Faster Computing was impressed with your presentation. The company is interested in moving forward with the project, but the senior management team has responded to the presentation with the following questions and concerns:The deliverable for this phase of the project is a memo. There is no minimum or maximum page requirement, but all of the questions must be fully answered with sufficient detail. The recommended format is to respond to the questions in a bulleted format. Provide sufficient detail to fully address the questions. You must cite at least two quality sources.
Need assignment help for this question?
If you need assistance with writing your essay, we are ready to help you!
Order Now
Template
Go2Linux, Inc.
Provide a brief summary of your recommendation
of a specific version of Linux. Explain how your choice meets the business need of Faster
Computing, Inc.
The bold text questions below represent the specifics you need to focus on. For
each question, refer to your Implementation Proposal (Assignment #1) for consistency. In this
assignment you will provide technical details for Information Technology personnel.
Any example Linux commands should be properly displayed (e.g., in lower case)
and any acronyms explained on first use (e.g., Secure Shell (SSH)).
·
How will you implement security in the Linux systems?
o
Start by outlining how you plan to migrate the existing Windows
Servers to Linux. Ho
w will users authenticate? What technologies will be used? What
kind of access controls will be used?
o
Will you recommend simple authentication mechanisms or employ
multiple factors? For passwords, what policy(ies) will you recommend?
o
How will you handle data-at-rest and data-in-transit?
o
How will you enforce software installations and control which
applications may run on the network?
·
End users have expressed some concern about completing their day-to-day tasks on
Linux. How would activities such as email/web browsing work? How would they work
with their previous Microsoft Office files?
o
There are several ways to address the use of existing applications.
Conduct research to determine the available options.
o
For web browsing, you should provide at least 2 alternatives and
consider the impact to initial configuration (bookmarks, extensions, plugins)
o
For Microsoft Office, provide a full discussion on how users will
continue to open/edit/save office docs in the Linux environment. You should provide at
least 2 alternatives.
·
The current Windows administrators are unsure about administering Linux systems. How
are common tasks, such as process monitoring and management, handled in Linux?
How does logging work? Do we have event logs like we do in Windows?
o
Discuss your logging and monitoring approach in this section. You
should include the location of specific Linux log files.
o
Discuss how admins can manage processes. It may be helpful to
compare/contrast in familiar terms (e.g., the Windows Event Viewer). Discuss how to
stop processes, including the corresponding commands.
·
Some folks in IT raised questions about the Linux flavor that was recommended. They
would like to see comparisons between your recommendation and a couple of other
popular options. What makes your recommendation the best option?
o
o
The key differentiator is …
·
How does software installation work on Linux? Can we use existing Windows software?
o
Discuss a Linux package management specific to your distro. How will
you automate updates?
o
Discuss how specific Windows applications can be installed and used,
if at all.
·
How can Linux work together with the systems that will continue to run Windows? How
will we share files between the different system types?
o
Discuss how file and printer sharing will work. Will the users need to
do anything “different”? What underlying technology will need to be implemented?
Warm regards,
Go2Linux
Linux Deployment Manager
References
[1] Red Hat Enterprise, “Encryption,” Chapter 3, Section 3.1.3. Red Hat, Inc., 2019. [Online].
Available: https://access.redhat.com/documentation/en-s/red_hat_enterprise_linux/6/htm
l/security_guide/chap-security_guide-encryption#sect-Security_GuideLUKS_Disk_
Encryption. [Accessed December 1, 2019].
[2] TestOut Labsim, “TestOut Linux Pro,” Chapter 15, Section 15.8.3. TestOut, 2019 [Online].
Available: https://cdn.testout.com/client-v5-1-10-568/startlabsim.html. [Accessed
December 6, 2019].
… and so on …