logo

Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 2 1.2. Project Goal 3 2.1. Strategic Alignment of Proj

   

Added on  2020-05-11

14 Pages3452 Words119 Views
Running head: NETWORK MANAGEMENT AND SECURITYNetwork Management and SecurityName of the StudentName of the UniversityAuthor’s noteTable of Contents
Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 2 1.2. Project Goal 3 2.1. Strategic Alignment of Proj_1
1NETWORK MANAGEMENT AND SECURITY1.0. Project Background.............................................................................................................21.1. Network Project Background..........................................................................................21.2. Project enhancing the future growth of STP...................................................................21.2.1. Project scope............................................................................................................21.2.2. Project goal...............................................................................................................31.2.3. Strategic alignment of project..................................................................................32.0. Network Security................................................................................................................42.1. Securing data...................................................................................................................42.1.1. People, products, policies and procedures...............................................................42.1.2. ISP security and privacy considerations..................................................................42.2. Mobile device security....................................................................................................42.2.1. Wireless Local Area Network (WLAN) attacks......................................................42.2.2. BYOD risks..............................................................................................................53. Plan for hardware purchases..................................................................................................53.1. Acquisition of new hardware..........................................................................................53.2. End-user feedback and reviews.......................................................................................53.3. Purchasing strategies.......................................................................................................63.4. Asset register...................................................................................................................64.0. Business continuity.............................................................................................................74.1. Data Backup....................................................................................................................74.2. Physical Security.............................................................................................................74.3. Successful planning.........................................................................................................84.4. Stock Control system......................................................................................................85.0. Risk management................................................................................................................85.1. Security Policy................................................................................................................85.2. Training and awareness...................................................................................................95.3. Integration technology....................................................................................................96.0. Conclusions.........................................................................................................................97.0. Recommendations...............................................................................................................98.0. Bibliography......................................................................................................................11
Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 2 1.2. Project Goal 3 2.1. Strategic Alignment of Proj_2
2NETWORK MANAGEMENT AND SECURITY1.0. Project Background 1.1. Network Project Background STP Limited manufactures kitchen cabinets and they have the four offices acrossLithgow, Sydney, Bathurst and Wollongong. They are popular in manufacturing drawerfronts and the cupboards to the customers. STP has decided to upgrade their existinginformation system and embellish the core business operations. The business operations canbe facilitated greatly by the accounting system and the stock control system. The informationsystem has been planned to rejuvenate and thus the website management system and thecustomer management system of STP Limited can be benefitted. The report is showcasing theadoption of information system in the STP Limited premises. The report will explain thevarious aspects of like the scope of the current project along with the prerequisites and theproject expectations correlated with the project. Various kinds of issues and problems haveupheld regarding unskilled employees, various kinds of threats and the vulnerabilitiesassociated with cloud technology and business procedures have risen. The inefficiencyregarding the product manufacturing has been focussed. The report has focussed mainly onthe staffs; the staffs must have the sound knowledge so that they can efficiently serve thecustomers and the company as well.1.2. Project enhancing the future growth of STP1.2.1. Project scope The project scope of STP Limited states that the database and the system must beinstalled and configured in an effective way in Lithgow, Bathurst, Sydney and Wollongong.The network connectivity of the company via ADSL (Asymmetric Digital Subscriber Line)connected with the help of the modem and with the help of switch can help to deliver thewireless network connectivity to the company. This wireless network connectivity aids to get
Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 2 1.2. Project Goal 3 2.1. Strategic Alignment of Proj_3
3NETWORK MANAGEMENT AND SECURITYconnected to BYOD (Bring Your Device). The network connection has been developed insuch a way that the employees across the four locations can connect with each other and cancommunicate which can be useful to know the stock availability of the company. The projectalso shows light on the employees, the employees must have the proper technical knowledgeso that they can solve the issues quickly and serve the customers well, and the technicalknowledge can scale the business activities of STP. At the moment they only have onetechnical staff. The technology can help to manage the website and the web staffs.1.2.2. Project goal The project goal is associated with the effective tools that the management staffs andthe technical staffs must use for their business purposes and this will help the technical staffsof the enterprise to get the desired benefits, the network equipment has been discussed thathas the capability to increase the productivity. The project goal also involves the customeremployees’ relationship that can be helpful for both the business, for the products. 1.2.3. Strategic alignment of projectSWOT analysis can prove to be beneficial to the STP Limited as that can help torecognize the strength, the weakness, the threats and the opportunities of the company. ThisSWOT analysis will help to know the possible impact of the information system and thecloud computing. The SWOT analysis has been discussed below in the tabular form.Table 2.4 SWOT analysis of STP Limited network projectInternalPOSITIVENEGATIVEStrengthsWeaknessesCustomer baseAdvanced Sales targetsThe cloud-based applicationsHard-working employeesInsider ThreatNot technically skilled employeesNot following specific rules and proceduresExternalOpportunitiesThreatsThe connection between the employees and the customers. The integration of information systemThe empowerment of the employeesThe financial information leaks and thecustomer information leaks.
Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 2 1.2. Project Goal 3 2.1. Strategic Alignment of Proj_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 3 1.2.1. Project Goal 3 1.2.3. Strategic Alignment Pro
|15
|3942
|175

Network Management and Security PDF
|14
|3727
|51

Report on Network Management and Security
|13
|2690
|30

STP Limited STP Limited Networking & Communication Project 10/11/2017 Overview
|22
|6029
|449

Networking Environment and Connections
|14
|3087
|86

STP Network Analysis Report Assignment
|10
|3005
|64