
Print Name:__________________________
Signature:_________________________
Date:_____________
Print Name:__________________________
Signature:_________________________
Date:_____________
Print Name:__________________________
Signature:_________________________
Date:_____________
Sources
Material
http://buy.symantec.com/estore/clp/productdetails/pk/endpoint-protection-small-business-edition
($30.00)
http://www.microsoft.com/en-us/server-cloud/products/windows-server-2012-r2essentials/Purchasing.aspx ($501.00)
http://www.bestbuy.com/site/motorola-surfboard-extreme-docsis-3-0-wireless-n-cable-modemand-gigabit-router-black/9962417.p?id=1218202944998&skuId=9962417 ($132.99)
http://www.microsoftstore.com/store/msca/en_CA/pdp/Dell-Inspiron-20-i3043-1252BLKSignature-Edition-All-in-One/productID.309066800?
tduid=93db187353ed71a137d3a6f2453de11f ($449.00)
http://azure.microsoft.com/en-us/pricing/ ($5.00)
http://www.microsoftstore.com/store/msusa/en_US/pdp/productID.273508300?
VID=277031700&srccode=cii_17588969&cpncode=42-605844042&WT.mc_id=US_datafeed_Google ($150.00)
http://www.homedepot.com/p/Defender-Connected-Pro-Wireless-8-Channel-520-TVL-1TBSurveillance-System-with-6-Wireless-Camera-21312/205068193 ($699.99)
http://www.sentrysafe.com/Products/72/7150_Wall_Safe (139.99)
http://www.apc.com/products/resource/include/techspec_index.cfm?
base_sku=BK350&ISOCountryCode=US&gclid=Cj0KEQjw4qqrBRDE2K_z7Pbvjo8BEiQA39
AImRHBks2ZhKN7dDRJlDmG6Gm_wKlh8oUrsV4gIZHLWOgaAhIf8P8HAQ ($89.99)
P a g e | 43
Nonmaterial
http://www.cohesioncase.com/security/index.html
http://www.comptechdoc.org/independent/security/recommendations/secpolicy.html