logo

Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 3 1.2.1. Project Goal 3 1.2.3. Strategic Alignment Pro

   

Added on  2020-05-11

15 Pages3942 Words175 Views
Running head: NETWORK MANAGEMENT AND SECURITY
Network Management and Security
Name of the Student
Name of the University
Author’s note
Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 3 1.2.1. Project Goal 3 1.2.3. Strategic Alignment Pro_1
1NETWORK MANAGEMENT AND SECURITY
Table of Contents
1.0. Project Background.............................................................................................................2
1.1. Network Project Background..........................................................................................2
1.2. Project enhancing the future growth of STP...................................................................3
1.2.1. Project scope............................................................................................................3
1.2.2. Project goal...............................................................................................................3
1.2.3. Strategic alignment of project..................................................................................4
2.0. Network Security................................................................................................................5
2.1. Securing data...................................................................................................................5
2.1.1. People, products, policies and procedures...............................................................5
2.1.2. ISP security and privacy considerations..................................................................5
2.2. Mobile device security....................................................................................................5
2.2.1. Wireless Local Area Network (WLAN) attacks......................................................5
2.2.2. BYOD risks..............................................................................................................6
3. Plan for hardware purchases..................................................................................................6
3.1. Acquisition of new hardware..........................................................................................6
3.2. End-user feedback and reviews.......................................................................................6
3.3. Purchasing strategies.......................................................................................................7
3.4. Asset register...................................................................................................................7
4.0. Business continuity.............................................................................................................8
4.1. Data Backup....................................................................................................................8
4.2. Physical Security.............................................................................................................9
4.3. Successful planning.........................................................................................................9
4.4. Stock Control system......................................................................................................9
5.0. Risk management..............................................................................................................10
5.1. Security Policy..............................................................................................................10
5.2. Training and awareness.................................................................................................10
5.3. Integration technology..................................................................................................10
6.0. Conclusions.......................................................................................................................11
7.0. Recommendations.............................................................................................................11
8.0. Bibliography......................................................................................................................12
Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 3 1.2.1. Project Goal 3 1.2.3. Strategic Alignment Pro_2
2NETWORK MANAGEMENT AND SECURITY
1.0. Project Background
1.1. Network Project Background
STP Limited, the kitchen cabinet makers have four factories at Wollongong, Sydney,
Bathurst and Lithgow and they sell cupboards and drawer fronts to the customers. STP
limited has planned to update the existing information system in their premises and they have
planned to conduct the business activities with the aid of stock control system, with the aid of
accounting system. They have also planned to revolutionize the information system with the
customer management system and the website management system. The report has been
made focusing on the adaptation of the information system and the associated with the
privacy and security of the system. The investigation has been made and the various aspects
of the project like the scope of the project, the project requirements, the expectations related
to the project. Certain issues have been raised like unskilled workforce, inaccuracy related to
stock control, the inefficient product manufacturing and lacking workforce and productivity
as a whole. The organizations also have the very little learned workforce and very little
technical staff to serve the business requirements. STP Limited requires the more technical
staffs and they should be educated with the technical details so that they can contribute to the
business needs and can enrich the business activities.
1.2. Project enhancing the future growth of STP
1.2.1. Project scope
The project scope involves the installation and configuration of database system at the
locations Wollongong, Sydney, Bathurst and Lithgow. The Internet connectivity through
ADSL (Asymmetric Digital Subscriber Line) was connected with the aid of modem and with
the aid of switch and it involves the wireless technology concepts, this helps the staff to gets
connected to via BYOD (Bring Your Own Device). The aforesaid project has been developed
Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 3 1.2.1. Project Goal 3 1.2.3. Strategic Alignment Pro_3
3NETWORK MANAGEMENT AND SECURITY
keeping in mind so that the project can go well with the mentioned four locations. The project
also focuses on the plans so that the employees of the enterprise can have the requisite
knowledge to enhance their business operations. Currently, they have one technical staff. The
part-time technology has been given to handle the website and all the associated web
services.
1.2.2. Project goal
The project goal involves catering the tools to the management team and the internal
staff of STP Limited to embellish the business activities and makes work relatively easy for
the customer and the clients’ base of the enterprise. The goal of the project is to provide the
enterprise with the skilled technical so that they can help. The project is also focused on the
required network equipment that can increase the productivity of the customer and clients
focused applications. The project’s goal is to enhance the relationship of the enterprise with
the customers and the clients with the implementation of a CRM system along with
development and improvement of the website to support the enterprise’s products.
1.2.3. Strategic alignment of project
There are certain risks as well as benefits while adopting a new technology in the
enterprise. That is why the management team must analyse the strength, weakness,
challenges and the threats. Now, as I am the information systems manager of STP it is my
duty to make the SWOT analysis of the company’s business process and will address the
benefits that the information system has to offer the STP. The strength of the information
system to STP Limited is it has a large customer base, the cloud computing can serve them
well, moreover, they have the dedicated employees who are willing to learn. The weakness is
that the employees are not technically skills and there are vulnerabilities related to insider
threats. There are multiple opportunities for STP Limited and they are communicating with
customers with the aid of advanced cloud-based information system, the integration of
Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 3 1.2.1. Project Goal 3 1.2.3. Strategic Alignment Pro_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 2 1.2. Project Goal 3 2.1. Strategic Alignment of Proj
|14
|3452
|119

Network Management and Security PDF
|14
|3727
|51

Report on Network Management and Security
|13
|2690
|30

STP Network Analysis Report Assignment
|10
|3005
|64

Networking Environment and Connections
|14
|3087
|86

Report on Analysis of the STP network
|14
|3581
|32