logo

Network Management Assignment | IT Functionality

26 Pages8059 Words133 Views
   

Added on  2020-04-01

Network Management Assignment | IT Functionality

   Added on 2020-04-01

ShareRelated Documents
Network Management Assignment | IT Functionality_1
Executive SummaryThe report is based on outsourcing of IT functionality in the form of network management and desktopapplication development to a third party. The current project is mainly focused on the networkmanagement and IT security along with the standard policies applied by the company. The origination thathas been chosen for the execution of the project in the field of security concern for the IT department isASIAL. The company has huge reputation within the country in terms of providing IT security to thecompany and the members of the company. Manpower security provided by the company involves in the aviation and the marine security. They helptheir member companies to resolve issue in these sectors of the company to avoid any form of theunnecessary security issue in the aviation sector, which is very important and of high national importance.They are also involved in looking after the cash in transit, critical infrastructure protection in the control andmonitoring of any sort of event security. The physical security provide by ASIAL is in the form of barriers,doors, gates, locks, safes and lo in the protection of records. The other form of security involved within thecompany is in the support of training, risk management, investigation and maintaining major users ofsecurity.
Network Management Assignment | IT Functionality_2
Contents1. Introduction to ASIAL...................................................................................................................................41.1 Role of ASIAL w.r.t IT security.................................................................................................................51.2Project Outline..................................................................................................................................51.3 Recommendation based on merits of the Project..................................................................................62. Role of ASIAL security functions in Financial Services Sector........................................................................62.1 Interfaces between Business Stakeholders and Technologies...............................................................62.2 Effective decision making by stakeholders in terms of regulation, compliance and practices...............72. 3 Role of ASIAL in maintaining standards of Australian IT governance compliances................................73. Role of ASIAL security operation on the current security posture................................................................83.1 Impact on current IT Security Posture....................................................................................................83.2 Recommendations in terms of changes to the current posture.............................................................93.3 Required mitigation actions ASIAL to remain at an acceptable posture...............................................113.4 Role of ASIAL in maintaining the current maturity against IT security policies and procedures...........134. Risk Assessment of ASIAL based on Threats, Vulnerabilities and Consequences........................................144.1 Consequences......................................................................................................................................155. Risks for Data Security................................................................................................................................165.1 Key principles of Information security..................................................................................................166. Conclusion and Justification for choosing ASIAL.........................................................................................197. Reference...................................................................................................................................................20
Network Management Assignment | IT Functionality_3
1. Introduction to ASIALASIAL is stands for Australian security industry association limited. The company is established in the yearof 1996 as an Australian security Association ltd. It is one of the peak nationalized body for maintaining thesecurity concern of the industry. This company holds near about 85 per cent of the Australian securityindustry. Thus this organization has special importance within the providence of maintaining IT security andconcern. The company provides a regular form of trusted source of industry news and that of the otherforms of IT information. The number of professionals within the company is accounts for nearly more than10, 000 security professional for the company to hold their security issues and concerns. This is a growingform of the social network also including their steps in the media engagement to deliver secured form ofthe information and also taking part in the monitoring process of security issues. ASIAL is actively takingpart in the regular online or offline mode of campaigns. These are the resource full activities of thecompany that makes it a strong consumer presence throughout their marketing and promotional activities.The company represents in all the sectors of the security industry including providing electronic security,man power security, and physical form of the security and also in the other important forms of security.The electronic form of security provide by the company is in the form of alarm in case of any danger ortheft of important information of any physical asset, alarms, TV, integrated systems, video intercoms andBiometrics. 1.1 Role of ASIAL w.r.t IT securityASIAL are involved in giving IT Support and Services to their clients. The company is regarded as the peakimportance as far as the national security system is concerned. They are the most important organization interms of security professionals in Australia. Their services are dedicated for the support of members, safeguarding the public interest and promoting standards used in the security concern. ASIAL is a federallyregistered company under the Australian media and communication Authority. It represents a small,medium and large organization that can be of immense support in all those security services. The ISOstandards have been developed worldly so as to make work easy and work could be implemented correctly.There are different risk management and processes. The chosen project is based on the key outsourcingand IT secures functionality in terms of network management. Apart from this, the project is also focusedon the desktop management and secure application development to the third party.The first process includes in the IT security involves risk Identification. All risks are identifies in the processand the potential risks are defined. It is very important because if not identified properly it could negativelyinfluence the company’s process. For Risk Analysis the companies does a check up on all the identified risksand then it is determined the odds of occurrence and the consequences overall. The main goal in theprocess is to have a better understanding of different instances of risk. The risk appetite is bought intoconsideration and determined whether the company could digest it. Risk Mitigation is the third most
Network Management Assignment | IT Functionality_4
important thing. In this case specific plans are chalked out and determined how they are going to beeliminated (Teng & Helps, 2010). The contingency plan and the risk prevention tactics are revised. Risks aremonitored on the last process. This is the most effective process in the ISO standards for risk managementand mitigation. This step figures the overall plan to monitor both existing and new risks. All are updatedand reviewed according to need and time. 1.2Project OutlineThe project on which the company ASIAL is based on and are willing to take work ahead is in terms ofnetwork management and desktop application development for the third party. System administratoralways looks deep into the aspects that are covered in particular topic. It also ensures successfuldeployment of specific products and services. For the successful implementation of data and resources,they may acquire, update or install computer components and products; provide routine automation;maintain security policies; troubleshoot; train or supervise staff; or offertechnical supportfor projects.Various fields related to the same are security administration, network administrator, web administrator,and database administrator and computer operation. Various respective fields are depicted that aim todevelop a good system administrator and that are evolving trends of computer science, technology,multimedia and research.1.3 Recommendation based on merits of the ProjectAs far as safety and precaution for ASIAL project is concerned, there is a Risk and Safety team where theystudy the details of the project before resuming it to see and classify the risks of the project. In this way theproject maintains its stability and security. ASIAL can make a very massive growth is because they are oneof the best IT Solutions Provider who have worked on several Projects where they use following maintechnologies such as PHP, .NET on various designing technologies like HTML, CSS, JavaScript, JQuery andeven on various content management system such as Word Press and Magento. They have also createdawesome applications and have performed Manual and Automation testing using various tools. They haveused most advance Frameworks like Visual studio, Code Ignite and Eclipse. For designing Graphics andSocial Media Posts and Banners they use tools like Coral Draw, Adobe Photoshop and Luna PIC (Carr, 2004).2. Role of ASIAL security functions in Financial Services Sector2.1 Interfaces between Business Stakeholders and TechnologiesStakeholders of ASIAL are an individual, group or organization who affects, perceives or be affected by thedecision, activity or outcome of a project. The stakes of ASIAL lie with the Project stakeholders who have avested interest in the entire process of the project and thus needs to be on the lookout of the entireactivity that goes on around the project. The stakeholder may be for inside or outside the organization, andmay become stakeholder for a number of reasons. Internal Stakeholders are internal to the organizationand may act as a sponsor, an internal client, management, project Team and portfolio manager.
Network Management Assignment | IT Functionality_5
External Stakeholders are those who are external to the organization. They are the Government, the media,local Communities and an external client. These stakeholders should be identified prior to the starting ofthe project and it is necessary for the project stakeholders to define their goals and what they seek toachieve at the end of the project. It is important to take down the objectives, power, contribution andinfluence of stakeholders before the project is commenced. A stakeholder generally has certain specificobjectives that make them participate in a certain project and they can be a sponsor of the project, to havea gain on the successful completion of the project and to have a negative or positive influence on theproject and when it comes to fruition.The banking sector in many parts of Australia is continuously going through many regular ass cyber attacksand hence had to face heavy loss in terms of revenue. To minimize and remove the threat in bankingsector, ASIAL has adopted many digital technologies are being adopted in order to avoid these cases. Hencethe implementation of cyber security program me is concerned. This is made possible with the help of rightgovernance by following all the important set of rules and regulations. Apart from the banking sector, ASIALis continuously updated in terms of management of technology, lifecycle management and inventory oftechnology. Thus ASIAL is successful in increasing their productivity. 2.2 Effective decision making by stakeholders in terms of regulation, compliance and practicesA Stakeholder can be both positive and negative as well. A positive stakeholder benefits from the success ofthe project and would want to help the team to lead the project to its success by bringing its fruition.A negative stakeholder benefits from the failure of a project and would want to negatively impact theproject by obstructing its growth and movement towards success. They are less likely to assist in thedevelopment of the project. All stakeholders are different and seek to achieve different sorts of outcomesor expects different objectives to be fulfilled at the end of the project. But this does not defeat thenecessity of a stakeholder to bring about the completion of a project (Carillo, et al., 2010). The involvementof a stakeholder increases the chances of a project to be successful in the end. Missing out on an importantstakeholder may lead to an hindrance to the completion of the project and many difficulties might comeforward like delay in project, increase cost, which may lead to the termination of the project itself. Thesupport of a stakeholder can alleviate these difficulties.2. 3 Role of ASIAL in maintaining standards of Australian IT governance compliancesIn order to manage IT Risk for IT information, Risk Management is extremely necessary. On a wider scale itcould be considered as a entrepreneurship management system for risk. This business management riskshould be performed not at intervals but on a regular basis. It not only identifies but also controls andaccess threats. It is very important to know that digitalized have prioritized data related and IT relatedsecurities. There is risk management system to alleviate them. The regulatory compliance has beenexpanded under various companies since 2000. It mainly acts as scrutinizer for company’s risk managementpolicies, plans and procedures. The business strategy has been comprised of internal audits, risk
Network Management Assignment | IT Functionality_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Risk Assessment Aztek | Report
|24
|6053
|130

IT Risk Assessment Report for Aztek's Technology Decision
|2
|990
|458

Regulatory Measures and Best Practice
|20
|5821
|53

IT Risk and Cloud Computing Assignment
|12
|5400
|80

Case Study - Strategic Plan For Enhancing Aviation Safety In Australia
|17
|4615
|111

IT Risk Management Assignment (Doc)
|15
|5120
|31