Information Security for Small Businesses
Added on 2020-05-08
13 Pages2690 Words30 Views
|
|
|
Running head: NETWORK MANAGEMENT AND SECURITY
NETWORK MANAGEMENT AND SECURITY
Name of the student
Name of the University
Authors note:
NETWORK MANAGEMENT AND SECURITY
Name of the student
Name of the University
Authors note:
NETWORK MANAGEMENT AND SECURITY1
Table of Contents
Project Background.............................................................................................................3
Network project Background...........................................................................................3
Project enhancing the future growth of STP....................................................................3
Project scope................................................................................................................3
Project goal..................................................................................................................4
Strategic alignment of project......................................................................................5
Network Security.................................................................................................................5
Securing data...................................................................................................................5
People, products, policies and procedures...................................................................5
ISP security and privacy consideration........................................................................5
Mobile device security.....................................................................................................5
Wireless local Area Network.......................................................................................5
BYOD risk...................................................................................................................5
Plan for hardware purchase.................................................................................................5
Acquisition of new hardware...........................................................................................5
End- user feedback and review........................................................................................5
Purchasing strategies.......................................................................................................5
Asset register...................................................................................................................5
Business continuity..............................................................................................................5
Table of Contents
Project Background.............................................................................................................3
Network project Background...........................................................................................3
Project enhancing the future growth of STP....................................................................3
Project scope................................................................................................................3
Project goal..................................................................................................................4
Strategic alignment of project......................................................................................5
Network Security.................................................................................................................5
Securing data...................................................................................................................5
People, products, policies and procedures...................................................................5
ISP security and privacy consideration........................................................................5
Mobile device security.....................................................................................................5
Wireless local Area Network.......................................................................................5
BYOD risk...................................................................................................................5
Plan for hardware purchase.................................................................................................5
Acquisition of new hardware...........................................................................................5
End- user feedback and review........................................................................................5
Purchasing strategies.......................................................................................................5
Asset register...................................................................................................................5
Business continuity..............................................................................................................5
NETWORK MANAGEMENT AND SECURITY2
Data backup.....................................................................................................................5
Physical security..............................................................................................................5
Successful planning.........................................................................................................5
Stock control system........................................................................................................5
Risk management.................................................................................................................5
Security policies...............................................................................................................5
Training and awareness...................................................................................................5
Integration technology.....................................................................................................6
Conclusion...........................................................................................................................6
Recommendation.................................................................................................................6
Bibliography........................................................................................................................6
Data backup.....................................................................................................................5
Physical security..............................................................................................................5
Successful planning.........................................................................................................5
Stock control system........................................................................................................5
Risk management.................................................................................................................5
Security policies...............................................................................................................5
Training and awareness...................................................................................................5
Integration technology.....................................................................................................6
Conclusion...........................................................................................................................6
Recommendation.................................................................................................................6
Bibliography........................................................................................................................6
NETWORK MANAGEMENT AND SECURITY3
Project Background
Network project Background
STP limited which is a well-known cabinet makers have four factories at different
location namely Wollongong, Lithgow, Sydney and Lithgow and they are sellers of cupboards
and front drawer to a large number of customers from different location. STP limited has decided
to upgrade the present information system in their location and they have also planned to conduct
various business activates which will help in improvising the stock control and accounting
system. They have also decided to upgrade the present information system better customer
management and website management. The report mainly focuses on the implementation of
information system and it role in maintaining privacy and security of the system. Proper
investigation has been done and various parameters of the project like scope, requirements,
expectation has been discussed in brief. Certain problems have been noticed like poor skilled
labor, inappropriate control of stock, lack of product manufacturing, workforce and productivity.
The organization has been small number of technical staff to meet the needs of various business.
The staff of STP limited needs more staff who technically sound so that they can easily satisfy
the needs of businesses.
Project enhancing the future growth of STP
Project scope
The scope of the project generally consists of installation and proper configuration of
database at four different locations that are Wollongong, Lithgow, Sydney and Lithgow. Internet
connection through ASDL (Asymmetric Digital Subscriber line) which was connected with
modems and switch comprises of wireless technology which will ultimately help the staff to
establish connection through BYOD (Bring your Device). The project has been developed by
Project Background
Network project Background
STP limited which is a well-known cabinet makers have four factories at different
location namely Wollongong, Lithgow, Sydney and Lithgow and they are sellers of cupboards
and front drawer to a large number of customers from different location. STP limited has decided
to upgrade the present information system in their location and they have also planned to conduct
various business activates which will help in improvising the stock control and accounting
system. They have also decided to upgrade the present information system better customer
management and website management. The report mainly focuses on the implementation of
information system and it role in maintaining privacy and security of the system. Proper
investigation has been done and various parameters of the project like scope, requirements,
expectation has been discussed in brief. Certain problems have been noticed like poor skilled
labor, inappropriate control of stock, lack of product manufacturing, workforce and productivity.
The organization has been small number of technical staff to meet the needs of various business.
The staff of STP limited needs more staff who technically sound so that they can easily satisfy
the needs of businesses.
Project enhancing the future growth of STP
Project scope
The scope of the project generally consists of installation and proper configuration of
database at four different locations that are Wollongong, Lithgow, Sydney and Lithgow. Internet
connection through ASDL (Asymmetric Digital Subscriber line) which was connected with
modems and switch comprises of wireless technology which will ultimately help the staff to
establish connection through BYOD (Bring your Device). The project has been developed by
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 2 1.2. Project Goal 3 2.1. Strategic Alignment of Projlg...
|14
|3452
|119
Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 3 1.2.1. Project Goal 3 1.2.3. Strategic Alignment Prolg...
|15
|3942
|175
Network Security Analysis for STP Limitedlg...
|14
|3581
|32
Network Management and Security PDFlg...
|14
|3727
|51
Network Security Analysis for STP Limitedlg...
|10
|3005
|64
Networking Environment and Connectionslg...
|14
|3087
|86