Anda di halaman 1dari 4

IST 110S Dr.

Kvasny February 29, 2013 IT Careers Assignment Company Name and Logo ITIS: Innovative Technology Information Security http://sphotos-a.xx.fbcdn.net/hphotosash3/14869_10151435409033470_1350047075_n.jpg Team Members Adelina Richards: Project Manager Luke Gjondla: Software Engineer Josh Ware:Database Architect The Problem and Solution Information security is in a tumult of activity involving hackers and information acquisition. Current security parameters are filled with inefficient means of protecting the information of the user and the organization. The internet was built on an infrastructure that has long been declared outdated and filled with vulnerabilities specific to the user. Most accounts are protected and backed by strings or characters that could theoretically be broken using programs constructed to code break. However, new forms of personal security are emerging to accommodate the vulnerabilities that exist and redefine authentication as a whole. Among the many technologies emerging one system stands apart from the rest. This system is known as ITIS and it is being developed to accommodate identity authentication at the Pennsylvania State University. ITIS is being developed and engineered to give each user a personalized experience that authenticates their identity utilizing a unique approach. ITIS exploits current technology to work with the user to validate him/her. Furthermore, ITIS begins at the basic level of physical identification, by utilizing student identification cards. Each student identification card is assigned a very complex and unique shape similar to a bar code that cannot be replicated. Subsequently, this fingerprint is read using an IR or infrared scanner. An IR scanner is being utilized, because most computers are equipped with such technology and is very efficient in reading as well as recognizing minute fluctuations. However, user validation does not end with the complex pseudo-image. In order to further ensure proper identity ITIS utilizes and exploits cameras for facial recognition. After validating the digital imprint the user is prompted to take a picture where the image is sent to a massive collection or conglomerate of servers where a match is either returned or a message is sent to a database administrator notifying suspicious activity. The facial recognition system mimics the voice recognition system that is

currently being used by Google. Databases and servers will store data that shall be used to crossreference user input to help validate user identification. Each aspect uses and incorporates technology that is readily available and viable to help distinguish users. ITIS aims to use what is available as opposed to creating and engineering technology that may be out of reach as a well expensive. In addition, the same user validation system shall be available on the iOS store as well as Google PLAY to allow users to gain access to data and files that will be stored on the Penn State cloud. The same methodology and system will be used, but on a smaller scale with smart phones as well as tablets. Intrusions will be minimized, because the system is built around unique aspects of the user that a hacker cannot replicate. ITIS aims to protect the user, but also incorporates convenience as well as availability to streamline user experience. Personnel Project Management is a crucial job that transforms ideas and plans about a project into a reality. They are constantly conscience of budget, deadlines, and collaboration. April Ellion says, "We bring order to chaos" (Best). In order to be a project manager, one must have strong interpersonal skills, leadership skills, time management, and be smart with money. They serve as a bridge between the business and technical sides of the project, talking to clients as well as forming plans for the execution of the project. Considering its scope, project management comes with long hours and high stress (Cooperider). They are generally paid between $50,000 and $150,000 based off of previous experience and the scope of the project(glass door). Around three to eight years of IT experience or a MBA and or a Project Management Professional Certification is required for this job, and classes like IST 30:Project Management, can help a student in IST reach that goal(Best).

Software Engineers develop and maintain applications that human beings use on a daily basis to carry out actions relevant to functioning in a world engulfed with evolving technology. Software engineers analyze the needs of the user and design as well as develop hardware, software, and systems (Computer Software Engineer). Software engineers work in a very broad field of study and can choose to specialize in a specific subset or facet of development. Software engineers typically have a bachelors degree in a relevant field of study, and may be further trained by an employer, depending on the needs and expectations of the employer (Computer Software Engineer). Software engineers must be able to use critical thinking to help solve specific problems that are presented. With an increase in technology and in influx in increase in digital applications the need for software engineers will only rise. Software engineers must learn new skills if they wish to remain in this advancing field (Computer Software Engineer). Subsequently, software engineers must be able to accommodate change and adapt to emerging programming languages that may be more efficacious in a certain situation. Software engineers

should be well verse in: Java, Python, C++, Java Script, SQL, and many other programming languages. According to GlassDoor, a website that publishes salary figures of different professions, the median salary for a software engineer is anywhere from sixty one thousand to one hundred thousand dollars (An inside Look). Software engineering is becoming pervasive and prevalent in modern day society as a result of modern day computing. This dependency was sparked by the boom of the personal computer and shall continue to progress as well as gain momentum. The database architect is responsible for meeting all of the data needs of the company. They must be able to design a database that will organize data in a usable fashion and that can grow with the companys acquisition of new data. This includes ensuring that the system design meets the business requirements of the company while using the correct data architecture for the companys data. A store will have a different set of data needs than an aircraft manufacturer. The database architect must be able to maintain the database so that all data is quickly available and that old data does not get lost when new data enters the system. New data in the system must be assessed on how it relates to the company and organized accordingly. According to Glass Door, a website that gives an inside look at jobs, database architects have an average annual salary somewhere between $57,000 on the low end and $124,000 on the high end. A Bachelors Degree in Information Science or similar field and a further minimum of five years system design is required for this job. As the amount of data used by the worlds data continues to grow each year without any sign of stopping the number of database architects needed will also grow. There will always be a need for someone to assess and organized data in a way that is highly efficient and tailored to the companys needs.

Budget The overall budget for the project was $1,013,515, including personnel, marketing, and technology costs. Personnel costs totaled at $211,000, where the project manager will be paid $71,000, the software engineer will be paid $60,000, and the database engineer will be paid $80,000.The marketing was composed mostly of advertisement and sharing the idea with the general public. $200 will be spent on posters; $315 will be spent on online advertising on popular sites like facebook or twitter. Informational how-to videos will be done for free by IST students. Hence, the total marketing costs will be $515. The most expensive part of the budget is the technology, since so much software and hardware will be required for the project. To operate, we will rent a facility for around $12,000. We will need copious amounts of storage space and servers, which would total to around $1,000,000. We would also need testers to perform maintenance on the software, in the SDLC cycle. The students shall either receive credit or $10 an hour, which we estimate will total to around $1,000. We plan to raise the money from Penn State Alumni who care deeply about information security.

Works Cited "An inside Look at Jobs & Companies!" Glassdoor. N.p., n.d. Web. 28 Feb. 2013. "Best Jobs in America 2009." CNNMoney. Cable News Network, n.d. Web. 25 Feb. 2013. "Computer Software Engineer." U.S. Bureau of Labor Statistics. U.S. Bureau of Labor Statistics, n.d. Web. 28 Feb. 2013. Cooprider, Dave. "IT Project Manager Skill Sets - Salary Stories." 'Salary Stories'PayScale, 22 Apr. 2010. Web. 25 Feb. 2013. "Database Architect." Job in Chesterfield 63017, Missouri US. Newspaper Data Exchange, n.d. Web. 28 Feb. 2013. <http://jobview.monster.com/database-architect-job-chesterfield-mo-us119009554.aspx>. Oracle Database Architect." Job in Costa Mesa, California US. Oracle, n.d. Web. 28 Feb. 2013. <http://jobview.monster.com/oracle-database-architect-job-costa-mesa-ca-us-120071128.aspx>.

Anda mungkin juga menyukai