Project: Verbania Inc. Social Media IT Solution - System Development

Verified

Added on  2020/05/16

|61
|15667
|46
Project
AI Summary
This project report provides a comprehensive IT solution for Verbania Inc.'s social media platform. It begins with an analysis of system requirements, including user accounts, discussion forums, search capabilities, and game/calendar components. The report outlines a high-level implementation plan, detailing phases such as initialization, execution, testing, and training/documentation, along with a detailed work breakdown structure (WBS). Specific and detailed requirements are presented, encompassing user roles, network infrastructure, website interface, database design, and hardware/software specifications. The report recommends a star topology for the corporate network and includes a high-level network diagram with an explanation of access. The system analysis section further explores corporate network topology recommendations, highlighting the advantages of star topology. The project aims to develop an effective and improved social media site and application, addressing Verbania Inc.'s needs through systematic development and network architecture.
Document Page
Running head: VERBANIA INC. SOCIAL MEDIA IT SOLUTION 1
Verbania Inc. Social Media Information Technology (IT) Solution
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 2
TABLE OF CONTENTS
Section 1: Planning and System Requirements...............................................................................4
Section 2: System Analysis...........................................................................................................13
Section 3: System Design..............................................................................................................20
Section 4: System Development....................................................................................................33
Section 5: System Implementation and Maintenance....................................................................47
References......................................................................................................................................56
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 3
SECTION 1: PLANNING AND SYSTEM REQUIREMENTS
The website deployment has become important for the deployment of the improved
processes and the formation of the profound development method (Holland, 2016). The
deployment of the operations would be formed for carrying out the modification of the website
development. The software development would allow the implication of the profound system
integration. The deployment of the operations would result in forming the improved functional
analysis.
The following assignment would be formed for analyzing the requirements of the system
development. The integration system analysis would be formed for carrying out the development
of the social website. The high-level plan would be implied for developing the improved
functional schedule for the implementation of the social media website.
Pertinent Requirements of Verbania Inc.
The pertinent requirements of the social media website development would include the
tools, software, and other requirements of the project (John & Swapna, 2017). The deployment
of the functions would allow the development of the project. The requirements of the
organization are,
Creation of user account: The first requirement of Verbania Inc. is the development of
user account and profile on the website for ensuring the collection of the data and information
about the customers. The website developed would require the identification of the user and
collecting the data of the customers on a single website. When the customers would login at the
website, the information and data entered at the website for making the profile would be stored
in an integrated database that would result in forming the modification of the user accounts.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 4
Creation of Discussion Forums and Posting: The discussion forums and posting would
be formed for developing the improved communication with the customers. According to Thum
et al. (2014), the various discussion forums and posts would help the customers for conveying
their views, requirements, and ideas to Verbania Inc. The alignment of the strategies while
keeping in mind the customer’s views would help in developing the improved functional
operations.
Search Capability of People: The search capability of the people would allow the
development of the improved functional analysis. The use of website development would allow
the intake of the improved system development. The website would allow them to integrate the
person to person searching for the operations.
Game and Calendar Component: The implication of the website function would allow
the formation of the effective and improved functional operation development. The gaming and
calendar component would allow the integration of the operations. The deployment of the
operations would help in forming the consideration of the system development for the
organization.
Solution for Verbania Inc.
The development of the website for the organization would provide the ease of the
operations for the organization processing (Laporte, Hebert & Mineau, 2014). The development
of the website would help in integrating the functional development of the operations for the
modification of the effective and improved system alignment and development. The integration
of the operations would be formed for integration of the system performance and deployment.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 5
The alignment of the system development would align the formation of the improved operations.
The website development would allow the deployment of the alignment methods.
High Level Plan for Implementation
The project of developing a Website of Verbania Inc. is implicit in forming an effective
website that would help the organization for aligning the improved functionality with operations.
The implementation plan consists of four phases namely Initialization, Execution, Testing, and
Training and Documentation (Ma & Lee, 2015). The initialization phase consists of human
resource employment, establishment of responsibilities, employment of high level project
manager, feasibility analysis of website connection, sustainability analysis of the website
requirements, organizational policy development for website, development of plan, and plan
approval. The execution phase consists of designing of the website, user interface development,
integrated database is formed, alignment of resources, modifications of the website, accessibility
checklist is developed, and security functions are aligned. The testing phase consists of black box
testing, white box testing, compatibility testing, and website developed. The training and
documentation consists of training manuals are formed, training is provided to the staffs and
user, training is completed, final documents are made, documents are reviewed, and sign off the
documents (Danielson et al., 2016). The Implementation Plan for the Website of the Verbania
Inc. is given in the table shown directly below.
WB
S Task Name Duration Start Finish Predecessors
0 Implementation Plan for Website of
Verbania Inc 57 days Mon
2/5/18
Tue
4/24/18
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 6
1 Initialization 19 days Mon
2/5/18 Thu 3/1/18
1.1 Human Resource employment 5 days Wed
2/7/18
Tue
2/13/18 4
1.2 Establishment of Responsibilities 3 days Wed
2/14/18 Fri 2/16/18 2
1.3 Employment of High Level Project
Manager 2 days Mon
2/5/18 Tue 2/6/18
1.4 Feasibility Analysis of Website
Connection 4 days Mon
2/19/18
Thu
2/22/18 3
1.5 Sustainability analysis of the Website
Requirements 3 days Mon
2/19/18
Wed
2/21/18 3
1.6 Organizational Policy Development for
website 2 days Mon
2/19/18
Tue
2/20/18 3
1.7 Development of Plan 4 days Fri 2/23/18 Wed
2/28/18 5, 6, 7
1.8 Plan Approval 1 day Thu 3/1/18 Thu 3/1/18 8
2 Execution 16 days Fri 3/2/18 Fri 3/23/18
2.1 Designing of the Website 5 days Fri 3/2/18 Thu 3/8/18 9
2.2 User Interface Development 3 days Fri 3/9/18 Tue
3/13/18 11
2.3 Integrated Database is formed 4 days Wed
3/14/18
Mon
3/19/18 12
2.4 Alignment of Resources 2 days Fri 3/9/18 Mon
3/12/18 11
2.5 Modifications of the Website 3 days Tue
3/13/18
Thu
3/15/18 14
2.6 Accessibility Checklist is developed 2 days Fri 3/9/18 Mon
3/12/18 11
2.7 Security Functions are aligned 4 days Tue Fri 3/23/18 13, 16
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 7
3/20/18
3 Testing 4 days Mon
3/26/18
Thu
3/29/18
3.1 Black Box testing 3 days Mon
3/26/18
Wed
3/28/18 17
3.2 White Box testing 3 days Mon
3/26/18
Wed
3/28/18 17
3.3 Compatibility testing 3 days Mon
3/26/18
Wed
3/28/18 17
3.4 Website Developed 1 day Thu
3/29/18
Thu
3/29/18 19, 20, 21
4 Training and Documentation 17 days Fri 3/30/18 Mon
4/23/18
4.1 Training Manuals are formed 3 days Fri 3/30/18 Tue 4/3/18 22
4.2 Training is provided to the staffs and
users 7 days Wed
4/4/18
Thu
4/12/18 24
4.3 Training is completed 1 day Fri 4/13/18 Fri 4/13/18 25
4.4 Final Documents are made 3 days Mon
4/16/18
Wed
4/18/18 26
4.5 Documents are Reviewed 2 days Thu
4/19/18 Fri 4/20/18 27
4.6 Sign off the documents 1 day Mon
4/23/18
Mon
4/23/18 28
5 Project is Closed 1 day Tue
4/24/18
Tue
4/24/18 29
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 8
Specific and Detailed Requirements
The website development for Verbania Inc. will require the use of development tools.
The database development will involve the development of a systematic and efficient
management system.
Serial No Component Description
1. User The users of the network infrastructure are
divided into three categories such as the internal users,
external users and the end users.
2. Network The network is designed according to the
requirement of the company and divided into three layers
such as the core, access and the distribution layer.
3. Website Interface The website interface is formed for accessing the
functions of the organization with the help of the website.
The website interface developed would be compatible for
all platforms.
4. Functions Functions of the website include input of
characters and numbers (including characters), storage to
the cloud network, integrated database, and alignment of
the improved operations.
5. Database Database developed would be compatible for the
development of integrated database alignment. The
deployment of the operations would be formed for
integrating the deployment of the operations.
6. Switches A pair of layer 3 switches are used for the
perimeter distribution layer and cat 6 cables are used for
interconnecting the different hardware devices installed
in different location of the building.
7. Routers Two fusion routers are used for virtualization of
the service and balancing the load on the core network. It
is also used for the management of the VPN connection
and allows the remote users to connect with the core
components of the network.
8. Server Access The server access layer devices are connected
with the data center devices for increasing the availability
of the information stored in the data center servers.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 9
Hardware and Software Requirements of Verbania Inc.
The list of hardware and software requirements for the proposed solution for Verbania
Inc. includes hardware components and software components. The hardware components include
a collection of switches, routers, firewalls, servers, and necessary cables. The software
components include Microsoft Windows 2012 r2 standard Operating System, Microsoft Visual
Studio, and Dreamweaver for design.
High Level Network Diagram Followed by an Explanation of Access
Figure 1: High Level Network Diagram
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 10
The users of the network infrastructure are divided into three categories being the internal
users, the external users, and the end users. The network is designed according to the
requirement of the company and divided into three layers such as the core, access and the
distribution layer. A firewall is installed in the distribution layer for restricting the unauthorized
users to access the core components of the network and increase the security of the network.
Another set of firewalls are installed for securing the remote network and restricting the
unauthorized users to access the core components via the remote links. A pair of layer 3 switches
is used for the perimeter distribution layer and cat 6 cables are used for interconnecting the
different hardware devices installed in different location of the building. The server access layer
devices are connected with the data center devices for increasing the availability of the
information stored in the data center servers. Two fusion routers are used for virtualization of the
service and balancing the load on the core network. It is also used for the management of the
VPN connection and allows the remote users to connect with the core components of the
network. The internet and WAN link zones are created for securing the network with the
installation of firewall devices in the network and to control the data traffic in the network. The
scalability and flexibility of the network is increased with the implementation of network
virtualization and server virtualization.
With consideration to the listed operational structure, Verbania Inc. would be helped by
forming the effective and improved social media site and application. The system development
would comprise of developing the improved functionality and the formation of the Verbania
network architecture. This report has provided the highlights of the necessary requirements of
developing this website.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 11
SECTION 2: SYSTEM ANALYSIS
Corporate Network Topology Recommendation
There are various types of topologies but the best amongst these topologies is the star
topology. For wireless networks, this the star topology is used by the Wi-Fi based products
which works in the infrastructure mode. This topology is similar to or resembles the topology
which is used by the 10BASE-T along with this this topology is also the fastest version of the
Ethernet which uses a switch (Parandehgheibi & Modiano, 2013). In this case, the access points
act as the switch due to the fact that the stations are connected by the use of the access points
instead of connecting directly with each other. This is very expensive per unit but the
performance is permitted at an excess speed compared to the 10BASE-T Ethernet speed; along
with speed, the managing of the star topology is also easier for the wired network. Star topology
in wired network helps in connecting several cables of each computer to a single central wiring
nexus which is often termed as the switch or the hub. Due to the fact that each computer will be
using a separate cable there would be less effect or will affect only the single machine whenever
there is an occurrence of network failure. So, during network failures will the single computer
will get affected and the other computers will be functioning in a normal way (Centenaro et al,
2016). This type of cabling is much easier to diagnosis and the problems can be bypassed very
easily. The form that is to be used along with being the most appropriate form on the wired
LAN’s are Fast Ethernet or Gigabit Ethernet. The star topology also helps in the wired networks
when there is a need of adding new things to the network along with helping during the moving
of things, or making any kind of changes by making this changing and addition process at a
much faster rate along with being more efficient and cost effective (Rawat et al. 2014).
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 12
Cabling Recommendation
In the star topology, it is possible to use a twisted pair cable or an optical cable. Coaxial
cables are also used but, only in few instances and will not be recommended for Verbania. The
best cable type for this purpose would be to use twisted pair cable. There are two types of twisted
cable one is the shielded twisted pair and another one is the un-shielded twisted pair (Comer,
2015). Amongst the types of twisted pair, the best is the shielded twisted pair. The main reason
for using the shielded twisted pair is that it is not susceptible to any type of interfaces caused by
radio or electrical frequencies. Along with this, the cables can also be extended to a maximum
distance when shielded cables are used. The wires in this type of cable are individually shielded
by the use of a foil along with this there is also a foil or braid shield present inside the jacket of
the cable which is covered as well. This shield is present outside the individual wire along with
the whole cable. These wires are twisted so as to reduce the noise or it can be stated particularly
that this is done for reducing cross talk (Strobel, Stolle & Utschick, 2013). The twisted pair does
this by cancelling the unwanted cross-talk signals. Along with this, this type of wiring is more
durable and lasts for a longer time. There is a speed of about 100 megabits per second in these
types of wires. Data is carried by this cabling, which includes packets of information, and this is
done by the use of the internet as well as the commercial computer networks through the wires
present inside and via many wires. The use of the two wires helps in avoiding the delay caused
during transmission. The data that is being sent by the shielded twisted wire are also very secure
compared to any other type of cables because the data flowing is kept proper by the components
present inside and outside the cable (Chowdhury, 2013).
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 13
How will the network infrastructure accommodate remote access?
Using a star topology for Verbania’s internal network, connected through twisted-pair
copper cabling, means that this architecture will give us the most flexibility, scalability, and
simplicity in management and troubleshooting. With this general network layout in mind, there
are a couple of additional network infrastructure requirements to put in place in order to
accommodate remote access. In order to manage remote access from both staff accessing the
network externally and end users accessing the network server and data as required by the
application, there needs to be firewall and routing elements for security and bandwidth purposes
along with an architecture that can route traffic to locations on the network that are needed and
not network locations that are unnecessary (Microsoft, 2014). The goal will be to create an n-tier
system with three primary tiers. The tiers of Verbania’s network and their subsequent network
elements are as follows:
Presentation Tier: External devices with user interfaces and internal devices with user
interfaces. Both of these sections of devices will connect to the logic tier but, the internal
will connect directly to its logic router and the external will connect through a firewall.
Logic Tier: Contains a firewall and logical security parameters in order to protect access
to the network and this tier also contains routers and logic tier servers. The internal
network on the presentation tier will connect directly to a logic tier server through an
internal network router in order to be directed to other machines or tiers. External devices
will pass through a firewall and subsequent router before being directed to either the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 14
internal networks logic server or a server dedicated too data tier access for the mobile and
desktop social media applications themselves to function.
Data Tier: Contains data servers for both the internal network and the application server.
Increased security will be placed on the entry/exit point of this tier to protect sensitive
information from being accessed without permission. The use of passwords, machine and
user permissions, and encryption will be used to gain access to any data at this level.
This multi-tiered network architecture will allow staff and end users to gain quick access
to network elements as needed but also protect the network itself and the data storage servers
from unauthorized access. This system will also route end user traffic directly to the data servers
as needed rather than passing data through the company’s internal network to assist with data
traffic control and help eliminate possible malicious attacks on that network.
Aside from basic network access, employees accessing network elements outside of the
internal network will only have access to logic tier elements and the data tier application server.
In order to gain access to the data tier internal data server a virtual private network (VPN) will
need to be setup. Using a VPN will allow a secure connection and allow employees to use their
credentials to access information in order to monitor data access and protected sensitive
information (Christensen, 2009). Screen sharing software will also be authorized to presentation
tier components for employees but, only through the use of a VPN.
What solution would you propose to integrate the social media site with a CRM solution?
Verbania Inc. will utilize a social media site as it will be necessary to incorporate this
social media site with a Customer Relationship Management platform or CRM. There are a
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 15
number of different benefits that come with using a CRM platform and one of the benefits is
building a better and more profitable relationship with customers (Wooden, n.d.). One of the
most important elements in a successful organization is good customer relations, and this
company will need to come up with a strategy that will focus on building good relationships with
its customers. In order to achieve this goal, they will require the use of a business development
customer relationship management system. The solution that will be proposed for Verbania is to
utilize HubSpot CRM which happens to be one of the top Customer Relationship Management
apps that are available. HubSpot is a free and open source CRM platform that easy to use and
ideal for companies that are starting up. This platform can also be integrated with a number of
other popular CRM’s (i.e.) Sales Force, Shopify, Microsoft Dynamics, and a lot of other
different tools.
Another tool that is available with the use of this in particular platform is HubSpot
Marketing. This system will allow the alignment of CRM as well as the marketing efforts,
therefore increasing the conversion and traffic rates. HubSpot Marketing will also assist in the
optimization of the content on Verbania’s websites allowing them to distribute it to the right
audiences and influencers. The HubSpot CRM has a number of different benefits that this
organization will need and one of them is the ability to link this CRM to all locations where the
processes of the sales are taking place (i.e.) websites, social media profiles, email, and phone
calls. Verbania will benefit from these platforms unlimited amount of storage as well as the
ability to store up to a million users and contacts which is free to use. The user interface for this
platform is easy to use and does not require training to operate or install.
HubSpot CRM comes with a variety of different features including the integration of
email, websites, and social media. There is the ability to customize the views of the interface as
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 16
well as being able to track visitors that visit Verbania’s company website. Lastly, there are a
variety of different templates available that include tracking and scheduling features. As far as
the technical features are concerned, the HubSpot platform is supported on a number of various
platforms including Windows, Android, iPhone, Mac, and a number of other devices. HubSpot
supports a number of different development languages and works well for small, medium, and
larger organizations.
What security considerations are involved?
The starting point for Verbania is to assure that high level security standards and policies
are in place to protect the system from external attacks and unauthorized internal usage
(Microsoft, n.d).When considering setting up security, there are many steps involved to having a
secure security plan which include the team leader, internal team and the CSO. With that being
said users have to know what protocols to follow when they suspect a security hack or breach.
Next the security team will be responsible for the following security considerations for the
organization (Microsoft, n.d.):
Administrators should set up user accounts with login information on the network to
allow access to certain individuals to the servers or secure information such as internal
users. Those who do not have approval such as external users or no long need access will
not have access to the server.
End user will have to be trained by the team leader on security structure of the network as
well as what to do incase hackers try to breach the firewall as well as what to look for.
End users will know what to combat for these types of attacks.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 17
Plan for 24/7 security and monitoring on all access points and checkpoints. The staff in
this room will be in charge of monitoring the connection points.
Virus protection should be put into place to keep computer free of malware, worms and
macro viruses” oracle,2000”. Also check that each computer is up to date on a regular
basis but as well as make sure each computer has the current malware protection.
Database servers with confidential information should be secure in a protected network
server with a separate DMZ server so incase the security is compromised the confidential
information can’t be accessed.
Implement a data backup system for confidential information in case of power outage or
shutdowns so that the information is not vulnerable to attacks.
Security team should also setup firewalls on the Verbania system to keep hackers from
being able to breach confidential data or information.
I believe these security considerations would help Verbania get them system back up and
running as well as be able to have a new network for users to join and use. These simple steps
are what will help Verbania become back stable as well as gain more knowledge of what to
expect as their system grows bigger and bigger in the world.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 18
SECTION 3: SYSTEM DESIGN
Security of social websites is of paramount importance in these times. The database of
websites like Facebook and Twitter contain personal data of the users. Data protection and
privacy must be top priority in these websites. I would recommend the following five methods
for website protection:
HTTPS: This protocol provides a privacy assurance to the users that the website they are
visiting is authentic and no other party is observing the traffic between them and the web
server (Durumeric et al., 2017). The website of Verbania Inc. would contain accounts of
users and they will be sharing their private data with the website. Having this certification
would benefit the company by establishing their authenticity. This certificate can be
obtained free of cost from Let’s Encrypt, which is an online community that
automatically generates and provides HTTPS certificates.
Uploaded files: Social website users would upload media files like pictures to the
website. Picture files have enough space to contain a PHP code that could auto execute
itself to open a back door to the web server and steal data (Olsson, 2016). Here, I would
strongly recommend that data must not be stored on the same server. The data must be
kept on an entirely different server so that even in the case of a successful hack on the
web server; there will be no leak of user data. The files uploaded by the users can be kept
on the web server a dummy database on the web server, which can then be stored to the
data base server after rigorous and through scanning for script codes. Script codes are
generally hard to detect by conventional means and thus it is better to keep the files away
from the data base server until they have clearance from the security team.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 19
DDoS Attacks: A DDoS or a Distributed Denial of Service attack is a type of website
attack where the web server is spammed with fake traffic to disrupt the website’s
services. Verbania Inc. would be hosting online games on their website and thus such an
attempt might take place. Here, I would recommend that the website must use traffic
redirector services, as it would reduce the rate of direct traffic to the server and thus
minimize the risk of a DDoS attack (Wang et al., 2015). Verbania Inc. would be hosting
online multiplayer games and thus it is likely that the servers might face DDoS attacks on
a regular basis by attackers who just want to crash the website just for fun. Sometimes the
servers are overloaded by requests from authentic users continuously spamming games.
These can be minimized by putting a timer between each successful game sessions and
thus reducing the rate of internet traffic. This also promotes safe game playing as the
gamers are bound to take breaks between each game session (Chung et al., 2016).
Account Passwords: Passwords for each online account must be creative and not
hackable by traditional means. During the account-creating phase, the users must be
made aware that the password they are selecting must contain alphabets and numbers.
This will minimize the chances of successful dictionary style and brute force attacks.
These types of attacks take a huge amount of computational power and time. Highly
complex passwords thus exponentially increase the amount of time taken to crack them.
The passwords that are saved to the data base server must be securely encrypted. Using
Secure Hash Algorithm and adding salt to the passwords would be my recommendation
for here for Verbania Inc. (Guesmi et al., 2016). Encrypting passwords using SHA before
storing them to the data base server would be helpful in the event that the password
database is stolen from the server. Such encryption is impossible decrypt if the hackers
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 20
do not possess the key. Passwords can be further encrypted using random salt values in
between each individual password before storing those (Asimi et al., 2016). Such salt
values are impossible to remove by any third party. Only the person with the knowledge
of the specific salt values that were implemented can decrypt them.
Website Security Testers: Before running the websites on live servers, we should test
them for any flaws in security and improve the security by performing rigorous
penetration testing in a beta environment. There are certain tools that we can use for beta
testing the servers. Netsparker is a tool that we can use for testing the server on SQL
injection and Cross-site Scripting (XSS) attacks (Appelt et al., 2016). These attacks are
executed by script codes, which are easy to upload and hard to detect. SQL and XSS
attacks are mainly executed to steal data from the server. Thus, even a single flaw in the
system would be enough for a successful attack. Xenotix XSS Exploit Framework can
also be used to simulate XSS attacks on the beta server (Gupta & Gupta, 2017). This
open source tool contains a massive collection of Cross-site Scripting attacks that would
help us to simulate any such attack on the server and thus rectify those flaws before going
live. A customisable and automated security scanner can be used to test the
vulnerabilities on a scheduled basis. We can use OpenVAS for this purpose as it a free
and open to all software.
Apart from website security, there can be times when the server might face some
downtime for maintenance or it might be recovering from a data loss event due to an attempted
hack. I would recommend the following steps to recover from any disaster whether it is man-
made or natural:
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 21
Backup: A website hack can sometimes corrupt or even remove critical files from the
server. The risk of data loss can be minimized with regular and automated back-up
procedures. Daily back-ups of the website and the database is my recommendation.
Code 503 Status Page: There may be some downtime in the web server or the data base
server due to any number of reasons such as an attempted hack, maintenance or even
server upgrade. During any of those cases, the website should show a status code 503.
This conveys the message to the site visitors that the website is facing downtime and
regular service would be ensured after a specific amount of time. This also lets Google
know that there is some problem with the website. I would recommend this disaster
management method as Google might remove the URL from their index if this code is
not displayed on the website during downtime. However, this method is only useful if the
downtime is short but if the downtime is long and the website is still showing the 503
code the website would be considered as permanently unavailable according to Google’s
algorithm.
Mapping of old URLs over to new URLs: The website’s URL will definitely change after
resolving of downtime. Any downtime is usually resolved by either system upgrade or
changes to the database. The URL of the website will be different after such an event.
Thus, here my recommendation would be to use a 301 Redirect method to map the
website’s old URL to the new one so that the users do not get confused (Donovan &
Feamster, 2014).
Redundant Servers: Natural disasters can sometimes be a cause to server downtime. The
facility hosting the web server and the data base server for Verbania Inc. must have back-
up servers in different locations to minimize the loss suffered from natural disasters
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 22
(Colman-Meixner et al., 2014). It is highly unlikely that all the servers would be facing
downtime at the same time due to a natural disaster.
Google Cloud Platform: Recovery is based on either time spent or data amount to be
recovered. The cost to both of these processes can be drastically reduced with the help of
Google Cloud Platform (Greenly et al., 2015). Application and storage complexities are
also reduced. Data that is backed up on a cloud server can be recovered at any time and
from any place. Google has a global network that can be accessed from anywhere in the
world. The data is stored in multiple locations and as a result, there is no loss of data. The
data security offered by Google is also highly reliable. Creating backups to cloud helps to
reduce the cost of hardware and software. Almost every organization especially social
website creators use cloud service as their servers are attacked on a regular basis.
According to me, Google Cloud SQL can be used to create a distributed database on
MySQL (Krishnan & Gonzalez, 2015). It contains the benefits of both MySQL as well as
Google Cloud Platform. The security and reliability of these services taken together
means that the contents of the database can be recovered any time in the event of a
website crash.
I am offering these recommendations to the security specialist of our team. The security
of social websites like Verbania Inc. is very complex and security experts have to implement
multi-layer security protocols, as any attacker needs only one-entry point to turn an attempted
hack to a successful one. To conclude, being privy to the IT policies on security and disaster
recovery, all of the recommendations that I have made in this document strictly abide by those
policies
Remote Access
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 23
When thinking of remote access to the Verbania Inc. internal network, it is prudent to
consider industry best practices for authorizing access. Some important best practices for remote
access are directly related to hardware and some are directly related to software (Imran, 2015).
Both hardware and software elements of a remote access security policy hold significant weight
due to vulnerabilities that can be presented in either form.
For hardware best practices and company guidelines, consider:
Limit internal network connection, through direct access or VPN, to company issued
devices only in order to reduce the risk of devices connecting to the network that are not
properly secured or meant for malicious intent
Deny administrator rights to computer users and only allow a network or security
administrator to control updates and patches in order to prevent threats from unauthorized
software installations
Keep authorization to the needs of the business and avoid unnecessary device access
Maintain a separate wireless network for personal device, such as mobile cellular devices,
to connect to should the company want to offer an open network (Alqwbani, Zuping &
Aqlan, 2014).
For software best practices and company guidelines, consider:
Require up-to-date antivirus and antimalware software on all devices connecting to any
company network to help eliminate vulnerabilities created by outdated security measures
All devices not directly connected to the internal network should pass all traffic through
the networks firewall and encrypt all data in transit
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 24
Wireless Communication
Wireless communication in particular, whether directly inside the organizations offices or
directly nearby within range, there are best practices to keep in mind to assist in network
security. These best practices can be used to construct basic guidelines and organizational
policies for employees and guests to follow in order to maintain their privileges with
consideration to network access (Froehlich, 2016). Some of the industry best practices include:
Maintaining a separate wireless network for organization internal traffic and guest access
traffic
Ensure wireless access points and wireless routers are maintained and kept in a secure
location similar to other internal network devices to prevent unauthorized access
Limit the output of the wireless signal to the area where users may access it to prevent
unethical use from those outside of the organizations facilities
Required device registration with required software elements for any devices whom
individuals are seeking internal network access with
Wireless communications and remote access have many identical components and should
be protected in a similar manner. Preventing unwanted traffic and unauthorized access is
essential to maintaining an organizations ethical and legal responsibilities. For Verbania Inc.,
following these best practices with their company guidelines and policies will guarantee they put
their best foot forward in network remote and wireless access security.
Router, Switch, and Server Security
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 25
The local router is the first device your network that gives you internet. Routers are the
backbone of your internet (White, 2013). Connecting more than a down computers and devices
security is crucial and you need something more than a simple router. Below are two types of
routers to consider:
VPN router and firewall- It can be wireless or Ethernet only and requires you to allow
access points for Wi-Fi coverage. These kinds of routers have a VPN and sometimes
offer multiple SSID’s and VLAN support.
UTM gateway or firewall: Includes advance features and are Ethernet only with 4 to 8
ports. But requires separate connection points for Wi-Fi. A UTM gateway can help
catch malware before it reaches individual computers, providing double protection.
This unit also includes virus and malware protection content filtering, anti-spam,
functions and intrusion detection and prevention (Geiger, 2012). When purchasing router
consider routers with Ethernet ports to connect all device too. Below are considerations that
should be considered when buying:
Ethernet speed: Focuses on models that support gigabit Ethernet for higher speeds on
wire computers.
Dual or backup Wan-Considering gateways, routers firewalls have a second wan port
in case your main connection to the internet goes down.
PoE Support: If the company is going to run wireless access points throughout.
Consider power over Ethernet so power can travel through Ethernet cabling with the
data. It will save the time and money to have to invest putting in different cabling.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 26
Verbania Inc.’s website would support virtual LAN allowing them to create a private
network to support different departments and another for the public to access (Geiger, 2012).
This will help prevent guests from snooping traffic as well as connection to company computers.
The network switch connects all of your hardware and computers together on an internal network
between computers. I am offering these choices for the router configuration for the company
Verbania Inc. These router setting should keep and intruder from being able to hack the system.
Email Security
Emails are normally sent through networks that are either untrusted or external to an
organization’s security borders. When the messages do not have the necessary safeguards, they
can be read, modified, and copied at any point along the transmission path. The IT department
and email administrators of Verbania will be the ones responsible for the security of their email
medium. It is also their responsibility to ensure their users are fully aware of the risks that pertain
to utilizing this type of medium. People can be considered one of the weakest links in security
and they should be the organizations first line of defense against outside attackers (Macaulay,
2017). User awareness training should be conducted at least yearly in order to update users on
the risks that are threatening email, and ways to recognize if an email attachment appears
suspicious. People can be considered one of the weakest links in security and they should be the
organizations first line of defense against
Reducing Malware, Spam and Phishing Attempts
Email happens to be one of the main ways that viruses and other types of malware are
introduced into a system. Spam campaigns change constantly to try and evade detection and use
different methods to do so such as providing a link to an infected website, or installing a
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 27
keylogging Trojan to steal sensitive information. Verbania Inc. must ensure that they are able to
demonstrate their email infrastructure is secure and protects against spyware, adware, viruses, as
well as other threats to data and the systems in general. In order to ensure that email is secure,
there will be a need for an antivirus program such as McAfee Professional Plus which will
ensure that each computer is protected, as well as being able to filter spam, adware, and other
problematic email traffic. Blocking these types of threats from the mail servers that are internal,
as well as the computer systems themselves, will inevitably lower the risks of data loss.
Maintain Visibility of Email Traffic
It will be necessary for the IT department within Verbania to ensure that they are
constantly aware of and accountable for all emails that are incoming, outgoing, as well as
circulating around the organization. Accessible records that contain any relevant
communications with email should be retained including any logged information that shows
when the emails are sent and to whom they have been sent to. This is especially important when
sensitive information is being transferred through email which in this case should be archived as
well as copied. Another reason maintaining visibility is important is that they are able to
intercept messages that violate the email policy. These emails can then be rerouted to the
personnel that enforce the policies so that they can handle the violation.
Encryption and Authentication
It is an unacceptable practice for an organization to communicate through emails that are
unencrypted or in plain text, especially if there is sensitive data involved. Email encryption can
be easy to utilize without impacting organizations operations, as well as being user friendly.
There are a variety of encryption standards that can be utilized by an organization such as Triple
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 28
DES, AES, and RSA. Although there are some unique differences between them, utilizing the
basic forms of encryption will ensure that the organizations sensitive data remains safe.
Authentication is also recommended in conjunction with other comprehensive solutions and will
ensure that email traffic upholds its integrity throughout the transmission process (Galaxkey,
2016). Basically, authentication is necessary to make sure that emails remain safe and unchanged
and also ensure that the sender is who they say they are.
Server Security
Server hardening is a process that focuses on improving the security of an organizations
server in a variety of ways resulting in a more secure operating environment. In this day and age,
nearly all computing resources that access the internet are susceptible to cyberattacks, therefore,
this makes server hardening even more important. One of the first security items that must be
addressed and adjusted are the default configurations. These settings apply not only to the
servers themselves, but also with operating systems and other computing devices. The default
configurations are not typically designed for security as their primary purpose but, functionality
instead. In order to protect these assets, Verbania must focus on establishing strict hardening
policies for all of their servers and network infrastructure.
Strong Passwords
Strong passwords should be used with all hardware and software that uses passwords to
access services as this is the first line of defense against hacking attacks. This includes all of the
different services that run on the server itself. There should also be a password policy in place
that specifies how the passwords will be created, how many characters they should have, as well
as when they should be changed. There are also other methods available that are more secure
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 29
than just using passwords namely utilizing SSH keys. These keys are public and created for each
user and stored within the server itself. When the user attempts to log in, it will ask the user to
enter their private key and they will then have access to the server. SSH keys are more secure as
when they are encrypted, they typically contain more bits of data than passwords. This makes it
harder for an attacker to break them (Ellingwood, 2015).
Limit Server Access
The servers within Verbania’s infrastructure should have limited access, and only allow
individuals that are qualified to do so. All ports should be checked within the server firewall to
ensure that only the ports that are necessary are open. This will ensure that an attacker cannot
access the services through a port that should be closed. An Advanced Policy Firewall or (APF)
is normally installed on the servers by default. This makes it easier to manage the rules for the
firewall including opening and closing ports. Another type of firewall that can be used is a
Configuration Server Firewall or (CSF) which is a bit more advanced than APF. This firewall in
particular allows the blocking of internet protocols, as well as provides protection against SYN
flood and other DDoS attacks.
Application and Security Updates
One of the more common ways that a server is compromised is by using different types
of 3rd party applications that have been loaded onto the server. These applications a lot of times
contain an exploit which can be disastrous for an organization. For this reason, it is extremely
vital to ensure that all applications are updated frequently with the latest security updates. This
includes updates to plugins as well as add-on updates (Nicholson, 2015). The developers of the
applications keep tabs on the security breaches in their software and will update them with the
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 30
necessary security codes. If these applications are out of date, an attacker can easily access the
applications and cause damage to the server and the data that resides on it.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 31
SECTION 4: SYSTEM DEVELOPMENT
Verbania Inc. Mobile Application Increased Functionality
Along with the previously stated requirements, Verbania has decided to increase the
functionality of their mobile application with the addition of mobile account creation and set-up,
individual user profile creation, the ability to add and remove friends, and posting in social
media discussion areas. While some of these features were mentioned previously, Verbania has
asked that it be made a point to break down these processes through specific diagrams and
requirements statements to ensure their application integration lifecycle.
The first diagram to be shown here is a Verbania mobile applications use case diagram.
This illustration shows the correlation between Verbania and the user by connecting user actions
in succession with account or profile creation followed by login functionality. Also shown within
the use case diagram is the primary control and monitoring points of contact for Verbania within
the mobile application which would be based on server entity connections.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 32
The second diagram shown directly below is a Verbania mobile application sequence
diagram which shows the links of requests and replies between the immediate tiers of the
applications network. While the user needs access to the data tier, their mobile devices never
connect to anything aside from the application user interface and the request line to the logic tier.
The logic tier then accesses the data tier and responds with the necessary information.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 33
The third and final diagram is a Verbania mobile application class diagram which serves
to illustrate the primary classes of the mobile application with their subsequent attributes. In this
case the account, profile, discussion board, and friend-book classes are shown are connected to
explain the intended design of the Verbania mobile application.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 34
Connectivity and Encryption Solutions for Mobile Application Communications
Mobile devices have come a long way in the last decade and pretty much allow
individuals to do everything online including being able to work from home. Driving the
productivity of mobile devices are multitudes of different mobile applications and software that
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 35
enable these application programming interfaces to deliver value, data, and convenience for the
users (Wodehouse, n.d.). All of this online activity with these mobile devices must take place
under some sort of well-engineered type of security as organizations risk jeopardizing customer’s
information, the applications that the organization uses, their systems, as well as their
reputations.
In order for these applications to work with mobile devices, there are a number of
different things that need to be accomplished. The coding for the software has to be written, the
business logic that lies at the back end of the network as well as on the client-side needs
developed, and the API’s that funnel the data between the mobile device and it’s in particular
operating system (Wodehouse, n.d.). Each one of these aforementioned tasks plays an extremely
important role in ensuring that the application is secure. For organizations that utilize mobile
apps in a crowded market, and one that is relatively competitive, security for these applications
must be robust in order to stay ahead of the threats that target these apps.
The network connections that reside on the back end need to be secured, namely the
servers and or/ cloud servers that the application accesses, as this could be the own organizations
or a third-parties. There are a number of different ways that this can take place and one of them
is the use of database encryption, as well as setting up an encrypted connection utilizing a VPN.
The use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) will also add extra
layers of security when accessing the mobile applications. Identification and authentication
should be added for security as well and can be accomplished by using OAuth2. OAuth2 is a
framework for authorization that is utilized on desktop applications as well as mobile devices.
This in particular framework enables applications to only obtain a limited amount of access to all
of the user accounts within an HTTP service namely Facebook, and GitHub (Anicas, 2014).
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 36
When it comes to the encryption methods on mobile devices, one of the biggest
challenges for IT personnel is the actual devices themselves. Some operating systems on these
mobile devices give the in particular device a way to encrypt sensitive data that resides on the
device. Other devices on the other hand may require the use of third party applications and
software in order to manage the data encryption on the device. The Apple IOS 5 mobile device
utilizes 256-bit Advanced Encryption Standard (AES) in order to encrypt data. On the Android
operating systems, there are numerous Android enterprise features such as on-device encryption
and other applications like WhisperCore. This application allows the data on a device to be fully
encrypted even if they are running an older version of the operating system (Sheldon, 2012).
Because the organization may have to support several different types of mobile devices,
IT personnel must look at each of the devices capabilities in regards to encryption and utilize
them within their full potential. In order to accomplish this, the organization should look at
utilizing a mobile device management plan to regulate the security of mobile devices. One of
these MDM utilities in particular is Sophos Mobile Control which allows the IT administrators to
turn on the security features that come with these devices that are managed. This utility supports
numerous mobile operating systems including Android, Apple IOS, as well as mobile devices
that run Windows.
Solution Suggestions for Involved Hardware, Software, and Network Elements
The network is the entry point to your application. It provides control access to the
different servers. Servers have their own controls but they should not be attacked from the
network layer. To sum it all up the network will provide protection on the network devices and
the data. Below are recommendations for the new work devices and software elements.
Hardware
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 37
Verbania Inc. will require to have routers that will be routed throughout the business for
computers to be able to connect to in order for them to work on the server. The router will act as
a out security gate. It forwards the IP packets to the network to which it is connected. The router
will be used to block authorization and undesired traffic between networks. The router will then
be connected to a secure firewall to secure the remote network. There will be two fusion routers
that will be used for the virtualization service and to balance the load on the core network. It will
also be used to manage the VPN connection and allow users who are remote to connect to the
network.
The firewall will be used to block unnecessary ports and allow traffic from known ports.
It will monitor incoming requests to prevent attacks against the Verbania Inc. web server. It will
be installed in the distribution layer to keep intrusion minimized and assist in preventing attacks
directed towards the server. Also, it will restrict the access of unauthorized users attempts to be
able to access core components on the network as well as increase overall security. Another
firewall will be installed for securing the remote network. This additional firewall will be used to
block unauthorized users from accessing it through the remote links.
The network switch will be used to forward incoming packets directly to host or network
locations without sharing the data to all locations within the network. The 3-layer switch will be
used for the perimeter of the distribution layer. There will be a pair of 3-layer switches to be used
for the perimeter of the distribution layer to connected the system together.
The servers will act as a computer program that will accept and respond to requests from
other programs, such as a client request. (Computer Hope, 2017). The servers will be used to
manage network resources for Verbania’s internal network. The server device will be connected
with the data center device to increase the area of information stored on the server.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 38
Software
The software elements described below represent the installed software components.
Verbania will be using Microsoft windows 2012 R2 standard, DreamWorks and Microsoft
Visual Studio as its primary software for the new system.
Microsoft windows 2012 R2 standard
Verbania Inc.’s resource, storage, and workload system controls
Help protects corporate information and improves system scalability
Microsoft Visual Studio
Able to build tool windows and menu commands
Test and debug extensions
Dream Weaver
Used for website creation and application interface development
Contains syntax highlighting as well as code completion
Verbania Inc. Business Design Document
A business design document (BDD) requires a breakdown of project elements into
individual sections that pertain to unique aspects of the project lifecycle. In this document there
should be an executive summary, architecture and functionality descriptions, design
considerations, connectivity and interface elements, and a conclusion. While this document is
generally created separately, in this instance we have created and outlined these elements within
this solution presentation document. Directly below the BDD will begin with the executive
summary.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 39
Business Design Document
Executive Summary
This section elaborates the process or steps involved to create the Business Design
document for the Capstone Project. This study reveals the requirements and functional as well as
the operational involvement of various processes here.
System Description
This system is required to utilize various programming as well as the development tools.
Other hardware requirements, like switches, firewall, cables, routers, or the servers are basic one.
Software components are Microsoft Windows 2012 r2 standard, Microsoft Visual Studio, and
Dreamweaver (Shi, Guo, & Xu, 2017).
Architecture
It will be a three-layered structure having external as well as internal distribution system
if internet connections. Server access layer should need to be connected with data centre devices
according to this architecture.
Functionality
The systems management operations will help in the formation of an efficient integration
process which will then help in the achieving co-ordination among the systems. In addition, the
database management system will help in the development of an effective system (Schilling,
Beese, Haki, Aier, & Winter, 2017).
Database and Software Design
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 40
The main business process of the website will involve various processes. The first
process is the creation of the user account. This will be necessary for a user to create an account
before accessing the account. Another business objective involves creating discussion forums.
This will help the customers in posting their ideas and thoughts such that a better communication
will be established, and a better brand image will be delivered.
The system consists of users which are further classified into three types, like internal
users, external users and the end users. Similarly, the network infrastructure of the company is
divided into the core access and the distribution layer. The interface of the company will help in
accessing all the required functions smoothly. In addition, the interface will also allow the
website to open in multiple platforms as well. The main functions of the website include
character input, cloud network storage and integrated database (Mukhopadhyay & Kulkarni,
2017).
Network Connectivity and Interfaces
VPN and WLAN connectivity are followed and established through this design program.
The interfaces are used here Web Interface as well as the design interface, such as XML or
HTML (Rastogi & Dadheech, 2017).
Conclusion
From the above discussion, it can be concluded that, the business design document is the
basic requirement for designing the request done by user which will reveal the overall system
necessity for completion of the project.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 41
Verbania Inc. System Design Document
A system design document (SDD) requires a breakdown of project elements into
individual sections that pertain to unique aspects of the project hardware and software
considerations. In this document there should be very similar components as the BDD but, with a
hardware and software focus. While this document is generally created separately as well, in this
instance we have created and outlined these elements within this solution presentation document.
Directly below the SDD will begin with the executive summary.
System Design Document
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 42
Executive Summary
This section of the study elaborates the design method of system solution for Capstone
Project. Here are some sections which consists of several design phases in case of System design
document.
System Description
The list of hardware and software requirements for the proposed solution of Capstone
project is given here. The hardware components that are expected to be needed include switches,
routers, firewalls, servers, and cabling requirements. The software components that will be used
include Microsoft Windows operating system, Microsoft Visual Studio, and Dreamweaver.
Architecture and Functionality
The following diagram illustrates the architecture for the Verbania system:
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 43
(Henke, Fath, Hutschenreuter, & Wuttke, 2018)
For development of the website for Capstone project it is required both the integration as
well as the operation process should need to be done accurately as much as possible.
1) The initialization phase: human resource employment, establishment of
responsibilities, employment of high level project manager, feasibility analysis of
website connection, sustainability analysis of the website requirements,
organizational policy development for website, development of plan, and plan
approval.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 44
2) The execution phase: designing of the website, user interface development, integrated
database is formed, alignment of resources, modifications of the website, accessibility
checklist is developed, and security functions are aligned.
3) The testing phase: black box testing, white box testing, compatibility testing, and
website developed.
4) The training and documentation: training manuals are formed, training is provided to
the staffs and user, training is completed, final documents are made, and documents
are reviewed, and sign off the documents (Schwaninger &Klocker, 2018).
Database and Software Design
The following steps are involved in this design phase:
1) Network infrastructure has three types of users: internal, external and end users.
2) There are three layers within this design phase, like core, access or distribution layers.
3) Firewall has to be installed and thus will be designed accordingly.
4) Server access layer is needed to connect with the data centre layer where the
information will be stored.
Network Connectivity
VPN connection has to be designed to connect remote users. Internet sources and WAN
connections are thus installed and are required to be secured for data traffic.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 45
Conclusion
It can be concluded from the assignment that the deployment of the operations would
help in forming the effective and improved social media site for Verbania Inc. The system
development would comprise of developing the improved functional analysis and formation of
the profound development method.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 46
SECTION 5: SYSTEM IMPLEMENTATION AND MAINTENANCE
Executive Summary
Website development can be considered as one of the most innovative ways of highlighting the
business scenario of an organization. In the report the main emphasis is put on the requirement of
a social media website which would be including tools, requirement and other software’s which
can be incorporated into the project. In this concept, Verbania Inc. would be helping in the
process of formation to implement the improved social website, its effectiveness and the
applications. The implementation of the above stated process would be helping in improving the
network architecture of Verbania. The main features that would be added to the website is the
creation of user account, creation of Discussion Forums and posting, search Capability of People,
game and calendar component. The system implementation, which are required for the
implementation and the maintenance of the system, are also taken into consideration in the
report.
Implementation
The main aim of the project is the creation of a website, which would ease the operation,
which is related to the processing of the organization. The website would be beneficial in a way
by which the integration of the operation would be achieved for the improved system
development and alignment (Youn & Kim, 2015).
ASP.NET
ASP.NET can be considered as a framework of programming which is built on common
language runtime that can be used on a Web application. ASP.NET has many advantages in its
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 47
concept both from the point of view of the programmer and the end user. This is due to the factor
that it is compatible with the .Net framework. The factor of compatibility allow the user to use
the following features:
Faster web applications: There are mainly two features, which makes the concept of ASP.NET
fast that mainly caching and compiled code. In the concept of the ASP.NET the code are
compiled into machine language before any user enters the website. Caching can be considered
as a storage of information in the peripherals of the memory, which can be used in the future.
ASP.NET allows the programmers to set up areas on the pages that are commonly reused which
can be cached for a period of time that can directly improve the performance of the website. In
addition to this advantage, the concept allows the concept of caching the data from the database
that does not slow down the website when frequent visitors visit the website when even the data
does not change.
Powerful database functionality: The concept of the ASP.NET allow the programmer to build
web applications that can have interface with the database. The main advantage of the ASP.NET
is that it is object oriented programming concept and has many programming tools attached to it
that makes it faster to develop and has more functionality involved in the aspect.
Crash protection and memory leak: ASP.NET automatically recovers from the leakage of the
memory and errors, which makes the website always available to the user for accessing.
ASP.NET supports code, which is written in more than 25 .Net language, which may include
Jscript.Net, C# and VB.NET. This is mainly achieved due to the concept of the common
language Runtime (CLR) complier that supports multiple languages (Youn & Kim, 2015).
Authentication in ASP.NET
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 48
There are mainly two separate layers of authentication, which are related to the ASP.NET
applications. All the request which are made pass through Internet information service which are
handed to the ASP.NET and the Internet information service decides to deny before the
ASP.NET even knows about the request was made. The process of authentication mainly works
in the following way:
Internet information service checks to see whether an incoming request is coming from an IP
address that should be allowed to access by the domain. If not then the request is denied.
Internet information service performs their own user authentication process if it is configured to
do so. By default, IIS allows access, which is anonymous, and requests are automatically
authenticated.
When a request, which is made by an authenticated user it, is passed from the Internet
information service to the Asp.NET, the ASP.NET checks to see whether the impersonation is
enabled. If it is, enabled ASP.NET acts thorough. If not the ASP.NET acts in its own account of
configuration.
Finally, the identity, which is used for the request, is used by the operating system. If all
the resources, which are necessary, are obtained the user request is granted otherwise the request
is denied (Given et al., 2014).
MySQL Database
In this project, the concept of the MySQL database is used as a backend database.
MySQL database can be considered to as an open source system of database. The features, which
are related to the concept of then MySQL database, are:
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 49
MySQL can be considered as a relational system of database management system. A relational
database stores information in the form of a table, which are made different for easily access and
not made as a giant table of data. These tables can be referenced to each other in order to access
and maintain the data easily.
MySQL is an open source system of database. The system of database can be used and
modified by any user according to their requirement
It is very much fast and reliable and very easy to use. To improve the performance of the
database MySQL is a database engine, which is multi-threaded. A multithreaded application
performs many task at the same time and makes multiple instances of the application to run
simultaneously (Jovanović, Filipović & Bakić, 2017).
MySQL database can be connected to the ASP.NET using the driver of the ODBC. Open
database connectivity (ODBC) can be considered as a most widely used application related to the
interface of the database access. The ODBC driver is a library, which directly implements the
functionality support of the ASP.NET. It processes ODBC function calls submits the SQL
request to the server of the SQL and return the result back to the application.
Integrating the ASP.NET and IIS
When a request comes from the IIS web, server the examination of the extension is done
based, on the extension, the request is handled by the IIS or it is routed to an ISAPI extension. As
ISAPI extension. An ISAPI extension is a complied class that is installed on the server of the
web and the whole responsibility is to return the markup for the requested type of file. By
default, the role of the IIS is to handle the request and return simply the content of the file, which
is requested (Youn & Kim, 2015).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 50
This majorly makes sense for files, which are static for example HTML pages, images,
CSS files, files of JavaScript and so on. For example, when a request is made for a file of
extension .html, IIS simply returns the content of the file with the extension.
Taking into consideration the files, which are generated dynamically, the ISAPI
extension, which is configured for the file, is directly responsible for generating the content for
the file, which is requested. The ASP.NET engine is strikingly similar to the concept of the IIS in
many ways. Just as if the IIS has an extension of mapping to ISAPI extension, the ASP.NET
engine maps the file to the HTTP handler. An HTTP handler is a piece of code which is managed
that is directly responsible for the generating the markup for a particular file type (Jovanović,
Filipović & Bakić, 2017).
Integrating the website and the database
In a page, which is static, the content of the page is determined at the time when the page
is created. A user access the page that is static, the page would be always displaying the same
type of information. Example of page, which is static, is the page, which displays the information
relating the organization. In a dynamic page, the content various according to the input of the
user and the data which is received from an external source. The term “data base web page” is
used to refer to pages, which are dynamic deriving to some of the content of the database or the
data files (Gagliardi & Alhabib, 2015).
Server side processing
Generally, data driven websites or dynamic websites use the concept of the HTML to
collect the information of the user and submitting them to the web server. The program, which is
running on the server, forms the input, dynamically composing the web page reply. This
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 51
program, which is called servicing, can be either a complied executable program or a script,
which is interpreted into machine language each time it is complied. The complied server
programmer, the web server that is involved in the servicing program, does when a user submits
the HTML form with the data added to it for processing this. The servicing program is not a
mere part of the web server but it can be considered independent executable program, which is
running on the web server. It basically consist of the user input, determines the next action which
is to be performed and provides an interaction which the external sources such as database from
where pre- stored data can be retrieved (Janicki, Fischetti & Burns, 2016).
Client side processing
The client side page processing is directly achievable through the concept of the
complied program that are installed, downloaded and executed on the client side or the
workstation of the client or the user. When a user clicks on a link, which consist of a hyper link
on a web page associated with a complied client side program the users browser must have the
ability to run the executable program. This program interacts with the user by means of sending
the data or retrieving the data from the database when needed. Many times the user is asked to
install Active X components in the system to view some animated files and games. This
component plugs in into the system, which is existing thus directly expanding the systems
functionality. JavaScript can be considered to be one more example of client workstation. An
applet can be considered as a program, which is written in Java programming language, which
can be, included in an HTML page much in a way an image is included in a webpage. When a
user uses technology relating to java in the concept of browser to view the content of a web page,
which contains applet, the applet code is transferred to the system and executed by the browser.
In the concept of client side script the source code is basically written in VB script or JavaScript
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 52
and installed or embedded in an HTML document along the HTML static texts. It is placed
within delimiter tags, which can be used as an indication to the browser of the user that the text is
code, which is needed to be interpreted. If the browser of the user is able to interpret and
recognize the code, it can be processed. In the other hand, if the browser is unable to recognize
or interpret the code it is displayed as a text on the web page.
Team collaboration
The focus point, which can be applied to the concept of team collaboration, are stated below:
Set Expectation: Everyone on the team should know exactly what he or she have to do and how
it should be done. They should have an idea of what is expected from them. The role in the
project should also be well defined so that they can meet the expectation of the team.
Use of technical tools: In a project, technical tools have to be used in order to make the website
technically advantaged. People usually love the concept of transparency because this makes
them fell wanted and make them a part of the team.
Effective team meeting: Most of times during a meeting time is wasted in discussing personal
issue. Before a meeting, starts there should be a reason set or an agenda for the meeting. After
the reason is fixed, each member should know what he or she have to bring to the meeting.
Benefits through implementation
The main advantage that can be achieved from the concept are as follows:
Features: The concept of performing the server side processing cannot be directly done by the
web server but can redirect the task to the ISAPI (Application Programming Interface of IIS) on
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 53
the server of the application. Microsoft provides a number of service relating to this including
one for the ASP.NET and Active Server Page.
Compatibility: The concept of the Internet information service is designed to operate on
window server of the operating system. There is a restricted version that supports one web site
and is limited to the number of connections, which can be supplied with the Window XP
professional (Given et al., 2014).
The Microsoft has changed the Internet information service (IIS) server, which runs. In
the version of the Internet information service before 6.0, all the features relating to the aspect
run on the account of the system. This mainly allowed run of the exploit on the system. Under
6.0 there are many processes, which was brought under the concept of the network service
account that had fewer privileges. This means in particular that if there were an exploit on the
features it would not directly compromise the system as a whole (Coronel & Morris, 2016).
Area of strength
The main strength which taken be taken into consideration is the concept of
multithreading. Multithread it has many advantages relating to it. In this concept, a separate
threat handles the incoming connections with an extra threat, which is always running to manage
the connection. Multiple clients can perform operation at a real time concept, but while writing
the hold is performed while another user is updating the data. The threats usually share the same
process space but they execute separately and due to this separation, multiprocessor machine can
spread the threat across many CPU’s as long as the host operating system supports multiple CPU
functionality. The concept of multithread can be considered as a key feature that supports the
MySQL performance related to the design goals (Given et al., 2014).
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 54
Growth uncovered
A database web page is requested form the end of the user by means of clicking to a
hyperlink or the submit button on a website form page. If the request is generated by means of
clicking to a hyperlink, the link specifies either a web server program or a web page that calls a
program related to web server. In some of the cases, the program performs a query, which is
static for example “display all the item in the website”. Although this types of query, vary upon
the request, which is made by the user when suing the website. On the other hand of the request
is generated by clicking a submit button the program related to web server uses the form as an
input to the query (West et al., 2016). The web server then performs the request generating a web
page, which is dynamic to confirm the transaction, which is intended to be performed. In either
of the two cases, the web server is responsible for the concept of formatting the result of the
query by adding tags of the HTML. The web server program send the programs output to the
browser of the client as a web page (Jovanović, Filipović & Bakić, 2017). The process time can
be made faster which would be directly affect the overall time response time.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 55
REFERENCES
Albert, H., Nathavitharana, R. R., Isaacs, C., Pai, M., Denkinger, C. M., & Boehme, C. C.
(2016). Development, roll-out and impact of Xpert MTB/RIF for tuberculosis: what
lessons have we learnt and how can we do better?. European Respiratory Journal, ERJ-
00543.
Appelt, D., Nguyen, C. D., Briand, L. C., & Alshahwan, N. (2014, July). Automated testing for
SQL injection vulnerabilities: an input mutation approach. In Proceedings of the 2014
International Symposium on Software Testing and Analysis (pp. 259-269). ACM.
Asimi, Y., Amghar, A., Asimi, A., & Sadqi, Y. (2016). New Random Generator of a Safe
Cryptographic Salt Per Session. IJ Network Security, 18(3), 445-453.
Centenaro, M., Vangelista, L., Zanella, A., & Zorzi, M. (2016). Long-range communications in
unlicensed bands: The rising stars in the IoT and smart city scenarios. IEEE Wireless
Communications, 23(5), 60-67.
Chang, J. F. (2016). Business process management systems: strategy and implementation. CRC
Press.
Chowdhury, D. D. (2013). High speed LAN technology handbook. Springer Science & Business
Media.
Chung, U. S., Han, D. H., Shin, Y. J., & Renshaw, P. F. (2016). A prosocial online game for
social cognition training in adolescents with high-functioning autism: an fMRI study.
Neuropsychiatric disease and treatment, 12, 651.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 56
Colman-Meixner, C., Dikbiyik, F., Habib, M. F., Tornatore, M., Chuah, C. N., & Mukherjee, B.
(2014). Disaster-survivable cloud-network mapping. Photonic network communications,
27(3), 141-153.
Comer, D. (2015). Computer networks and internets. Pearson.
Coronel, C., & Morris, S. (2016). Database systems: design, implementation, & management.
Cengage Learning.
Danielson, C. K., McCauley, J. L., Gros, K. S., Jones, A. M., Barr, S. C., Borkman, A. L., ... &
Ruggiero, K. J. (2016). SiHLE Web. com: Development and usability testing of an
evidence-based HIV prevention website for female African-American
adolescents. Health informatics journal, 22(2), 194-208.
Davidson-Shivers, G. V., Rasmussen, K. L., & Lowenthal, P. R. (2017). Web-based learning:
design, implementation and evaluation. Springer.
Durumeric, Z., Ma, Z., Springall, D., Barnes, R., Sullivan, N., Bursztein, E., ... & Paxson, V.
(2017). The security impact of HTTPS interception. In Network and Distributed Systems
Symposium (NDSS 2017).
Gagliardi, A. R., & Alhabib, S. (2015). Trends in guideline implementation: a scoping systematic
review. Implementation Science, 10(1), 54.
Gagliardi, A. R., Marshall, C., Huckson, S., James, R., & Moore, V. (2015). Developing a
checklist for guideline implementation planning: review and synthesis of guideline
development and implementation advice. Implementation Science, 10(1), 19.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 57
Given, D. D., Cochran, E. S., Heaton, T., Hauksson, E., Allen, R., Hellweg, P., ... & Bodin, P.
(2014). Technical implementation plan for the ShakeAlert production system: An
earthquake early warning system for the West Coast of the United States (No. 2014-
1097). US Geological Survey.
Greenly, D., Duncan, M., Wysack, J., & Flores, F. (2015). Space Situational Awareness Data
Processing Scalability Utilizing Google Cloud Services. In Advanced Maui Optical and
Space Surveillance Technologies Conference.
Guesmi, R., Farah, M. A. B., Kachouri, A., & Samet, M. (2016). A novel chaos-based image
encryption using DNA sequence operation and Secure Hash Algorithm SHA-2.
Nonlinear Dynamics, 83(3), 1123-1136.
Gupta, S., & Gupta, B. B. (2017). Cross-Site Scripting (XSS) Attacks and Defence Mechanisms:
Classification and State-of-the-Art. International Journal of System Assurance
Engineering and Management, 8(1), 512-530.
Henke, K., Fäth, T., Hutschenreuter, R., & Wuttke, H. D. (2018). GIFT-An Integrated
Development and Training System for Finite State Machine Based Approaches. . In
Online Engineering & Internet of Things, 743-757.
Holland, E. C. (2016). IB Pedia: Informing Educators of the International Baccalaureate Middle
Years Program Through Collaborative Website Development.
John, S. K., & Swapna, K. (2017). A New SDLC Frame Work for Website
Development. AADYA-National Journal of Management and Technology (NJMT), 7,
132-142.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 58
Jovanović, B., Filipović, J., & Bakić, V. (2017). Energy management system implementation in
Serbian manufacturing–Plan-Do-Check-Act cycle approach. Journal of Cleaner
Production.
Krishnan, S. P. T., & Gonzalez, J. L. U. (2015). Google Cloud SQL. In Building Your Next Big
Thing with Google Cloud Platform (pp. 159-183). Apress.
Laporte, C. Y., Hébert, C., & Mineau, C. (2014). Development of a social network website using
the new ISO/IEC 29110 standard developed specifically for very small entities. Software
Quality Professional, 16(4), 4-25.
Ma, W. M., & Lee, J. (2015). Study on Applying Agile Project Management and UML for
Website Development-E-Flower Store as Example.
Microsoft (2018). Securing Remote Access. Retrieved From
https://msdn.microsoft.com/en-us/library/cc875831.aspx
Microsoft (n.d.). Security Considerations for End Systems. Retrieved From
https://msdn.microsoft.com/en-us/library/cc723491.aspx
Mukhopadhyay, D., & Kulkarni, S. (2017). An Approach to Design an IoT Service for Business
—Domain Specific Web Search. . In Proceedings of the International Conference on
Data Engineering and Communication Technology, 621-628.
Olsson, M. (2016). Using PHP. In PHP 7 Quick Scripting Reference (pp. 1-4). Apress.
Oracle (2000). 10 Security Considerations. Retrieved From
https://docs.oracle.com/cd/A97335_02/apps.102/a86202/chap10.htm#1002570
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 59
Rastogi, A., & Dadheech, A. (2017). Design and Development an Embedded System for
Multichannel Data Acquisition for Use in Networked Monitoring System. In Proceeding
of International Conference on Intelligent Communication, Control and Devices , 1013-
1018.
Rawat, P., Singh, K. D., Chaouchi, H., & Bonnin, J. M. (2014). Wireless sensor networks: a
survey on recent developments and potential synergies. The Journal of
supercomputing, 68(1), 1-48.
Schilling, R. D., Beese, J., Haki, M. K., Aier, S., & Winter, R. (2017). Revisiting the Impact of
Information Systems Architecture Complexity: A Complex Adaptive Systems Perspective.
New York: London.
Schwaninger, M., & Klocker, J. (2018). Holistic System Design: The Oncology Carinthia Study.
Social Systems Engineering: The Design of Complexity, 7702, 235.
Shi, Y. Q., Guo, X. Y., & Xu, H. Y. (2017). Research of Components Identification and
Extraction Based on Software Design Documentation. In Computer Science and
Technology: Proceedings of the International Conference (CST2016), 546-555.
Thüm, T., Kästner, C., Benduhn, F., Meinicke, J., Saake, G., & Leich, T. (2014). FeatureIDE: An
extensible framework for feature-oriented software development. Science of Computer
Programming, 79, 70-85.
Vezzoli, C. K., Srinivasan, A., Xin, L., Fusakul, M., Sateesh, D., & Diehl, J. C. (2017). Product-
service system design for sustainability. London: Routledge.
West, R., Raw, M., McNeill, A., Stead, L., Aveyard, P., Bitton, J., ... & Borland, R. (2015).
Health‐care interventions to promote and assist tobacco cessation: a review of efficacy,
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 60
effectiveness and affordability for use in national guideline
development. Addiction, 110(9), 1388-1403.
Wodehouse, C. (n.d.). 8 Tips for Better Mobile Application Security. Retrieved From
https://www.upwork.com/hiring/mobile/mobile-application-security/
Wooden, D. (n.d.). Consider how CRM can benefit your business and accelerate greater success.
January 08, 2018. Retrieved From https://www.successwithcrm.com/blog/bid/51594/7-
key-benefits-to-your-business-with-crm
Alqwbani, A., Zuping, Z., & Aqlan, F. (2014). Big Data Management for MMO Games and
Integrated Website Implementation. Global Journal of Computer Science and
Technology, 14(2-B), 5.
Devi, K., & Sharma, A. K. (2016). Implementation of a Framework for Website Quality
Evaluation: Himachal Pradesh University Website. Indian Journal of Science and
Technology, 9(40).
Christensen, Jesper M. (15 July, 2009). Considering Remote Access for IT Professionals.
Retrieved From http://techgenix.com/considering-remote-access-it-professionals/
Sheldon, R. (February, 2012). Mobile data encryption techniques: On-device and on-the-go.
Retrieved from http://searchmobilecomputing.techtarget.com/tip/Mobile-data-encryption-
techniques-On-device-and-on-the-go
Geier, E. (14 February, 2012). How to Choose a Router for Your Business. Retrieved From
https://www.pcworld.com/article/249954/how_to_choose_a_router_for_your_business.ht
ml
Document Page
VERBANIA INC. SOCIAL MEDIA IT SOLUTION 61
Parandehgheibi, M., & Modiano, E. (December, 2013). Robustness of interdependent networks:
The case of communication networks and the power grid. In Global Communications
Conference (GLOBECOM), 2013 IEEE (pp. 2164-2169). IEEE.
Strobel, R., Stolle, R., & Utschick, W. (2013, December). Wideband modeling of twisted-pair
cables for MIMO applications. In Global Communications Conference (GLOBECOM),
2013 IEEE (pp. 2828-2833). IEEE.
Anicas, M. (21 July, 2014). An Introduction to OAuth 2 | DigitalOcean. Retrieved from
https://www.digitalocean.com/community/tutorials/an-introduction-to-oauth-2
Microsoft (12 August, 2014). Secure Remote Access in Small and Midsize Businesses. Retrieved
From https://technet.microsoft.com/en-us/library/dn629457(v=ws.11).aspx
Ellingwood, J. (2015, March 5). 7 Security Measures to Protect Your Servers | DigitalOcean.
Retrieved from https://www.digitalocean.com/community/tutorials/7-security-measures-
to-protect-your-servers
Nicholson, J. (2015, June 3). Server security best practices | InMotion Hosting. Retrieved From
https://www.inmotionhosting.com/support/website/general-server-setup/server-security-
best-practices
Imran, Zain (13 October, 2015). Best Practices for Securing Remote Access. Retrieved From
http://resources.infosecinstitute.com/best-practices-for-securing-remote-access/#gref
Galaxkey (31 March, 2016). Simple Ways to Better Secure Enterprise Email Communications.
Retrieved From https://www.galaxkey.com/simple-ways-to-better-secure-enterprise-
email-communications/
chevron_up_icon
1 out of 61
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]