Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 18

ITBS Final Presentation

“Must be mobile”

Table Of Contents

Executive Summary

This project is to determine a system of upgrades to an existing business’s infrastructure. Our


plan is to invest in new and improved technologies to improve productivity, and thereby
enhance the company’s bottom line. This will require an investment in capital, but in the long
run will improve the profit margin.
Business Problem
-Identification
Business Problem
-Justification
Goals and Objectives

Our goal is to enhance the company’s available technology and upgrade all systems, as well as
provide a field charging station, and to secure our infrastructure.
Strategic Goals Alignment
Option Identification
-First Option
Option Identification
-First Option
(Scope)
Option Identification
-Second Option
Option Identification
-Second Option
(Scope)
Project Overview
-Activities
Project Overview
-Required Resources
Project Overview
-Schedule
Cost Estimation

Our estimation for the cost of this project


Evaluation Criteria
Recommendation
Recommendation
-Risks
Sources

(This is all the research you guys did)

so, I went the idea to just replace or the old devices with new devices because it'll last longer
down the road so for the phones, I went with an iPhone Xs for everyone which cost about 500-
600. For laptops i went with apple 2017 version with these laptops you can bootcamp them and
make them windows 10 as well. these cost about 800-900. being that the company needs ios
apps as well i chose to use everything apple because you can get android apps on an apple
phoneLastly for hotspots i chose at&t after comparing them all because their hotspots you can
hold more people than normal. about 4-5 people per hotspot without any major disruptions on
the servers because it has 5g. The price is 35/monthly. 

Budget wise for these products were looking at about 300k

links to products

apple.com
att.com

Provide administrative rights on the laptops while still ensuring the security of the production network.
It is crucial that we provide the right amount administrative rights because it will help them with there
business. What I found I that if the user isn’t super familiar with administrative user that can cause a
huge issue with important data getting out. They also have to make sure that everything is encrypted
with a two-step authentication because that is going to provide the highest amount of security for our
business users. When it comes to the network aspect to it, we have to very careful because if they are
on a wi-fi network that poses the biggest threat because if they are unsecured someone could take over
their laptop and see all of their super important files they looking at and take that information and leak
it. We also have to make the user understands the risk if there are not careful with their business
information when they don’t follow protocol Security Risks within the software. The most important
aspect here is that we must ensure that we keep the integrity of the software because they need to
make sure again, they are familiar with the software and what they need to know to keep safe. Also, we
need to make sure they don’t use the software for the wrong intentions either because I if that happens
then we would need to take there access away from the software. The other risk we have to worry
about is that hackers also pose a threat because they have bad intentions and can do very devastating
things to the software. The other important aspect of this is to get them to understand we are trying to
make this super secure for their benefit so it doesn’t affect their business and also, they don’t lose super
important data to get their job done.

BatPower ProE 2 ES7B 98Wh MS Surface Power Bank for Surface Pro X 7 6 5 4 3 2
RT Go Surface Book 3 2 1 External Battery Surface Laptop 3 2 1 Portable Charger,
USB QC Fast Charging Tablet Smartphone 
Price of the power bank-  $129.99 
I have chosen this power bank for each person. if they have it in the field they could do
the charging all their devices without power connection. 

Make use of a program that will encrypt your video files directly so you don’t
need to encrypt entire hard disks and drives. Most of these programs are simple
to use and don’t cost very much. 

If you use video observation in your line of work, consider upgrading to a


professional system that automatically encrypts data and protects access with
state-of-the-art security. The Video Audio Learning Tool (VALT) from
Intelligent Video Solutions is a top pick for companies in fields that require
extended security for confidential videos. 
All of your devices should be password-protected. If you have biometric
security capabilities (like facial recognition or fingerprint recognition), turn
those features on. Even if you never access your company’s confidential data
from your phone, you might have email discussions that would expose your
credentials or confidential URLs. 
One way to make data unnoticeable on your machine is to use a program to hide
your files. Certain software can be used to create hidden volumes on your hard
drive that only you know how to access. 
Another option is to use software to disguise your video files as another filetype.
For example, you can make your video files look like JPGs or even PowerPoint
files. 

You might also like