IT 4983 Capstone Section 01 Project 11 Group 1
Kennesaw State University - Spring 2022
Kennesaw State University - Spring 2022
In this project, we are securing a small business's servers by applying security concepts, planning, and implementation.
In this project, our team will be filling the role of IT consultants for a small business called Akwaaba. Akwaaba is a steakhouse serving Caribbean-inspired cuisines with locations in New York City, Los Angeles, and Atlanta. It will be our job to secure the web servers from internal or external threats. Akwaaba has a virtual computer system with web servers that need a security plan and implementation. In order to accomplish this task, we will be analyzing the web servers as well as understanding the small business and their needs. The requirements for the project are gathered through the Project Kick-off, where the project sponsor, Dr. Lei Li, led the meeting.
Identifying the small business's security policy. It important to understand who and what personnel have access to what. This will help with limiting exposure in the long run.
Building the business's security policy. This is an important task because we need to be able to identify the larger threats in the system, which aids in pinpointing efforts in security planning and implementation.
Technical Plan for the client.
Updated Gantt chart.
Implementing the security tools and software. This is important because we use our planning and information gathered from the previous milestone.
Use vulnerability analysis tools to inspect and scan the web servers.
Updated Gantt chart.
Report of the vulnerability of the targeted server. The technique used and what the vulnerability was with proof.
Report of the security of our web server's when another team is conducting penetration testing.
Updated Gantt chart.
A detailed final report with the assessment, solutions, and implementation. It will include the solution that worked under real stress from attacks, as well as the results of our security efforts.
This will reflect the entire project including our own penetration testing of another team’s server.
Our team is highly motivated to research and implement a security solution for our client's network. Our team is divided between two roles excluding the team leader. While the two roles are divided unevenly, team members are always willing to provide assistance to another member when necessary.
As the team leader for our project, Rebekah Ayers carries the responsibilities of coordinating meetings and communication, delegating project tasks to team members, serving as the first point of contact for any project stakeholders, and overseeing the initiation and conclusion of the project.
Technical Leads - Elisa Mendez, George Katsiaris, Korey Karch
As the team members equipped with the required technical expertise, the responsibilities of technical lead members include enabling intelligent, timely, and professional research, implementation, and deployment of solutions for the project.
Technical Writer - Henry Backes
As the expert in technical documentation and presentation, the responsibilities of the technical writer include guaranteeing professional document design and language, creating structured charts and graphs to support team research, and ensuring all technical implementation is effectively presented to stakeholders.