logo

Network Security Assignment - STP Limited

   

Added on  2019-10-31

20 Pages5002 Words54 Views
7 | P a g e
Network Security Assignment - STP Limited_1
Executive Summary
The objective of this report is to assess the networking environment which is recently
implemented in STP Ltd. Company. The focus of the report is on the environment
and its connections with the company employees. The report explains the background
information of the project and its objective. Because of the new installation, the
company is likely to face certain security issues and thus, STP needs to use its people,
products and policies in a cooperative manner such that the business remains
protected. Policies have to be implemented in order to keep the company data secure.
Moreover, the procurement processes used in the company must cause minimum
disruption to the networking environment. Business continuity reflects upon the
endurance capacity of a business. First, a backup of the organizational data has to be
taken for business continuity post which disaster recovery plans have to be
formulated for the physical security of the infrastructure. The report discusses these
steps involved in business continuity planning including succession planning. Risk
management details are provided in the report to explain how STP can manage risk
scenarios and identify the risk categories. For protection of the STP assets, security
policy has to be defined and implemented and thus, the same has also been discussed.
Finally, the report presents a list of recommendations that aim to make the
implementation successful for a long term.
Network Security Assignment - STP Limited_2
Table of Contents
EXECUTIVE SUMMARY..................................................................8
INTRODUCTION.........................................................................10
PROJECT BACKGROUND..............................................................10
PROJECT SCOPE........................................................................................... 10
PROJECT GOALS.......................................................................................... 11
STRATEGIC ALIGNMENT OF THE PROJECT...........................................................11
NETWORK SECURITY..................................................................12
IDEAL BRANCH-OFFICE SECURITY SOLUTION......................................................13
SECURING DATA.......................................................................................... 14
MOBILE DEVICE SECURITY............................................................................. 15
WIRELESS LOCAL AREA NETWORK (WLAN) ATTACKS.........................................15
BYOD RISKS.............................................................................................. 15
PLAN FOR HARDWARE PURCHASES................................................16
ACQUISITION OF NEW HARDWARE....................................................................17
END USER FEEDBACK AND REVIEWS.................................................................17
PURCHASING STRATEGIES.............................................................................. 18
ASSET REGISTER.......................................................................................... 18
BUSINESS CONTINUITY................................................................19
RISK MANAGEMENT...................................................................20
RISK MANAGEMENT STRATEGY.......................................................................20
Risk Identification.................................................................................... 20
Risk Responsibilities................................................................................. 20
Risk Assessment....................................................................................... 20
Risk Response......................................................................................... 20
Risk Mitigation........................................................................................ 21
Tracking and Reporting.............................................................................21
SECURITY POLICY......................................................................21
OBJECTIVE.............................................................................................. 21
THE SECURITY POLICY ENSURES THAT:..............................................................21
TRAINING AND AWARENESS............................................................................23
INTEGRATION TECHNOLOGY...........................................................................23
CONCLUSIONS...........................................................................24
RECOMMENDATIONS..................................................................24
REFERENCES.............................................................................27
Network Security Assignment - STP Limited_3
Introduction
STP Limited is an organization that is based out of Wollongong and has its head
office in the same city. The organization manufactures cabinets and is expanding to
the other regions as well. The sales and revenue are going good for the organization
and as a result, it recently bought office premises in Bathurst and Lithgow. They have
also set up a new office in Sydney. The company is currently located in four locations
and has warehouse machines and other equipment installed in these locations.
Project Background
There are new networking and communication technologies that are being used by
STP Limited to enhance its connectivity and integration capabilities. Every office of
the company is equipped with a modem and a switch and the Internet connection is
made active with the aid of ADSL. The members of the staff are allowed to Bring
their Own Devices at work which is also known as the BYOD scheme. The wireless
connections are also made enable by the organization.
The enhanced network connections will allow the employees to be connected with
each other at any hour of the day. It will aid in the resolution of the problems and
conflicts in a timely manner and will make it possible to experience enhanced
efficiency and productivity of the employees. The customers will also be able to
contact the organization in case of any query or complaint. There will be enhanced
help and assistance services provided which will make it easy to increase the levels of
customer trust and engagement (Cisco, 2008).
Project Scope
The scope of the project will include the design, development and deployment of the
measures so that the enhanced networking mediums are implemented. Privacy is one
of the essential properties that are required to be maintained in association with the
information and networks. The efforts will also be implemented to make sure that the
privacy of the information and the communication networks is not disturbed or
violated.
Project Goals
Ability to make sure that all the office locations and units of STP Limited are
integrated with each other as a single unit.
Network Security Assignment - STP Limited_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Networking Environment and Connections
|14
|3087
|86

STP Limited STP Limited Networking & Communication Project 10/11/2017 Overview
|22
|6029
|449

Network Analysis of STP Limited Name of the University Author Note
|14
|3010
|282

Advanced Networking - Assignment on STP Limited
|15
|3414
|41

STP Report15 STP BUSINESS STATEGIC Report Executive Summary Technology Advances and the Transformation of Business Organizations
|15
|2675
|432

STP Network Analysis Report Assignment
|10
|3005
|64