Free Essay

It460

In:

Submitted By James8521
Words 1826
Pages 8
1. At a company, you are responsible for securing a network server utilized primarily for data storage and internal application sharing as well as for securing numerous desktop computers connected to the network. Describe the access control that you would put in place for each and explain why.

The more valuable your data, the more effort you should put into securing your firm's network servers. The following areas will help to maintain a server on the network.

Firewall:
It's important to ensure your server's built-in firewall is running and that you are also using at least one level of network firewall. This may be something as simple as a firewall on the router attached to the server.

Placing a server on a network without a firewall is like leaving the front door wide open. Once the firewall is running, the next step is to turn off every port you don't need. If you are not using the port, you don't need it open on the firewall.

Hardening:
Getting the firewall running is only a start. A critical step is "hardening" the system. This is the process of trimming the machine of every piece of software it doesn't need to complete its assigned task. Every single piece of software is going to have an exploit. You want to reduce the machine down to the necessities to increase the security.

This means removing software from the server box. If, for example, the machine is an e-mail server, then delete all office productivity applications, the Web browser, even games and utilities. In short, everything that does not specifically support the server's role should be moved from its location on the network to a safer place internally.

Auditing:
Once you've firewalled and hardened your server, the next step is to check your work for any unknown leaks and weak spots. Software audit tools provide detailed analysis of just how tight you've sealed up your box. The Centre for Internet Security, for example, provides a number of free auditing tools for a wide variety of platforms.

It’s suggested that use Nessus Vulnerability Scanner. This free tool checks for open ports, lists specific exploits and vulnerabilities, and even runs some exploits in an attempt to ferret out weakness in the server set-up.

Ongoing maintenance:
Once the system is secure and running smoothly, keeping the machine under control and free of worms, viruses, and renegade processes requires an ongoing plan of maintenance.

Serious maintenance starts with running intrusion detection software, such as the Open Source Snort. Snort monitors server activity and helps flag suspicious events. Installing updates and patches to the system can create issues with other software running on the machine so check the update details before you update any patch. Keeping the patches on the server operating system up to date is a good idea for dealing with the some of the most obvious flaws. - [1] [2]

2. Generate a message of at least 30 characters. Using a Vigenere cipher key that is at least three letters long, encrypt the message. You should list the initial message, the cipher key chosen, and the encrypted message. Explain how secure you think this message is and justify your reasoning.

Plain Text Input:
Using a Vigenere cipher key that is at least three letters long, encrypt the message. You should list the initial message, the cipher key chosen, and the encrypted messages.

Using the cipher key: TRAYVIN

Cipher text Output:
Njilb i Ibxelzzr vzpfzz xxp tfvb vl rt jzifm khpzm yxktcma yheg, cikergt rcm zxjsybm. Lhl sfjcyw ciqo bux zngoqne deqnitx, khc xqcavr izg pafsci, iaw khc zvpkpprzl zxjsybm.

The cipher key is generated using online tool provided by www.rumkin.com at http://sharkysoft.com/misc/vigenere/

The Vigenère Cipher appears to be unbreakable, due to its use of up to 26 different cipher alphabets. Ciphers that use more than one cipher alphabet, are known as Polyalphabetic Ciphers. These can be incredibly difficult to decipher, because of their resistance to letter frequency analysis. The Vigenère cipher became known as 'Le Chiffre Undechiffrable', or 'The Unbreakable Cipher'. -[3]

It wasn't until 1854, over two hundred years later, that the Vigenère Cipher was finally cracked by the British cryptographer Charles Babbage. Babbage employed a mix of cryptographic genius, intuition and sheer cunning to break the Vigenère Cipher. Amazingly, his work was never published in his lifetime, and it was over a hundred years later, in the 1970's, that his technique was finally made public. - [4][5]

The strength of the Vigenère Cipher is that the same letter can be encrypted in different ways. For example, if the keyword is KING, then every plaintext letter can be encrypted in 4 ways, because the keyword contains 4 letters. Each letter of the keyword defines a different cipher alphabet in the Vigenère Square. The 'e' column of the square is highlighted to show how encipherment depends on which keyword letter is defining the encryption. Similarly, whole words will be enciphered in different ways - the word 'the' could be enciphered as DPR, BUK, GNO and ZRM depending on its position relative to the keyword. Although this makes cryptanalysis difficult, it is not impossible. The important point to note is that if there are only four ways to encipher the word 'the', and the original message contains several uses of the word 'the', then it is inevitable that some of the four possible encipherments will be repeated in the ciphertext. This is demonstrated in this example, in which the line "The Sun and the Man in the Moon", has been enciphered using the Vigenere cipher and the keyword KING.

The word 'the' is enciphered as DPR in the first instance, and then as BUK on the second and third occasions. The reason for the repetition of BUK is that the second 'the' is displaced by 8 letters with respect to the third 'the', and 8 is a multiple of the length of the keyword. In other words, the second 'the' was enciphered according to its relationship to the keyword, and by the time we reach the third 'the', the keyword has cycled round exactly twice, to repeat the relationship. -[6]

3. For the network you have chosen to characterize, identify the forms of security utilized. Be sure to consider physical as well as electronic security. For electronic security, be sure to include items like virus checks, firewalls, and encryption protocols employed in addition to any access controls. Explain how each helps to secure the network.

Antivirus Application:
Antivirus programs are designed to detect and intercept harmful files downloaded to your computer. In order to monitor incoming files, though, antivirus programs--like all applications--need to use system resources.

A variety of strategies are typically employed. Signature-based detection involves searching for known patterns of data within executable code. However, it is possible for a computer to be infected with new malware for which no signature is yet known. To counter such so-called zero-day threats, heuristics can be used. One type of heuristic approach, generic signatures, can identify new viruses or variants of existing viruses by looking for known malicious code, or slight variations of such code, in files. Some antivirus software can also predict what a file will do by running it in a sandbox and analysing what it does to see if it performs any malicious actions.

Firewall:
A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criteria.
Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which inspects each message and blocks those that do not meet the specified security criteria.

Encryption:
An encryption protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods.
A protocol describes how the algorithms should be used. A sufficiently detailed protocol includes details about data structures and representations, at which point it can be used to implement multiple, interoperable versions of a program. Cryptographic protocols are widely used for secure application-level data transport.

4. Two key aspect of the planning phase of the systems development life cycle are to assess needs and to identify project objectives. For the Unit 10 project, you will be developing a proposal for improving or enhancing the network that you have characterized throughout this class. List the needs of those making use of the network you have characterized. Identify a need that is not fully met and explain the problems or deficiencies that exist. List three or more specific project goals which if met would reduce or alleviate these problems or deficiencies.

To achieve the network project goals, need the following requirements.

Server – the network server is a fast performance computer to store data and share network applications to users in the company.

Operating system – Open source powerful and dynamic operating system is requiring in the servers like Ubuntu Linux distribution.

Routers – In network routers are very important to connect different segments of the network. Company network has Cisco 2800 series router which is connected to the company’s headquarter via VPN.

Gathering network features or services requires an understanding of applications, basic traffic flows, and user and site counts. You can use this information to create a logical design and feature set that will help network architects understand requirements such as bandwidth, interface requirements, connectivity, configuration, and physical device requirements.

Creating solution scalability objectives helps you design networks that meet future growth requirements and ensure that proposed designs do not experience resource constraints during expected growth of the network. Resource constraints include overall traffic volume, number of routes, number of virtual circuits (VCs), neighbour counts, broadcast domains, device throughput, media capacity, and a number of other scalability-type parameters.

Setting network management objectives requires an understanding of the support process and associated network management tools. Management objectives include an understanding of how new solutions will fit into the existing support and tool model, with references to any potential differences or new requirements. This step is critical to deployment success, because the ability to support new solutions is key to network availability. - [7] [8]

References:

1. http://technology.inc.com/security/articles/200609/tipsnetworksecurity.html

2. http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci1150483,00.html

3. http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher

4. http://rumkin.com/tools/cipher/vigenere-autokey.php 5. http://www.simonsingh.net/The_Black_Chamber/vigenere_cracking.html

6. http://www-rohan.sdsu.edu/~gawron/crypto/lectures/vigenere.html

7. http://www.cisco.com/en/US/tech/tk869/tk769/technologies_white_paper09186a008014f908.shtml#serve

8. http://thedata.org/book/system-requirements

Similar Documents

Premium Essay

It460

...Unit 2 Assignment Kaplan University IT460 – System Analysis and Design Part 1: Intranet and Competition Jesse, I was able to get into the intranet and got a chance to explore some of the information you’ve made available. In the data section I found a summary of the company’s organization, the training calendar, a script for a typical JAD session, and some sample documents. I also looked through the company forms such as our Service Request, Report Analysis, and Documentation forms. Finally I looked through the resources library which seems to contain the tools and vendors that the company uses. I can see how this will be an invaluable tool for my work here. As you requested I found three other IT consulting firms that may be of interest. The first I looked at is ClearPointe, who primarily focuses on Microsoft System Center and NOC services. They provide managed services for systems such as Active Directory, Exchange, and Lync. The next company I found is Complete Computing. They provide managed Microsoft services like ClearePoint, but also have a strong training and support side. The last company I looked at is Cireson. They focus on System Center and automation consulting. All three companies focus heavily on Microsoft systems, with Complete Computing seeming to be the most well rounded in their service offerings. Thanks, Kyle Part 2: TIMS Scope The Training Information Management System (TIMS) will be an online system to facilitate online courses. It will need...

Words: 448 - Pages: 2

Premium Essay

It460

...SRC Cynthia Arenas Rhonda Chicone 09/30/14 On the SCR intranet, visit the data, forms, and resources libraries and review a sample of the information in each library. For your assignment, begin with a sentence indicating that you have successfully entered the SCR website. Complete this section with a summary of the items that you found in the website. I went on this site and there was a lot of information like a data Library and two other Libraries like the form library and resource and an SCR Internet Site then for each session 1-12 they had the inbox and Voice Mail and an To Do List to let you know what needs to be done. Jesse says that SCR has plenty of competition in the IT consulting field. Get on the Internet and find three other IT consulting firms. She wants a description of each Firm in your own words and the services offered by each. 1. McKinsey & Company- they are known for their experience in business information and for their amazing recruitment and all of their senior management issues. 2. Bain & Company-They are known for working with some of the worlds biggest companies and even a lot of non-profit organizations. 3. Booz & Company-This company so known for their working with Hollywood movies and also DNA concepts. Draft a Assignment scope statement for the TIMS system and describe the constraints. She said be specific. The author does a very good job providing examples of both good and bad scope statements. Design Project Scope-You...

Words: 552 - Pages: 3

Free Essay

It460 Unit1

...SLDC vs. JAD vs. RAD Methodologies of Software Development Kaplan University IT460 – System Analysis and Design From my reading I learned that Software Development Life Cycle (SDLC) follows a pretty general process that is used by a lot of project managers. The whole purpose of SDLC is to create a better product than is planned for while meeting time and cost figures (Tutorials Point). the Chief Information Officer (CIO) asked to look at a couple of methodologies. The two methodologies are JAD (Joint Application Development) and RAD (Rapid Application Development). JAD (Joint Application Development) is a methodology where you use the client and end users at different points during the project (Rouse, 2007). By using this methodology some of the advantages are that in a short time frame you can gather and consolidate a big amount of information. Another benefit is that you can look at many points of view on the project and can resolve discrepancies in a timely manner (n.d.). Some disadvantages of JAD (Joint Application Development) it takes a lot of planning and scheduling and this will also require a lot of time from the stakeholders. Another disadvantage is that people that are working on the project have to be trained and experienced with what the project requires. RAD (Rapid Application Development) is a methodology that is focused on producing software quickly. This is done by using prototypes that have been established before and uses tools that are...

Words: 628 - Pages: 3

Premium Essay

It460 Unit 3

...Unit 3 Assignment Kerry Bridges Kaplan University IT460 Unit 3 Assignment ITEM 1 – INTERVIEW PROCESS: 1. Determine the people to interview To obtain the information I am looking for, I will need to interview key members of the organization. These members will need to be knowledgeable of their respective positions. I believe it would be best to talk to the department heads and their middle managers. I will also interview people on all levels in the organization. I will also interview multiple people in the same department. My reasoning for this is that everyone has their own strengths and specializations. 2. Established the interview objectives After determining the people to interview, I will establish the interview objectives for the session. I will determine the main topics to be discussed and come up with a list of questions and concerns. I aim to obtain ideas, suggestions, and opinions during the interviews. There will general questions asked to every person in their field. By establishing the objectives I will create the guidelines that will help to determine what questions are needed to ask. These guidelines will also determine how the interview will flow. 3. Develop Interview Questions I will create a baseline for the list of question. This will ensure that the interview proceeds smoothly and that the people being interviewed stays on topic. The questions will be specific to the topic. I want to make sure that the questions are both open-ended...

Words: 1388 - Pages: 6

Premium Essay

It460 Unit 3

...Unit 3: SDLC Phase Natasha Joseph Kaplan University Professor Michael Renick IT460: System Analysis and Design July 20, 2013 Unit 3: SDLC Phase In the past Jesse and the team considered using a JAD session to gather requirements but this time around the decision has been made to gather the requirements through an interview process. An interviewing process is a fact finding tool used to obtain information from another person, however to be successful at interviews you must possess the “skills needed to conduct, plan and evaluate interviews successfully” (Cashman. Pg155). The team assumes that the interview process will give them a great start. This paper will give Jessie an outline of what processes will be followed to ensure that the interviewing process is successful; a list of team members to be interviewed as well as their job function within the company will be provided along with interview questions for each person. The end product will be a summary of how I will publish the results. Question 1 The processes that I will follow to ensure that the interviewing process will be successful are as follows: 1. Determine the people to interview: In other to determine the people to interview you have to consider the work that you need done. Selecting the right person to interview and asking them the right questions can be a plus because you need as much information as possible to make your project successful 2. Establish objectives for the...

Words: 1592 - Pages: 7

Premium Essay

It460 U2 Assign

...Table of Contents Assignment – Part A 3 Section 1: 3 Section 2: 5 Assignment –Part B 7 Section 1: 7 Section 2: 8 References 10 Assignment – Part A Section 1 – Site Breakdown: The SCR website has been entered and reviewed with the following acknowledgement and understanding applicable to the corporate request conducted by Jesse: • The data library includes essential corporate information including personnel records within each subset identified below: o SCR Function and Organizations - This includes senior management, as well as existing groups with assigned personnel and, applicable objectives and missions associated with these groups. o SCR Training Records (2-months) - Shows training data with personnel contact information for past two month time period. o JAD Session Example - Outlines effective utilization and employment of JAD team members through correspondence and brainstorming of techniques and processes for efficiency honing. o Cost - Benefit Summary- Outlines potential impact associated with salaries, training, supplies and misc. in conjunction with earned revenue to establish baseline for potential profit achievements and ROI possibilities. o Sample of Questionnaire Results - Establishes sample questionnaire for students taking courses to include, top classes and applicable rating trends associated with classes achieved by instruction presenters...

Words: 1612 - Pages: 7

Free Essay

It460 Unit 2

...As the Chief Information Officer, it is important to distinguish the advantages and disadvantages for different application methodologies. Since the company does not want to remain with SDLC, I am required to recommend either Joint Application Development (JAD) or Rapid Application Development (RAD). Therefore, I will provide information and allow the company president to make a decision based upon my research. JAD is a methodology that uses the design and development processes of an application. It is an information gathering technique used to design and develop computer-based systems. RAD is a shorter version of JAD; it reduces the time taken to develop an application (UMSL, 2014). The disadvantages of JAD are actually strengthening to a project; they just require a lot of accuracy. JAD require significant planning and scheduling to ensure the project is on task in correlation to the project plan. Furthermore, it involves much time and effort of stakeholders. For a successful project, JAD demands experienced and trained personnel (Directutor, 2010). On the contrary, the advantages of JAD are very relaxed and unrushed. It allows time for the gathering and reviewing large amounts of information. In result, high quality work may be produced. Discrepancies can be properly handled. Finally, team communication is increased. Overall, time is the number one advantage associated with JAD (Directutor, 2010). The disadvantages of RAD software development are that it should not...

Words: 604 - Pages: 3

Premium Essay

It460 Unit 9 Assignment

...Denise Figueroa IT460 System Analysis and Design Professor Heith Hennel Unit 9 Assignment October 27, 2015 We will be creating a test plan for the SCR TIMS project that will use only the related items of the SCR TIMS network. This plan will address the testing strategies and all the quality requirements. There will be a testing plan that will exist of four different levels. These different levels will include the System, Acceptance, Unit and Integration. We will start off with the test items that will be included: • Server Machine • Network Communication • Disk Arrays • Client Machines 1. Executives 2. Administrators 3. Project Managers 4. Systems 5. Business Solutions Network • Firewalls • Printers • Faxes • Scanners Our...

Words: 626 - Pages: 3

Premium Essay

Scr Tims

...Assignment Grading Rubric Course: IT460 Unit: 10 Points: 140 Assignment 10 Outcomes addressed in this activity:  Complete final assignment Course Outcomes:   IT460-1 Compare various types of information systems. IT460-4 Practice team dynamics by participating in a role play activity. Assignment Instructions: Please complete the following assignments using MS Word. Save the assignment as Final Assignment.doc and place it into the Unit 10 Final Assignment Drop Box. Ensure all group members have checked the final assignment before it is submitted. Submit only one Final Assignment per group. Click here to access the “SCR-TIMS Work Session Link”. Part 1: System Architecture Tasks 1. Visit SCR's data library to review SCR's network configuration and then send Jesse a recommendation for the TIMS system architecture. She wants me to suggest an overall network topology solution. She also asked me to comment on these issues: legacy data, Web-centricity, scalability, security, and batch processing that might be needed. Jesse said it was OK to make reasonable assumptions in my proposal to her (SCR-TIMS, Work Session, Session 10,- To Do List #2). This includes providing a detailed description of a client/server architecture. Assignment should also show distinction between 2 tier and 3 tier network and select one for recommendation. A detailed analysis of network topology includes definition and what is being proposed for the client. Assignment should give a definition of what...

Words: 1330 - Pages: 6

Premium Essay

Unit 10

...Assignment Grading Rubric Course: IT460 Unit: 10 Points: 140 Assignment 10 Outcomes addressed in this activity:  Complete final assignment Course Outcomes:   IT460-1 Compare various types of information systems. IT460-4 Practice team dynamics by participating in a role play activity. Assignment Instructions: Please complete the following assignments using MS Word. Save the assignment as Final Assignment.doc and place it into the Unit 10 Final Assignment Drop Box. Ensure all group members have checked the final assignment before it is submitted. Submit only one Final Assignment per group. Click here to access the “SCR-TIMS Work Session Link”. Part 1: System Architecture Tasks 1. Visit SCR's data library to review SCR's network configuration and then send Jesse a recommendation for the TIMS system architecture. She wants me to suggest an overall network topology solution. She also asked me to comment on these issues: legacy data, Web-centricity, scalability, security, and batch processing that might be needed. Jesse said it was OK to make reasonable assumptions in my proposal to her (SCR-TIMS, Work Session, Session 10,- To Do List #2). This includes providing a detailed description of a client/server architecture. Assignment should also show distinction between 2 tier and 3 tier network and select one for recommendation. A detailed analysis of network topology includes definition and what is being proposed for the client. Assignment should give a definition of what...

Words: 1330 - Pages: 6

Free Essay

Recomandation Help Desk

...Assignment Grading Rubric Course: IT460 Unit: 9 Points: 40 Assignment 9 Outcomes addressed in this activity:      Discuss the systems operation, support, and security phase Describe the different system maintenance types and their importance Critique different backup and disaster recovery options Identify factors that signal the end of the useful life of an information system Discuss future challenges for IT professionals as technology reshapes the workplace Assignment Instructions: IT460:1-Compare various types of information systems. Please complete the following assignments using MS Word. Save the assignment as Unit 9 Assignment.doc and place it into the Unit 9 Assignment Drop Box. Click here to access the “SCR-TIMS Work Session Link”. Jesse wants a recommendation about an SCR help desk. She said that I can get more information on the Internet. She wants any input by early next week. She said there's lots of information out there on this topic. She wants me suggest a plan for creating an SCR help desk (SCR –TIMS Worksession, Session 12, To Do List, #1). Assignment requirements:     Plan submitted that discusses what a helpdesk offers Discusses internal support options Discusses external support options and shows sample vendors and their options Makes recommendation that details which option is being recommended and why 40 point assignment grading rubric Assignment Requirements Maximum points Points earned 1. Detailed Plan submitted that discusses what...

Words: 328 - Pages: 2

Premium Essay

Working with Scr Associates

...Working with SCR Associates Cheryl Mitchell Kaplan University IT460-01 Systems Analysis and Design Unit 9 Assignment Abstract Please complete the following projects using MS Word. Save the project as Unit 9 Project.doc and place it into the Unit 9 Project Drop Box. Click here to access the “SCR-TIMS Work Session Link”.   Jesse wants a recommendation about an SCR help desk. She said that I can get more information on the Internet. She wants any input by early next week. She said there's lots of information out there on this topic. She wants me suggest a plan for creating an SCR help desk (SCR –TIMS Work session, Session 12, To Do List, #1).   Unit 9 Assignment: Working with SCR Associates. Please complete the following projects using MS Word. Save the project as Unit 9 Project.doc and place it into the Unit 9 Project Drop Box. Click here to access the “SCR-TIMS Work Session Link”. Jesse wants a recommendation about an SCR help desk. She said that I can get more information on the Internet. She wants any input by early next week. She said there's lots of information out there on this topic. She wants me suggest a plan for creating an SCR help desk (SCR –TIMS Work session, Session 12, To Do List, #1). RECOMMENDATION FOR HELP DESK A Help Desk is a centralized resource that is normally staffed by IT professionals who provide users with the support they need to do their jobs more effectively. Help Desks do not replace IT maintenance and support activities,...

Words: 611 - Pages: 3

Free Essay

Unit 4 Project

...IT460 Unit 4 Assignment Dwayne M Sullivan Kaplan University Context Level Diagram This context diagram shows the scope and boundaries of the Training Information Management System. In this diagram, we see that the central process, which is the TIMS, will interact with six entities, which include the corporate client, the training administrator, the instructor, the student, the course, and the accounting system. Moreover, the interaction among these entities will involve six different data flows. The corporate client will be provided a training summary. The training administrator will receive training reports and will supply schedule decisions. The instructor will supply completion data and receive a class roster and course assignments. The accounting system will receive data regarding accounting. The course will receive course data from and supplied data back to the system. The student will request courses. When their request is processed, they will receive a confirmation and an invoice. The student can then submit a payment. Level 0 Diagram The training administrator will submit schedule decisions which are processed by the manage course scheduling process. The course management scheduling process will supply information about the course offered. This information might include course times, schedules, descriptions and so forth. The manage course scheduling process will also receive information from the courses. The Manage Course Scheduling process...

Words: 694 - Pages: 3

Premium Essay

Student of Fortune

...IT460 Unit 4: ERP Vendor Recommendation and Structure Chart <<University Name>> <<Course>> Introduction - This project is divided into two tasks, Project A and B. In project A, I will browse through four ERP solutions vendor’s website and will summarize their offering. I will also recommend one of them and try and justify my recommendation. In project B, I will create a structure chart of the TIMS project. Part A – SAP Vendor Evaluation Analysis and review of four ERP vendors are performed to discuss about offerings and solution benefits. We will also try and choose one of the vendors that would meet needs of TIMS system. The vendors we will be looking at are SAP, Oracle, Microsoft and Sage. SAP - SAP is one of the leading ERP solutions providers in the industry. SAP ERP, which is a part of the SAP business suite, is mainly divided into four major groups as stated on their ERP homepage. The first is SAP ERP Financial. This solution helps organizations in automating financial and management accounting. The module also helps organization also helps organizations to follow corporate governance mandates easily with extensive support. The second module is SAP HCM or Human Capital Management. This module, which supports organizations of almost any size, enables organizations to automate several human resource related activities like workforce management and other HR processes. The third solution is for Operations. This tool enables organizations to...

Words: 796 - Pages: 4

Premium Essay

The Interviewing Process

...The Interviewing Process Bob Stevens IT460-01 The Interviewing Process The first step in an interviewing process is to determine the people to interview. It is important to interview people from the formal organization chart, as well as any informal structures (Rosenblatt & Shelly, 2011). Jesse wants me to include people from this informal structure. Jesse has made it clear that she wants me to interview some former students, as well as some prospective students. I will want as good of a sample as possible, so I will be interviewing at least 10 former students and at least 10 prospective students. However, in addition to interviewing the people who will be taking part in the class I think it’s important to interview anyone who will be implementing these IT classes. Here’s who I had in mind: Meg Harris and Roy Brown – Corporate Trainers. Obviously, our trainers are going to have some input on how best to proceed and how best to teach different subject matters. They also need to let us know which courses they are qualified to teach and which ones they aren’t qualified to teach. If they’re not qualified, we need to make sure they can get qualified. Natalie Ward and Sam Esposito – Systems Analysts. It would be difficult to imagine moving forward on this project without getting some input from our systems analysts. They should be able to help with logistics and some of the details needed for this training center. Lyle Newhart and Dawn Hill – Network Engineers. I figured...

Words: 964 - Pages: 4