IT Infrastructure and Security Management Plan

Verified

Added on  2023/03/31

|12
|2522
|464
AI Summary
This document discusses the importance of IT infrastructure and the need for a security management plan. It also highlights the security issues in the current IT infrastructure and provides recommendations for improvement.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: IT INFRASTRUCTURE
IT Infrastructure
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1IT INFRASTRUCTURE
Table of Contents
Introduction:....................................................................................................................................2
Summarization of the Current IT Infrastructure:.............................................................................2
Security Issues that are currently present in the IT Infrastructure:..................................................3
Database Storage:........................................................................................................................3
End User Devices:.......................................................................................................................4
Security Management Plan for the Proposed IT Infrastructure:......................................................5
Security Measures for the Database Storage:..............................................................................5
Security Measures for the BYOD Environment:.........................................................................6
Virtualization:..................................................................................................................................6
Network Virtualization:...............................................................................................................7
Storage Virtualization:.................................................................................................................7
ITIL:.................................................................................................................................................7
Performance concern of the IT Infrastructure:................................................................................8
Conclusion:......................................................................................................................................9
References:....................................................................................................................................10
Document Page
2IT INFRASTRUCTURE
Introduction:
Security of the IT infrastructure network is very much important for the proper security
of the network. The IT security is the multi discipline subject requirement which needs different
types of skill sets and knowledge areas. The IT infrastructure is very much important for
protection of the system infrastructure. For the security of the IT infrastructure mainly
information technology is utilized as capability of this system is becoming more and more
available. It is very much important to protect the organizations from various of IT related
security issues so that smooth business process can be achieved.
In this document the case study of AusEd has been described. From the case study, it has
been assessed that the AusEd is consisting specific type of IT network system for managing their
business operation. Currently, there are various of security concerns which are related with the
IT infrastructure of the AusEd. Due to this factor in this report some recommendation for the
current IT infrastructure of the AusEd will be discussed. In this discussion the present IT
infrastructure of the AusEd will be summarized. Following that the important security concerns
related with the current infrastructure will be discussed in this case.
Summarization of the Current IT Infrastructure:
From the current IT infrastructure it has been assessed that there are various of
components which are associated with the current IT infrastructure. Currently there are several of
servers that are associated with the current IT infrastructure. The main important servers are the
file server, application server, MYOB server, web server, local server, database server, active
directory server, communication server and the hybrid backup server. Here in this context all the
Document Page
3IT INFRASTRUCTURE
server plays an important role for the organization. Considering the switches for the network
there are mainly two types of switches which has been utilized in this case which are the low
level switches and fiber channel switch. Router and firewall is also implemented within this
presented IT infrastructure. Wireless access points have been also implemented for this IT
infrastructure system. Currently with this IT infrastructure system cloud application is also
functional which includes Microsoft Office 360 Online, online backup system, some
interconnected networks and the Moodle System. User end devices are also connected with the
IT infrastructure. These devices are mainly the Personal Computer system of the users. Overall
this network connection includes Wi-Fi, Internet, fiber channel core network, Gigabit Ethernet
and NFS. All the routers and the firewall of the system is directly connected with the internet. In
this case the fiber channel buses are connecting the routers and the firewalls with the servers that
are present within the system. For the online backup system Microsoft Azure platform has been
selected in this case. Main storage of the current IT infrastructure directly connected with the file
server through iSCI, NFS and Gigabit Ethernet. Students of the AusEd and the headquarters staff
PC are directly connected with the main storage for accessing the study materials.
Security Issues that are currently present in the IT Infrastructure:
From the analysis of current network IT infrastructure of the AusEd it has been assessed
that there are currently some important security concerns are present with the database storage
and with the end user devices. In the following two of these issues will be described briefly.
Database Storage:
The database is currently used by the AusEd organization for storing all the study
materials. This component is one of the most important components of the current IT

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4IT INFRASTRUCTURE
infrastructure as all the important crucial data of the organization is stored within the database
(Acemoglu, Malekian and Ozdaglar 2016). The database storage faces some of the extreme
security vulnerabilities which are important to mitigate. The database injection attacks are one of
the most important concerns which need to be mitigated. In this case there are two types of major
injection attack. One is the SQL injection attack and the NoSQL injection attack. The NoSQL
injection attack mainly targets the big data platforms. Through both of the attack, the attacker
will gain access to the entire database system unethically.
Storage media exposure is also a big security concern in this case. Backup type of storage
media always remain vulnerable to different types of attack as in most of the cases type of
backup storages remains completely unprotected from various of attacks. Due to this reason
various types of security related attacks is done on the database backup disks. Also, this type of
data storages faces risk regarding handling of the sensitive information (Keeble and Wilkinson
2017). This type of issue occurs within the system as in many of the cases there can be low level
of access of access to some sensitive data which actually puts data into the risk.
End User Devices:
The end user devices are also vulnerable in the present IT infrastructure of the AusEd.
The end user devices is creating a huge security issue in this case of the IT infrastructure of the
AusEd as currently this organization practices the BYOD. As per the BYOD the employees need
to do their official works on their personal device which leads to various of security related
concern. Data leakage is one of the most important concern which occurs due to this practice of
BYOD. As the employees are using their personal device for accessing the organizational data
possible data breach can occur from their personal devices. Due to this organization can face a
huge issue regarding the data leakage (Ajamieh et al. 2016). The accessed data can be also lost
Document Page
5IT INFRASTRUCTURE
or misused due this type of BYOD practice. If the personal devices of the employees are affected
by the malwares then it is very much possible that the whole system of the organization can get
affected by the malwares. Controlling the end user devices will also become very much hard due
to the implementation of BYOD practice. Mismanagement of the devices can create problem for
the organization as there can be damaged organizational data due to this factor. Data related
security also occurs in the system due to this type of factors.
Security Management Plan for the Proposed IT Infrastructure:
From the previous discussion is has been assessed that the main security concerns which
is currently faced by the IT infrastructure are the database storage related issue and the end user
device related issue. This type of security issues need to be mitigated properly so that smooth
business flows of the AusEd organization can be achieved (Dahiya and Mathew 2016). Thus in
the below section security measurement plan for the identified security related issues will be
discussed.
Security Measures for the Database Storage:
From the previous discussion it has been assessed that main security issue which is
currently faced by the AusEd regarding the database storage are the database injection attacks
and the storage media exposure related issue. For mitigation of both of the security concerns it is
very much important to follow some security solution. In the following section these are
discussed.
First the sensitive data for the organization need to be classified and vulnerability of the
database need to be assessed (Perlman, Kaufman and Speciner 2016).
The user access rights must be managed in the proposed IT infrastructure solution.
Document Page
6IT INFRASTRUCTURE
Some configuration need to be made within the proposed IT infrastructure so that it will
be able to block malicious types of web requests.
Security Measures for the BYOD Environment:
Proper security measures also need to be implemented to work in the BYOD
environment. The security measures are the following:
To protect against the data leakage in the BYOD environment mobile device
management system need to be integrated with proposed IT infrastructure for the AusEd
(Bratthall Tideman and Lindström 2018).
In this case it is recommended to implement a VPN service with the current IT
Infrastructure network so that sensitive data remains hidden. By this sensitive data can be
protected from being leaked.
It is also recommended in this case to integrate a file integrity monitoring system in the
proposed IT infrastructure network so that the malware attack can be detected and
mitigated efficiently (Keyes 2016).
Virtualization:
In the computing environment the virtualization defines that it is act of creating
something virtual of an original device. The virtualization technique includes virtual computer
hardware platforms, computer network devices and storage related devices (Khan et al. 2015).
There are various types of virtualization technique that are important for the security of the
proposed IT infrastructure network of AusEd organization. From this, the two types of important
virtualization for the proposed network are the network virtualization and the storage related
virtualization.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7IT INFRASTRUCTURE
Network Virtualization:
The network virtualization involves virtual management of the IP configuration. This
virtual IP configuration is achieved by utilization of the NICs, routing tables, VLAN tags and
switches (Mijumbi et al. 2015). The network virtualization is recommended in this case as the
organization operates its business processes in the BYOD environment. Generally this type of
BYOD environment needs to be secured heavily for the perfect operations (Blenk et al. 2015). In
this type of cases the network virtualization can be utilized so that network of the organization
can be secured properly.
Storage Virtualization:
Protecting the central database of the AusEd organization is very much important for
smooth running business process. In this case for that storage related virtualization can be
implemented within the organization. The storage virtualization is actually an array of servers
which are managed through virtual type of storage system. In this type of situations the servers
does not observes what type of data is actually stored (Wagner et al. 2017). This type of
virtualization is actually managed through a central console. This type of virtualization provides
the functionality of pooling the available storage capacity of the system. Most popular type of
storage virtualization is the network based storage virtualization. Through this virtualization
security of the central database can be ensured from different types of attacks.
ITIL:
The ITIL or the Information Technology Infrastructure Library is considered as a whole
set of detailed practices regarding IT service management which actually focuses on the IT
service alignment with fulfilment of the business related needs. The ITIL describes some specific
Document Page
8IT INFRASTRUCTURE
procedures, processes, checklist and tasks which are not mandatory organization specific but still
can be applied the organizations to establish integration with the organizational strategy
maintaining minimum level of competency and delivering value.
In the current context of business of AusEd organization ITIL is specifically
recommended here. The implementation of ITIL is supported in this case as the organization will
be beneficial by the implementation of the ITIL as through this improvements in the organization
can be measured. The ITIL helps the AusEd by creating a baseline in the organization through
which improvements in the organization can be measured. This also provides information
regarding IT security system in organization and improvements required in the IT infrastructure.
Due to this advantages of the ITIL this has been recommended to implement in the current
business procedures.
Performance concern of the IT Infrastructure:
In the present IT infrastructure there are several kinds of security related issues are
present. Considering this factor some important recommendation has been provided so that
current security issues can be mitigated (Yuan, Zheng and Peng 2016). While the
recommendations will be implemented there should be some kind of modifications in IT
infrastructure and due to this fact there might be performance related concerns in the proposed IT
infrastructure. The possible performance concerns are the:
Management of the BYOD environment is actually very much difficult and here for
management of the mobile devices in the BYOD environment some restriction rules are
applied. Due to this action there will be a negative impact on the freedom of the
employees which will create performance related issues of the employees.
Document Page
9IT INFRASTRUCTURE
In the recommended IT infrastructure, implementation of the virtualization technique is
also recommended. It is obvious that virtualization will not be able to provide similar
kind of performance with the actual system. Thus performance drop will be seen in this
case.
Conclusion:
From the above discussion it can be concluded that a proper IT infrastructure is very
much important for mitigation of security concerns of a particular IT system. In this report IT
infrastructure of the AusEd has been analyzed and described successfully. Considering IT
infrastructure of the AusEd organization two specific type of security issues related with the IT
infrastructure has been described. A security management plan for the proposed IT infrastructure
has been also described in this report. The virtualization factor is also described in this report and
two different types of virtualization has also elaborated. Following the virtualization the ITIL has
been also discussed within this report. In the further section of this report performance concerns
for the suggested IT infrastructure has been presented in this report.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10IT INFRASTRUCTURE
References:
Acemoglu, D., Malekian, A. and Ozdaglar, A., 2016. Network security and contagion. Journal
of Economic Theory, 166, pp.536-585.
Ajamieh, A., Benitez, J., Braojos, J. and Gelhard, C., 2016. IT infrastructure and competitive
aggressiveness in explaining and predicting performance. Journal of business research, 69(10),
pp.4667-4674.
Blenk, A., Basta, A., Reisslein, M. and Kellerer, W., 2015. Survey on network virtualization
hypervisors for software defined networking. IEEE Communications Surveys & Tutorials, 18(1),
pp.655-685.
Bratthall Tideman, J. and Lindström, J., 2018. Key components when utilising BYOD within
organisations-A framework for developing the BYOD policy.
Dahiya, D. and Mathew, S.K., 2016. IT assets, IT infrastructure performance and IT capability: a
framework for e-government. Transforming Government: People, Process and Policy, 10(3),
pp.411-433.
Keeble, D. and Wilkinson, F., 2017. High-technology clusters, networking and collective
learning in Europe. Routledge.
Keyes, J., 2016. Bring your own devices (BYOD) survival guide. Auerbach Publications.
Khan, I., Belqasmi, F., Glitho, R., Crespi, N., Morrow, M. and Polakos, P., 2015. Wireless
sensor network virtualization: A survey. IEEE Communications Surveys & Tutorials, 18(1),
pp.553-576.
Document Page
11IT INFRASTRUCTURE
Mijumbi, R., Serrat, J., Gorricho, J.L., Bouten, N., De Turck, F. and Boutaba, R., 2015. Network
function virtualization: State-of-the-art and research challenges. IEEE Communications surveys
& tutorials, 18(1), pp.236-262.
Perlman, R., Kaufman, C. and Speciner, M., 2016. Network security: private communication in a
public world. Pearson Education India.
Wagner, J., Rasin, A., Glavic, B., Heart, K., Furst, J., Bressan, L. and Grier, J., 2017. Carving
database storage to detect and trace security breaches. Digital Investigation, 22, pp.S127-S136.
Yuan, H., Zheng, L. and Peng, X., 2016, July. Security Workflow Model for Database Storage.
In 2nd International Conference on Computer Engineering, Information Science & Application
Technology (ICCIA 2017). Atlantis Press.
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]