Project Proposal for Datacenter Network Security

 Project Proposal for Datacenter Network Security

Task 1 of 2 Tasks. Will be separated by questions to improve focus.

Attached will be Proposal Template and the CapStone Project previously written, a rubric, as well as the question below in Docx form.

IMPORTANT: This proposal will be on the Capstone docx attached. Use that to formulate this proposal.


Competency 981.1.1: Capstone – The graduate integrates and synthesizes competencies from across the degree program and thereby demonstrates the ability to participate in and contribute value to the chosen professional field.

Task 2: IT Proposal


For this task, you will use the attached “IT Capstone Proposal Template.”

This task will consist of a proposal for a major IT project that was approved by a course mentor. The proposal will identify a problem and propose an IT solution to the problem. Your proposal will also explain how you plan to implement your project to successfully resolve the problem, including a methodology for project development.

Your work for task 2 will not be evaluated until the appropriate forms in task 1 have been submitted and evaluated.


Discuss (suggested length of 15–20 pages) your project in a narrative proposal by doing the following:

A. Proposal Overview (suggested length of 2–4 pages): Create an IT proposal and project overview by doing the following:

1. Identify the problem.

2. Propose an IT solution.

3. Explain the plan to implement this proposed project.

B. Review of Other Work (suggested length of 3–4 pages): Provide a review of four other works that have been completed on your topic and that you will use as background for this proposed project.

Note: These other works may include interviews, white papers, research studies, or other types of work by industry professionals.

1. Describe how each work reviewed relates to the proposed development of this project.

C. Rationale (suggested length of 1–2 pages): Provide a rationale showing the need for your proposed project.

D. Current Project Environment (suggested length of 2–3 pages): Provide a description of the current state of the project environment or the current state of affairs that makes your proposed project necessary.

E. Methodology (suggested length of 1–2 pages): Explain how you will apply a standard methodology (such as ADDIE or SDLC) for the implementation of your project.

F. Project Goals, Objectives, and Deliverables (suggested length of 3–5 pages): Explain the goals, objectives, and deliverables for the project, including the following information:

1. Provide a table showing the relationship between goals and their supporting objectives, including outcomes or deliverables.

2. Provide a description of project goals, objectives, and deliverables.

G. Project Timeline with Milestones (suggested length of 1–2 pages): Provide a projected timeline with milestones for your project, including the duration and start and end dates of each milestone.

H. Outcome (suggested length of 1–2 pages): Reflect on how you will measure the success and effectiveness of this project.

I. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

Note: For definitions of terms commonly used in the rubric, see the Rubric Terms web link included in the Evaluation Procedures section.

Note: When using sources to support ideas and elements in an assessment, the submission MUST include APA formatted in-text citations with a corresponding reference list for any direct quotes or paraphrasing. It is not necessary to list sources that were consulted if they have not been quoted or paraphrased in the text of the assessment.

Note: No more than a combined total of 30% of a submission can be directly quoted or closely paraphrased from outside sources, even if cited correctly. For instruction on using the APA style, please refer to the APA Handout weblink included in the APA Guidelines section.

Datacenter Network Security (2)




Solution Preview

I. Proposal Overview
The Client Situation
Technology has exponentially been growing over the last few decades at Scotin Technology Company, a new company dealing in enabling both debit and credit payments. New technological capabilities and innovations have entirely revolutionalized transactions and business in the company. The growth of these new technologies and advancement in information technology has been accompanied by new threats to the security of the information infrastructure.

(4,819 words)

Open chat
Contact us here via WhatsApp