logo

Network Management and Security PDF

   

Added on  2020-05-11

14 Pages3727 Words51 Views
Running head: NETWORK MANAGEMENT AND SECURITYNetwork Management and SecurityName of the StudentName of the UniversityAuthor’s noteTable of Contents
Network Management and Security PDF_1
1NETWORK MANAGEMENT AND SECURITY1.0. Project Background.............................................................................................................21.1. Network Project Background..........................................................................................21.2. Project enhancing the future growth of STP...................................................................21.2.1. Project scope............................................................................................................21.2.2. Project goal...............................................................................................................31.2.3. Strategic alignment of project..................................................................................32.0. Network Security................................................................................................................42.1. Securing data...................................................................................................................42.1.1. People, products, policies and procedures...............................................................42.1.2. ISP security and privacy considerations..................................................................42.2. Mobile device security....................................................................................................42.2.1. Wireless Local Area Network (WLAN) attacks......................................................42.2.2. BYOD risks..............................................................................................................53. Plan for hardware purchases..................................................................................................53.1. Acquisition of new hardware..........................................................................................53.2. End-user feedback and reviews.......................................................................................53.3. Purchasing strategies.......................................................................................................63.4. Asset register...................................................................................................................64.0. Business continuity.............................................................................................................74.1. Data Backup....................................................................................................................74.2. Physical Security.............................................................................................................74.3. Successful planning.........................................................................................................84.4. Stock Control system......................................................................................................85.0. Risk management................................................................................................................85.1. Security Policy................................................................................................................95.2. Training and awareness...................................................................................................95.3. Integration technology....................................................................................................96.0. Conclusions.........................................................................................................................97.0. Recommendations.............................................................................................................108.0. Bibliography......................................................................................................................11
Network Management and Security PDF_2
2NETWORK MANAGEMENT AND SECURITY1.0. Project Background 1.1. Network Project Background STP Limited is the kitchen cabinet providers. STP Limited currently has four officesand those offices are situated in Lithgow, Sydney, Bathurst and Wollongong. The enterpriseis known to manufacture drawer fronts as well as the cupboards to all the consumers based inAustralia. Now they want to scale up their business that is why they have decided to move tothe cloud. STP Limited’s business operations can get embellished with the help of stockcontrol system as well as the accounting software (Laudon and Laudon 2016). Theorganisation has decided that they want to adopt the information system; the informationsystem is bound to provide them with the benefits by which they can serve the customerswell.The report has highlighted all the aspects of information technology and along withthat the threats and the vulnerabilities involved with the cloud technology and the informationtechnology has been raised. The report also states that the staffs of the enterprise must havethe desired technical knowledge to serve the customers and the enterprise as a whole.1.2. Project enhancing the future growth of STP1.2.1. Project scope The Project Scope includes the installation of the database and the system in propermanner across the four offices in Australia. The Wi-Fi connectivity helps STP Limited to stayconnected all the time to BYOD (Bring Your Own Device). The network connectivity hasbeen set up in such a way such that the office employees can connect with each other acrossthe four offices. This can be helpful to know about the stock availability of the company. Theemployees must be trained in technical knowledge so that they must be capable to solve thequeries of the customers’ online (Xu et al. 2014). They can solve the technical problems of
Network Management and Security PDF_3
3NETWORK MANAGEMENT AND SECURITYthe customers. Thus it can be said the information service can scale up the business of STP.The website can be better managed and the web staffs can get benefits due to the technologyadvancement and information service management. 1.2.2. Project goal The project goal is based on the tools and the management staffs, as well as theemployees and the technical staff, must use the tools efficiently for better outcomes, thenetwork equipment that can furnish the business growth has been elaborated in details(Beletskaya et al. 2013). The project goal is to facilitate the customer employees’ relation orthe CRM.1.2.3. Strategic alignment of projectThe strategic alignment of the project can be made only on the basis of the SWOTanalysis. The SWOT analysis highlights the threats, strength, opportunities and weakness.The role of system analyst is to determine all the SWOT analysis aspects and in this way,STP Limited can be aware of the potential benefits the information system can bring in totheir enterprise (Benner et al. 2014). STP should look upon the weakness and the threats andshould try to mitigate those risks and the threats, should look for the opportunities by whichthey can furnish their business activities.SWOT analysis of STP Limited network projectInternalPOSITIVENEGATIVEStrengthsWeaknessesLarge number of customersAugmented Sales targetsDiligent workers Insider ThreatTechnically unskilled employeesNot maintaining rules and proceduresExternalOpportunitiesThreatsThe information system gets integratedThe employees’ empowermentThe data related to finance gets leakedand the customer information getsleaked.
Network Management and Security PDF_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 2 1.2. Project Goal 3 2.1. Strategic Alignment of Proj
|14
|3452
|119

Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 3 1.2.1. Project Goal 3 1.2.3. Strategic Alignment Pro
|15
|3942
|175

Report on Network Management and Security
|13
|2690
|30

STP Report15 STP BUSINESS STATEGIC Report Executive Summary Technology Advances and the Transformation of Business Organizations
|15
|2675
|432

STP Limited STP Limited Networking & Communication Project 10/11/2017 Overview
|22
|6029
|449

Networking Environment and Connections
|14
|3087
|86