Faster Computing was impressed with your presentation. The company is interested in moving forward with the project, but the senior management team has responded to the presentation with the following questions and concerns:
- How will security be implemented in the Linux systems—both workstations and servers?
- End users have expressed some concern about completing their day-to-day tasks on Linux. How would activities such as web browsing work? How would they work with their previous Microsoft Office files?
- The current Windows administrators are unsure about administering Linux systems. How are common tasks, such as process monitoring and management, handled in Linux? How does logging work? Do we have event logs like we do in Windows?
- Some folks in IT raised questions about the Linux flavor that was recommended. They would like to see comparisons between your recommendation and a couple of other popular options. What makes your recommendation the best option?
- How does software installation work on Linux? Can we use existing Windows software?
- How can Linux work together with the systems that will continue to run Windows? How will we share files between the different system types?
The deliverable for this phase of the project is a memo. There is no minimum or maximum page requirement, but all of the questions must be fully answered with sufficient detail. The recommended format is to respond to the questions in a bulleted format. Provide sufficient detail to fully address the questions. You must cite at least two quality sources.
Template
Go2Linux, Inc.
Provide a brief summary of your recommendation
of a specific version of Linux. Explain how your choice meets the business need of Faster
Computing, Inc.
each question, refer to your Implementation Proposal (Assignment #1) for consistency. In this
assignment you will provide technical details for Information Technology personnel.
and any acronyms explained on first use (e.g., Secure Shell (SSH)).
·
How will you implement security in the Linux systems?
o
Servers to Linux. Ho
w will users authenticate? What technologies will be used? What
kind of access controls will be used?
o
multiple factors? For passwords, what policy(ies) will you recommend? needed> o needed> o applications may run on the network? · End users have expressed some concern about completing their day-to-day tasks on Linux. How would activities such as email/web browsing work? How would they work with their previous Microsoft Office files? o Conduct research to determine the available options. o consider the impact to initial configuration (bookmarks, extensions, plugins) needed> o continue to open/edit/save office docs in the Linux environment. You should provide at least 2 alternatives. · The current Windows administrators are unsure about administering Linux systems. How are common tasks, such as process monitoring and management, handled in Linux? How does logging work? Do we have event logs like we do in Windows? o should include the location of specific Linux log files. o compare/contrast in familiar terms (e.g., the Windows Event Viewer). Discuss how to stop processes, including the corresponding commands. · Some folks in IT raised questions about the Linux flavor that was recommended. They would like to see comparisons between your recommendation and a couple of other popular options. What makes your recommendation the best option? o o · How does software installation work on Linux? Can we use existing Windows software? o you automate updates? o if at all. · How can Linux work together with the systems that will continue to run Windows? How will we share files between the different system types? o do anything “different”? What underlying technology will need to be implemented? as needed> Warm regards, Go2Linux Linux Deployment Manager References to be used. Ensure you utilize in-text citations in the body of your paper as appropriate.> Available: https://access.redhat.com/documentation/en-s/red_hat_enterprise_linux/6/htm l/security_guide/chap-security_guide-encryption#sect-Security_GuideLUKS_Disk_ Encryption. [Accessed December 1, 2019]. Available: https://cdn.testout.com/client-v5-1-10-568/startlabsim.html. [Accessed December 6, 2019]. … and so on …