Information Security for Small Businesses

Verified

Added on  2020/05/08

|13
|2690
|30
AI Summary
This assignment delves into the critical topic of information security for small businesses. It examines common threats faced by these organizations, outlines effective security practices, and emphasizes the importance of comprehensive risk management strategies. Students are expected to analyze various sources including research papers, articles, and official guidelines to demonstrate their understanding of information security principles relevant to small business environments.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: NETWORK MANAGEMENT AND SECURITY
NETWORK MANAGEMENT AND SECURITY
Name of the student
Name of the University
Authors note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1NETWORK MANAGEMENT AND SECURITY
Table of Contents
Project Background.............................................................................................................3
Network project Background...........................................................................................3
Project enhancing the future growth of STP....................................................................3
Project scope................................................................................................................3
Project goal..................................................................................................................4
Strategic alignment of project......................................................................................5
Network Security.................................................................................................................5
Securing data...................................................................................................................5
People, products, policies and procedures...................................................................5
ISP security and privacy consideration........................................................................5
Mobile device security.....................................................................................................5
Wireless local Area Network.......................................................................................5
BYOD risk...................................................................................................................5
Plan for hardware purchase.................................................................................................5
Acquisition of new hardware...........................................................................................5
End- user feedback and review........................................................................................5
Purchasing strategies.......................................................................................................5
Asset register...................................................................................................................5
Business continuity..............................................................................................................5
Document Page
2NETWORK MANAGEMENT AND SECURITY
Data backup.....................................................................................................................5
Physical security..............................................................................................................5
Successful planning.........................................................................................................5
Stock control system........................................................................................................5
Risk management.................................................................................................................5
Security policies...............................................................................................................5
Training and awareness...................................................................................................5
Integration technology.....................................................................................................6
Conclusion...........................................................................................................................6
Recommendation.................................................................................................................6
Bibliography........................................................................................................................6
Document Page
3NETWORK MANAGEMENT AND SECURITY
Project Background
Network project Background
STP limited which is a well-known cabinet makers have four factories at different
location namely Wollongong, Lithgow, Sydney and Lithgow and they are sellers of cupboards
and front drawer to a large number of customers from different location. STP limited has decided
to upgrade the present information system in their location and they have also planned to conduct
various business activates which will help in improvising the stock control and accounting
system. They have also decided to upgrade the present information system better customer
management and website management. The report mainly focuses on the implementation of
information system and it role in maintaining privacy and security of the system. Proper
investigation has been done and various parameters of the project like scope, requirements,
expectation has been discussed in brief. Certain problems have been noticed like poor skilled
labor, inappropriate control of stock, lack of product manufacturing, workforce and productivity.
The organization has been small number of technical staff to meet the needs of various business.
The staff of STP limited needs more staff who technically sound so that they can easily satisfy
the needs of businesses.
Project enhancing the future growth of STP
Project scope
The scope of the project generally consists of installation and proper configuration of
database at four different locations that are Wollongong, Lithgow, Sydney and Lithgow. Internet
connection through ASDL (Asymmetric Digital Subscriber line) which was connected with
modems and switch comprises of wireless technology which will ultimately help the staff to
establish connection through BYOD (Bring your Device). The project has been developed by

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4NETWORK MANAGEMENT AND SECURITY
keeping the fact in mind that project works well in the four major location. The project also
emphasizes on certain pans which will help the various employees of the organization to get a
proper knowledge for improving the knowledge of business operation. At present they have only
one technical staff and part technology mainly focuses on handling various websites and
different web services.
Project goal
The goal mainly comprises of various management tools and internal staff of this firm
that is STP limited to establish different business activities and make an easy work for various
customers and client of the organization. The ultimate goal of the project is to provide
organization with skilled technical staff and it also focuses in increasing the production of
customer and clients based application. It also emphasizes in establishing relationship of
organization with various customers and client with the adaptation of CRM system along with
upgradation of website for supporting the products of organization.
Strategic alignment of project
During the implementation of a new technology in a organization there are certain risk as
well as some advantages. So the management team must check the strength, weakness,
challenges and various threats related to it. Now I am IT system manager of STP and my job to
make a SWOT analysis on various process of company and mainly aims in checking the various
benefits that this IT system has given to STP. The plus points of IT systems are large customer
base, cloud computing can help them and many staff are willing to learn. The minus point is that
the employees are not technically skilled and there are many vulnerabilities related to threats
from inside.
Document Page
5NETWORK MANAGEMENT AND SECURITY
Network Security
Securing data
STP limited has some information system in their location and they have achieved some
benefits from it. The IT system must be managed by using different strategies which can be
internal or external (Summers and Smith, 2014). Internal layer must have applied in the different
layers which consists of regulation, policies, people and various products in their location.
People, products, policies and procedures
IT system of STP limited mainly depends on Internet for monitoring of various strategies,
policies and procedure which will ultimately help them in conducting various operation of
business. The rules of security generally aim in providing various business operation in a secure
and safe way. These policies can be helpful in storing and accessing of data.
ISP security and privacy consideration
STP limited is highly dependent on Internet for carrying out various business activity and
WAN can be beneficial in providing them with better and protected services from various threats
like virus and different malware software. Big Pond Network has the power to check the secure
network by adapting new security features which can help in overcoming the effects of various
security breaches. ISP has the power so that the payment system can be used in a better way.
Mobile device security
Wireless local Area Network
Wireless networking is considered to be risky as the staff of an organization connect
various devices like laptops through wireless technology. Various intruders can make use of
weak network technology by making an access to the system and hack the important files of the
Document Page
6NETWORK MANAGEMENT AND SECURITY
database. Attacks in relation to WLAN can be easily routed through proper configuration of
employees and different training programs related to the given employees.
BYOD risk
BYOD risk can be helpful in improving different financial risk and various devices are
used by users and can be helpful in discloser of important information on system. Other types of
problems are the association of various malware activities with software and Operating system.
BYOD must be used in such a way that it can protect the operating system form any breach.
Plan for hardware purchase
Acquisition of new hardware
STP limited has many things to offer and it has the power to analyze, it can be useful in
preparation of various strategies, procedure and policies. This infrastructure will help various
staff members to reduce disruption and overcome product related issues.
End- user feedback and review
Software’s are improvising day by day and is getting upgraded on daily basis. The latest
software can adjust or work with the old hardware within an organization and security breaches
may result from different sites which are not trustworthy and verified (Ciampa, 2012). Those
files that run on background can be considered to be vulnerable. Various antivirus software’s
must be installed and latest hardware must be used for achieving the best results. End user are
required to check risk and with help the management team best decision can be easily made.
Purchasing strategies
STP limited require forward planning and it must store money for purchasing hardware
for various activities of business. The members of an organization must have a communication

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7NETWORK MANAGEMENT AND SECURITY
with each other and should make better strategy for improving the present business. They must
recognize different suppliers and should understand the needs of business through asset register.
Asset register
IT asset is helpful for IT services as well as for accountants and it can be helpful in
checking the needs of hardware which are essential for replacing in order to achieve betterment
for a company. The hardware must be replaced with new one which can easily provide address
and recognition. So the IT asset register and STP limited must be careful for selecting the proper
hardware.
Business continuity
IT system through the installation and configuration of various cloud application like
MYOB and salesforce can be helpful in achieving various activities which will ultimately
improve their business activities. Data backup and planning succession are two important topics
which will be discussed in the coming section which help STP limited in achieving a better
overview of various cloud application which can ultimately help in improving the business
growth.
Data backup
STP limited has decided to use cloud based SaaS apps which can be helpful for
organizing for storing various files as Backups. This firm has used cloud backups as per their
needs which has help them in attaining competitive edge. They can easily store files using cloud
technology and can modify files as backups. They can store and modify different data on cloud
technology. This will ultimately reduce cost and can easily buy server to store various files as a
backup and chances of virus attacks has been reduced due to advanced cloud vendor technology.
Document Page
8NETWORK MANAGEMENT AND SECURITY
Physical security
Cloud based technology can be helpful in solving the problems and challenges related to
physical security. Physical securities faced here are failures of network, blockage of roads and
power outage. Cloud vendor can easily store important data for the organization so that they face
any problem and even if the devices are damage the data will be safe. Cloud technology aims in
protecting it from any threats from inside.
Successful planning
Any employee of a company can be injured or can suffer from severe illness, members
can resign or may even die. Irrespective of consequence the firm must be ready to tackle the
mere effects. A suitable successor must be prepared for performing the role of job. Successor
must have proper knowledge to check the requirements of various business. They should be
preparing for taking proper action which can help in achieving proper decision.
Stock control system
Website of this organization must be designed in such a way that consumers can easily
view the available products. Cupboards, drawer fronts having various colors, texture and style
must be used and data must be stored in the cloud and it can be easily modifying as per the
needs. The availability of stock must be updated at any time. As soon as the product is ordered it
be improvised in the database so that various employees across the four factories of this
company can easily keep a track of different products.
Document Page
9NETWORK MANAGEMENT AND SECURITY
Risk management
Adaptation of various technology can be beneficial in minimizing threats, risk and issues
of privacy. STP limited must be enough responsive and should take security model for achieving
the better growth of the firm.
Security policies
Security policies must be used for protecting and securing the different assets and can be
beneficial in achieving the growth of business. These policies can act as a tool which will help
organization in secure conduction of business.
Training and awareness
Risk model must analyze the three aspect which can be useful in improving the efficiency
of STP limited. Risk model can be helpful in addressing various risk which must be identified
and detected. Risk prevention technique must be applied so that to overcome all the risk
associate within an organization. Employees of STP must be enough trained so that they can
easily handle threat and various data breaches in more efficient way.
Integration technology
Integration information technology can helpful in serving the purpose through SaaS
model and PaaS model and better plus points can be easily achieved. PaaS consist of independent
vendors of software which has the capability to build and execute various software application.
There are still some issues of data breaches, security issues and interoperability issue which can
be highlighted and the employee and management team must provide service level agreement to
acquire proper services.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10NETWORK MANAGEMENT AND SECURITY
Conclusion
From the above discussion it can be easily concluded that security control measures can
be helpful in adopting information system in STP limited. Various security breaches have been
highlighted through the report and risk related to wireless LAN and BYOD devices has been
discussed in brief. The possible ways to overcome the problem has been discussed and the three
aspects are policies, people and product can be considered in overcoming security breaches. This
report will help STP limited to check various measures which should be taken to improve the
given business.
Recommendation
I. STP limited should implement policies and procedure properly for carrying out
various business process.
II. STP limited should run their business through some secured network
III. Asset register must be well maintained and the firm should be careful about
various risk management procedures
IV. They must keep a back of important file which contain financial data and
customer data.
V. The employees of this organization must be trained so that they can provide better
services and training can be also helpful in checking various threats.
Document Page
11NETWORK MANAGEMENT AND SECURITY
Bibliography
Australian Taxation Office (ATO) 2016, Taxation Ruling TR 2016/1, Australian Taxation
Office, viewed 6 October 2016,
<https://www.ato.gov.au/law/view/document?docid=txr/tr20161/nat/ato/00001>.
Batenburg, RS, Mikalef, P, Pateli, A, Van De Wetering. R 2015, ‘Purchasing alignment under
multiple contingencies: A configuration theory approach’, Industrial Management & Data
Systems vol. 115, no. 4, pp. 625-45, doi: 10.1108/IMDS-10-2014-0298
Ciampa, M 2012, Security + guide to security fundamentals. 5th edn, Cengage, Boston.
Chang, E, Dillon, T, Wu C 2010, ‘Cloud computing: Issues and challenges’, 2010 24th IEEE
International Conference on Advanced Information Networking and Applications, pp. 27-33,
doi: 10.1109/AINA.2010.187
Crawford, M, Horstmann, B, Keller, S, Powell, A & Predmore, C 2005, 'Information security
threats and practices in small businesses', Information Systems Management, vol. 22, no. 2, pp.
7-19, viewed 20 October 2016,
<http://ezproxy.usc.edu.au:2048/login?url=http://search.ebscohost.com/login.aspx?
direct=true&db=heh&AN=16195727&site=ehost-live>.
George, E 2013, ‘5 steps to planning for internal successors in a small business environment’,
Journal of Financial Planning, vol. 26, no. 8, pp. 21-23, viewed 16 October 2016,
<http://web.b.ebscohost.com.ezproxy.usc.edu.au:2048/ehost/pdfviewer/pdfviewer?
sid=46892c54-447f-43c5-8e15-93f417c642d0%40sessionmgr102&vid=1&hid=116>.
Greitzer, FL, & Hohimer, RE 2011, ‘Modeling human behavior to anticipate insider attacks’,
Journal of Strategic Security, vol. 4, no. 2, pp. 25-48,
doi:http://dx.doi.org.ezproxy.usc.edu.au:2048/10.5038/1944-0472.4.2.2
Gupta, A & Hammond, R 2015, ‘Information systems security issues and decisions for small
businesses: An empirical examination’, Information Management & Computer Security, vol. 13
no. 4, pp. 297 – 310, doi: 10.1108/09685220510614425
Harris, MA & Patten, KP 2014, ‘Mobile device security considerations for small- and medium-
sized enterprise business mobility’, Information Management & Computer Security, vol. 22, no.
1, pp. 97 – 114, doi:10.1108/IMCS-03-2013-0019
Document Page
12NETWORK MANAGEMENT AND SECURITY
Queensland Government 2016, Key components of a digital strategy, Queensland Government,
viewed 16 October 2016, <https://www.business.qld.gov.au/business/running/technology-for-
business/digital-strategy/key-components>.
Telstra 2016, ‘Broadband security’, Telstra Corporation, viewed 18 September 2016,
<https://www.telstra.com.au/support/category/broadband/security/what-is-telstra-network-
security>.
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]