IT Infrastructure Security: Recommendations and Upgrades Report

Verified

Added on  2022/12/26

|13
|591
|20
Report
AI Summary
This report focuses on the current IT infrastructure and its security, providing recommendations for improvements and upgrades. It examines the existing infrastructure, identifies vulnerabilities, and suggests solutions such as implementing hardware firewalls, enhancing data protection through encryption and authentication, and upgrading network diagrams. The report also addresses e-commerce strategies, suggesting the implementation of filtering systems. Moreover, it emphasizes the importance of both hardware and software security measures, including the use of strong encryption, separate networks for guests, and the implementation of anti-virus software. The report also highlights the need for employee training and the utilization of data masking and encryption technologies. The report concludes by referencing several sources that support its recommendations.
Document Page
Information technology
infrastructure and its security
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Current infrastructure
The Company depends on a robust infrastructure.
The infrastructure comprises of different hardware and software in its systems.
There are different sections in which the infrastructure is divided (Bennett et al.,
2013).
There are various management level present in the infrastructure of the
company.
The infrastructure is based on different technologies that works automatically.
Document Page
recommendatio
ns
Hardware firewall can be implemented.
Firewall will protect the information technology infrastructure.
Different type of software must be implemented so that phishing attacks can be
prevented.
Data can be protected by the method of authentication and different encryption
technology.
Document Page
Up gradation of the system
drawings
The network diagram of the system need to be upgraded.
The up gradation will help in preventing the different harms.
Network need to be updated.
The drawing must be more elaborate.
The system drawing is congested.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Erp system management plan
It is an integrated software application.
It is used to manage and control both the external and internal factors (Hudis et al., 2015).
All the functions of the organization is managed.
It helps the employees to perform the different business.
It helps in the implementation of the different business process.
Document Page
ERP
Human
Resource
Management
Customer
Relationship
Management
Manufacturing
Resource
Management
Supply Chain
Management
Financial
Resource
Management
Image: ERP Planning (Source: As created by the author)
Document Page
E-commerce recommendation
Different online strategies can be implemented.
The e-commerce platform must be attractive.
The e-commerce plans requires the reuse and recycle process.
Introduction of different filtering systems (Moghe, Gehani & Smith,
2014).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
security recommendations
Different security can be implemented in the system.
The security can be hardware and software security (Soomro, Shah&
Ahmed, 2016).
Different Policies need to be implemented.
All the employees must be educate.
Document Page
Firewall can be implemented.
Proxy servers can be used.
Unauthorized access must be prevented.
Access of different type of information from different location must be
denied.
Hardware implementation for
security
Document Page
Software implementation for
security
Strong encryption method can be used.
Separate network for the guest is required.
The MAC authentication need to be enabled for the users.
Different anti-virus software must be implemented.
Requires software for protection against the various phishing attacks.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Technologies that can be
implemented
Data protection technology must be implemented.
Different network security must be enabled in the system.
Various data masking and data encryption is used.
The employees must be well trained.
Document Page
References
Bennett, J., Stager, M., Shevlin, G., & Tang, W. (2013). U.S. Patent No. 8,516,594. Washington, DC: U.S.
Patent and Trademark Office.
Hudis, E., Helman, Y., Malka, J., & Barash, U. (2015). U.S. Patent No. 8,959,568. Washington, DC: U.S.
Patent and Trademark Office.
Moghe, P., Gehani, N., & Smith, P. T. (2014). U.S. Patent No. 8,880,893. Washington, DC: U.S. Patent and
Trademark Office.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic
approach: A literature review. International Journal of Information Management, 36(2), 215-225.
Document Page
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]