[Your tasks to take place this week according to your project schedule. Provide the status of the task. If stalled or changed, state why. What did you accomplish this week that is in line with your scheduled tasks?]
Task 3: Review all paper work. Proceed with the plan.
Task 4: Continue research and make modifications as needed. Schedule fourth meeting.
Task 5: Weekly confirmation of meeting via e-mail.
After reviewing all paper work and proceeding with the plan, we
continued research and if it will be necessary to make modifications as
needed. [In Progress]
1) Sending weekly a confirmation via e-mail confirming the meeting.
I have updated the information from our meeting, as per committee
input and gave a copy to Dr. Robinson for reviewing and proofing. He
made some notes and I have updated the planned for our next meeting. Our
draft or outline has been looked pretty good; it will be o finalized in
our next meeting. [Completed]
Task 3, 4 and 5 has been completed.
We accomplished a great deal this week . I was very happy. It was
amazing on how all group has input very quickly and it has helped us a
better strategies, after revising and discussing with Dr. Robinson and
other staff.[In Progress]
I have completed all tasks succesfully, and of course, I have continued
to analysis this big project and looking for more information, more
specific in security policies for our network.
[What came up that needed to be addressed? Did you run into a problem or roadblock? How did you solve it? What important decisions did you make this week that impacted your project? What were the key tasks you performed this week?]
After an in depth discussion with our stakeholders concerning the feedback and this
project, we have been offered some informative stories about
some of the projects that have been worked on and a current
project that is in the process of completing. We also heard about security issues that the College has faced in the past and how these have been solved. We realized that the new network must inherit all of these past security issues and implement equivalent solutions just to start at the same security level it already has. We continue to improve the security in our network, and have been re-testing as many times as necessary to be
ensure reliability in this important aspect of the project's operation.
The security is not simply involving user passwords, is our work to implement
specific controls and policies to cover the access, servers, network
components, and to monitor and be able to collect network traffic details and data necessary to assist in the investigation of "computer aided" crime.
For instance, we decided to implement a stronger authentication, including
things like more stringent password rules and a faster inactivity
logout. Also, we cannot forget the backups which are very
important, and they should be kept in highly secure areas where they can only be accessed by specific and authorized personnel.
[Answer all questions below.]
1) What helpful feedback did you get in the class (instructor,
classmates) and outside the class (user, stakeholder, beneficiary,
mentor, expert advisor, others)? What did you learn from this feedback?
The feedback that I mainly received was very positive from the stakeholders as well as the
committee members who were very optimistic. We were very excited that we were getting closer to a final draft.
2) What resources did you use this week (e.g., people, money,
equipment, systems, or software)? Did you add new resources? What was
This week, we used the Internet, MS Word, Email system to Dr. Robinson, and
committee members. Also, we mapped the server and began testing our network workstations.
3) What research did you perform this week that was assisting and/or
literature based? What is your findings/learning?
It really has been a wonderful experience working with a knowledgeable
and dedicated team. In addition, I have learned more in the mapping,
testing, and have been reading some references about security.
4) What did you learn this week in general in producing your project?
I have learned more than I could have expected with Dr. Robinson who
has provided guidance in the security aspects of the network including, how vulnerable our network could be, the implementation of powerful tools, and the need for the Computer Incident Response Team as a permanent crew specially trained to deal with not only "pure" computer security incidents on the network but also capable of properly responding to such "computer aided" crimes as personal threats over email, etc. In fact, I have also used the Ethical Hacking book for the only purpuse to use a proper security in our network.
[Answer all questions below.]
1) What went well this week? What didn't?
Excellent very approachable, because we can work together and coordinate our efforts to improve our systems defenses from the vulnerabilities. I think that it was an important step in our project. However, we did not encounter any serious problems.
2) How well did you stick to your project schedule?
It has been on schedule, there have been some roadblocks, but not something that we
cannot solve within the planned time frame.
3) How prepared are you to conclude your project in Unit 10 as required
in this course?
I am very prepared to conclude my project as required for this course.
4) How likely is it that you will need to resort to your contingency
There have been minor setbacks and complications concerning specific details of the network implementation project but overall these have been expected and the project time frame has allowed for this such that everything is proceeding according to schedule. At this time no major problems have arisen that might indicate the need to resort to my contingency plan.