logo

Information Security for Small Businesses

   

Added on  2020-05-08

13 Pages2690 Words30 Views
 | 
 | 
 | 
Running head: NETWORK MANAGEMENT AND SECURITY
NETWORK MANAGEMENT AND SECURITY
Name of the student
Name of the University
Authors note:
Information Security for Small Businesses_1

NETWORK MANAGEMENT AND SECURITY1
Table of Contents
Project Background.............................................................................................................3
Network project Background...........................................................................................3
Project enhancing the future growth of STP....................................................................3
Project scope................................................................................................................3
Project goal..................................................................................................................4
Strategic alignment of project......................................................................................5
Network Security.................................................................................................................5
Securing data...................................................................................................................5
People, products, policies and procedures...................................................................5
ISP security and privacy consideration........................................................................5
Mobile device security.....................................................................................................5
Wireless local Area Network.......................................................................................5
BYOD risk...................................................................................................................5
Plan for hardware purchase.................................................................................................5
Acquisition of new hardware...........................................................................................5
End- user feedback and review........................................................................................5
Purchasing strategies.......................................................................................................5
Asset register...................................................................................................................5
Business continuity..............................................................................................................5
Information Security for Small Businesses_2

NETWORK MANAGEMENT AND SECURITY2
Data backup.....................................................................................................................5
Physical security..............................................................................................................5
Successful planning.........................................................................................................5
Stock control system........................................................................................................5
Risk management.................................................................................................................5
Security policies...............................................................................................................5
Training and awareness...................................................................................................5
Integration technology.....................................................................................................6
Conclusion...........................................................................................................................6
Recommendation.................................................................................................................6
Bibliography........................................................................................................................6
Information Security for Small Businesses_3

NETWORK MANAGEMENT AND SECURITY3
Project Background
Network project Background
STP limited which is a well-known cabinet makers have four factories at different
location namely Wollongong, Lithgow, Sydney and Lithgow and they are sellers of cupboards
and front drawer to a large number of customers from different location. STP limited has decided
to upgrade the present information system in their location and they have also planned to conduct
various business activates which will help in improvising the stock control and accounting
system. They have also decided to upgrade the present information system better customer
management and website management. The report mainly focuses on the implementation of
information system and it role in maintaining privacy and security of the system. Proper
investigation has been done and various parameters of the project like scope, requirements,
expectation has been discussed in brief. Certain problems have been noticed like poor skilled
labor, inappropriate control of stock, lack of product manufacturing, workforce and productivity.
The organization has been small number of technical staff to meet the needs of various business.
The staff of STP limited needs more staff who technically sound so that they can easily satisfy
the needs of businesses.
Project enhancing the future growth of STP
Project scope
The scope of the project generally consists of installation and proper configuration of
database at four different locations that are Wollongong, Lithgow, Sydney and Lithgow. Internet
connection through ASDL (Asymmetric Digital Subscriber line) which was connected with
modems and switch comprises of wireless technology which will ultimately help the staff to
establish connection through BYOD (Bring your Device). The project has been developed by
Information Security for Small Businesses_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 2 1.2. Project Goal 3 2.1. Strategic Alignment of Proj
|14
|3452
|119

Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 3 1.2.1. Project Goal 3 1.2.3. Strategic Alignment Pro
|15
|3942
|175

Network Security Analysis for STP Limited
|14
|3581
|32

Network Management and Security PDF
|14
|3727
|51

Network Security Analysis for STP Limited
|10
|3005
|64

Networking Environment and Connections
|14
|3087
|86