Senario
A former dot com company, Verbania, Inc., shut down in 2001 because of the Internet bubble burst. It is attempting to reinvent and launch itself once again. It is looking for a complete information technology (IT) solution that includes hardware, software, networking, and security, among other requirements. Verbaniaâ€s core product will be a social networking Web site and mobile application that rivals the big names that currently represent social media. It is attempting to find the best features and consolidate them into its product. The company is looking to establish its headquarters in the Silicon Valley region in California. The executives at Verbania are looking for your company to propose a solution that will endure future Internet trends.

The basic user requirements for the social networking solution must include but are not limited to the following:

Creating an account and a profile
Creating discussion forums and posting
Search capability for people
Gaming component
Calendar component for reminders
Instant messaging and Voice Over Internet protocol (VOIP)-type calling between friends
Secure account and email feature
Availability seven days a week

The basic company requirements for the social networking solution must include but are not limited to the following:

Collect, store, back up, and mine user data to better understand users.
Integrate collected data with customer relationship management (CRM) to improve business and customer support processes.
Analyze user patterns, behavior, and generated traffic to present to advertisers.

Requested functionality for the social networking application includes the following:

Account setup and log-in functionality
Creating a profile
Adding or removing friends
Posting to a discussion area

__________________________________________________________________________________________
This assignment is a document addressing security.
Consider the overall team project solution (hardware and software) relative to security. Create and submit a 3-4-page Word document defining your recommendations concerning security. Be sure to articulate reasons for specific choices. Include in your document an explanation about the relationship between the IT security policy and the chosen security mechanisms for your overall solution. Be prepared to discuss your thoughts with the teamâ€s Security Specialist.
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount! Use Discount Code “Newclient” for a 15% Discount!NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post 3-to-4-pages-on-secuity appeared first on Essay Fount.


What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


"Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!"