Consolidation Security Project: Skillage IT Network Business Plan

Verified

Added on  2021/01/02

|20
|1570
|422
Project
AI Summary
This project report presents a comprehensive network security plan for Skillage IT, aiming to enhance operational control and improve data sharing. The report outlines a detailed business plan, specifying objectives such as securing the network and improving operational efficiency. It includes problem specifications, a work schedule with cost breakdowns for hardware and software, and pricing details. Technical aspects covered involve network design, directory structure, server specifications, and security policies. The project also addresses testing, maintenance, and user documentation. Furthermore, it includes a financial plan, project acceptance form, and discusses future enhancements. The conclusion emphasizes the importance of the networking plan for Skillage IT's business activities, supported by a comprehensive list of references from books, journals, and online resources. The project seeks to implement a secure and efficient network infrastructure to support Skillage IT's business objectives and future growth.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
CONSOLIDATION
SECURITY PROJECT
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
TABLE OF CONTENTS
EXECUTIVE SUMMARY.............................................................................................................1
INTRODUCTION...........................................................................................................................2
BUSINESS PLAN...........................................................................................................................2
Objective.................................................................................................................................2
Problem specification.............................................................................................................2
Work Schedule.......................................................................................................................2
Gantt chart:.............................................................................................................................3
A Network design and supporting documents........................................................................4
B. Directory structure.............................................................................................................5
C. Server Specification...........................................................................................................7
D. Server build task list template...........................................................................................9
E, Server test plan...................................................................................................................9
F. Maintenance plan of server..............................................................................................10
G. Router specification.........................................................................................................10
H. Security Policy and plan..................................................................................................11
I. User Documentation..........................................................................................................12
J. Project sign off..................................................................................................................13
Ongoing Maintenance Support.............................................................................................13
Financial plan.......................................................................................................................13
Pricing details.......................................................................................................................14
Professionals service fee.......................................................................................................14
Project acceptance form.......................................................................................................14
Testing..................................................................................................................................15
Further Enhancement............................................................................................................15
CONCLUSION..............................................................................................................................15
REFERENCES..............................................................................................................................17
Document Page
EXECUTIVE SUMMARY
Better operational control as well as records of all the transactional activities are required to
have appropriate plan for the activities. In the present report there will be discussion based on
operational plans and the setting up and network system which will be helpful to have
appropriate business practices of Skillage IT.
1
Document Page
INTRODUCTION
Connecting all units of business with a motive to have satisfactory information relevant
with activities and performance made during a period. Creating a network system will assist a
helpful approach which brings proper administration over industrial operations. Skillage IT is
planning to improve its networking system within organisation which requires an accurate
business plan. Application of various technical tools which will enhance networking and
communication framework in entity. Report consists of all the tasks and activities which are
needed to be implicated by professionals that will be used for proper monitoring and execution
of business activities.
BUSINESS PLAN
Objective
Motivation of business is for developing a networking system which is within premises
which will be highly secured and protected from external influences. It will be incorporated with
well versed techniques, VPN connection, Server, modem and upgraded technologies that will
bring enhancement to operational activities. Data sharing in Skillage IT will be improved will be
convenient to professionals in sharing data with proper confidentiality.
Problem specification
To manage the operation in manufacturing, warehousing and distribution of the
organisation which requires proper administration.
Controlling staff, agent’s offices with respect to bring increment in the efficiency of
business.
Raining the sales at the target of $25 million per annum.
Retaining the 5% growth every year for upcoming 5 years.
Configuration the network system which will help in balancing operations as well as
managing tasks.
Work Schedule
Task
Mode Task Name Duration Start Finish Predecessors
Auto
Scheduled User Configuration 2 days Mon 20-08-
18 Tue 21-08-18
Auto Network Configuration 4 days Wed 22-08- Mon 27-08- 1
2
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Scheduled 18 18
Auto
Scheduled Package management 7 days Tue 28-08-18 Wed 05-09-
18 2
Auto
Scheduled Update Installation 3 days Thu 06-09-18 Mon 10-09-
18 3,2
Auto
Scheduled VPN configuration 4 days Tue 11-09-18 Fri 14-09-18 4,2,1
Auto
Scheduled Firewalls abd Iptables 5 days Mon 17-09-
18 Fri 21-09-18 4,5,3
Auto
Scheduled Securing SSH 9 days Mon 24-09-
18 Thu 04-10-18 6
Auto
Scheduled Daemon Configuration 3 days Fri 05-10-18 Tue 09-10-18 7,4,6
Auto
Scheduled
Selinux and Further
Hardening 6 days Wed 10-10-
18
Wed 17-10-
18 8,4
Auto
Scheduled Logging 2 days Thu 18-10-18 Fri 19-10-18 9
Gantt chart:
3
Document Page
A Network design and supporting documents
Designing a suitable data set will require effective methods and techniques to implicate
proper transactional activities. Consisting all necessary information as well as physical and
network design which will circulate information all over offices and data centres. Skillage IT
needed to design routing protocols on which data transaction and communication among several
units must have confidentiality as well as there will be no chances of any manipulating
information. Developing networking chain in business environment requires speed and cabling
types which swift the transactional activities. Including an IP system brings control over
accessibility as well as it creates a proxy wall which protects network system from malware and
viruses (Network Documentation Best Practices: What to Create & Why, 2016). Similarly, IP
address allocation table will effectively control industrial operations. It consists of registering
network on private networking system such as IPV4 and IPV6. Moreover, there has been
requirement of various network documentation such as:
Wi-Fi diagram:
4
Document Page
Rock layout diagram
cable plan
routing protocol diagram
patching table
security diagram
Asset tracking
Cloud services diagram
Password vault
B. Directory structure
Directory structure comprises with making effective designation of the job project code.
It includes several sub directories known as file managing or naming convention (Shariatinasab
and et.al., 2017). It creates the project information and directory structure based on various
elements such as:
5
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Sites: Under domain system sites which are comprised with one or more than one subnet.
It uses configure directory access and replication (Working with Domain Structures, 2017).
Configuration of various sites will have effective control over business operations through
mobility in work practices.
Organisational units: Usefulness of organisational group on which a person wanted to
deploy group policy settings for a subset of users, computers as well as groups within a domain
system. Organisation comprises with various units and operational departments which are needed
to be connected on a single network system (The Difference between Organizational Units and
Active Directory Groups, 2017). Skillage IT will have effective networking system which
improves reporting and communicating techniques inside the firm. It has various administrative
tasks such as:
Managing group membership
Monitoring users
Executing groups
Resetting passwords on user groups
Administrating group links
Groups: Grouping projects with their codes or names will bring ability and accuracy in terms of
keeping the reliable data. Similarly, in networking system, it approaches towards making an
6
Document Page
effective and active directory group (El-Gheriani and et.al., 2017). Usefulness of this technique
in assigning permission to industrial resources for initiating operations. Putting users into small
group on which they will become able to imply with groups to an access control list (ACL).
Requiring the AD groups mirror as per organisational hierarchy such as finance group, legal,
marketing etc.
C. Server Specification
Demonstrating fruitful server location and specific information there are some factors
which are needed to be administered by professionals of Skillage IT. Server specification will
bring effective control over network system implications in business. Thus, there are several
components which are needed to be considered by professionals such as:
Number and location of virtual and physical servers: Physical servers are mainly
incorporated with physical devices such as operating system, windows and Linux which runs
through a device. Therefore, these are termed as Physical server. Skillage IT needed to have
appropriate operating system in each device as well as which consist security keys. It will be
remove chances of data break or losing confidential data (Physical server vs Virtual server,
2016). On the other side, virtual server is also known as virtual machines of VPA system.
Operation of a VPA through operating system that simulates an operating environment. It
virtually creates devices of machines and run them.
Roles of Servers: Configuring role of a server is for facilitating appropriate network
coverage in a premise (Mokhlespour Esfahani and et.al., 2017). It ascertains software
components that allows server in performing specific operations for users and relevant computer-
based networks.
Approval sign off a document:
7
Document Page
8
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
D. Server build task list template
For building a suitable server for the business environment, there is need to have
appropriate plans and steps that will help in designing servers for operations. Skillage IT will
have effective plans and operational practices which will be indicative and helpful as per
building a suitable network area (Azeem, Usman and Fong, 2017). There are tasks and list of
activities which are needed to be done such as:
On the basis of these steps, it can be said that there are various steps which emphasised
on building suitable networking environment in business (Li and et.al., 2018). On the initial
level, there is needed to have systematic operational system, root password as well as proxy
server which stops malware and viruses to attack the network or operating system in
organisation. Skillage IT has to develop a server with consideration of all above listed
information and detailed techniques.
E, Server test plan
Testing efficiency of server with respect to various steps and techniques which are
needed to be followed by them (Set up a testing server, 2017). It consists of various steps which
9
Document Page
are needed to be followed by professionals of Skillage IT as to have appropriate network
development plan. It ascertains various steps and techniques that will be helpful and appropriate
as per testing the existing severe plan of business. These steps can be demonstrated as:
Selecting site>manage site-specific
Click new for setting up a new site/ selecting and Dreamweaver site and clicking edit
icon.
Select a server category as per clicking on site setup dialogue box such as click add new server
button / edit existing server button
For the remote server connection there is must be click on an advanced button.
Selecting severe model as per web application by considering the testing server (Zhao,
Wang and Wu, 2017).
To save the advanced screen it requires a click to save, then all the changes were
automatically saved which were edited as well as newly designed.
F. Maintenance plan of server
Administrating and managing the severe of then organisation there is need to set up plans
for analysing data set. Thus, it comprises with creating a maintenance plan for existing server of
business such as:
Initiate the plan with object explorer than click plus sign which will expand severe where
the maintenance plan will be created (Create a Maintenance Plan, 2017).
For expanding managements folder click on plus sign
Selecting new maintenance plan as per clicking right click on maintenance plans folder
In new maintenance plan dialogue box, need to type name, type of plans and then OK.
G. Router specification
Implementing plan: there has been various plans and operations which will be effective
and helpful for developing the business networking system. For setting up most reliable as well
as helpful network system in the organisation Skillage IT needed to have development of various
plans and operations. Motive of industry for setting up an appropriate plan which will be helpful
10
Document Page
in developing network system that will be prompt, quick as well as reliable in keeping
confidential data.
Required cable types: Building a secured and protected network system in organisation
on which Router needed to be connected among various devices with the help of wireless or
cabled connection. Therefore, Skillage IT needed to select a specific type of cable. Thus, the best
suitable cable for operations is Coaxial cable that will be accurate as per handling the radio
frequencies, signals etc. in spectacular way (Shariatinasab and et.al., 2017).
Using protocols: Protocols are necessary to be implicated in the network system which
in turn will be effective and accurate in terms of analysing data set (El-Gheriani and et.al., 2017).
It protects the devices as well as network system from external threats or viruses which affects
network system in a business. Skillage IT has implicated the use of transmission control protocol
[TCP] and Internet protocol [IP]. Moreover, there can be use of various other kinds of
networking protocols which will be effective and helpful as to maintaining the network security
in the premises.
Traffic monitoring process: there has been use of various traffic monitoring system.
Therefore, over the internet or networking site sometimes it indicates the higher traffic over the
particular site which in turn affects the operational practices as well as functioning of the site.
Users will agitate as they do have appropriate accessibility to that site (Mokhlespour Esfahani
and et.al., 2017). Thus, there is need to have effective control over the trafficking activities such
as Bandwidth (KBPS) and Update internal (ms) which will be a helpful tool in monitoring the
traffic as well as setting techniques to over-come with trafficking issues.
H. Security Policy and plan
Protecting internal operational data as well as software system Skillage IT has to
implicate various policies and plans. Therefore, to analyse the plan there are various steps which
has been analysed and implicated by the business such as:
Perimeter Design: It insists for creating a firewall or proxy wall which bans various sites
which will not being accessible by the users in a particular server (Azeem, Usman and Fong,
2017). Therefore, there mainly social media sites which has huge manipulation of data set as
well as comprises with various viruses and malware that affect the security system of internal.
11
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Remote Access: this technique comprises with having the remote access of the devices
through different location. For instance, using the office computer through home or wise versa. It
will be helpful and appropriate technique which keeps the users to work from any location. It
brings the appropriate accessibility to employees in organisation (Li and et.al., 2018).
Site to site links: installation of VPN system which enables the professionals in terms
with using the site to site networks in organisation.
In depth Defence: these are the information assurance concept which helps in keeping
the multiple layers of security controls that will be placed against information technology.
Security monitoring and auditing: It will be a helpful tool which in turn builds up the
best network security system that will be helpful and beneficial as per making effective auditing
and monitoring of operations (Zhao, Wang and Wu, 2017).
Identification of threat: It comprises with the indication of the chances of losing the
confidential database of the firm. Therefore, it will be due to malware, manipulation of
operational transaction. It affected speed of network system as well as the processing of
computer devices.
Analysing risks: there has been various risks which are involved with the business
operations that are needed to be resolved and overcome with the operational practices. Skillage
IT needed to have appropriate implication of various software which will be effective for
controlling the risks as well as monitoring the business operations (Shariatinasab and et.al.,
2017).
Response procedure: after developing the appropriate development plan for the business
network system there is need to have effective planning and organising of the data set. The
professionals are bound to respond quickly over the procedure of activities.
I. User Documentation
Developing effective network system in organisation which comprises with the
implication of various documentation. Therefore, there are two techniques of gathering
appropriate documentation such as process and user documents
12
Document Page
J. Project sign off
This is the key approval technique which insists that the when the projects is completed
or delivered than there will be requirements of approval of the project which is known as sign off
(El-Gheriani and et.al., 2017).
Ongoing Maintenance Support
Regular maintenance and operational control is needed to implicate by the business
professionals (El-Gheriani and et.al., 2017). Moreover, implicating a business network system
which in turn requires into have appropriate administration of the imposed plans.
Financial plan
Hardware Description Price
wireless access point/
Proxy wall Network Design and Support documents $ 1,025.65
TP- Link TL-WR840n 300 mbps Wireless N
router $ 756.21
CPU1: Amd Opteron Quad core, 2.4 GHz $ 426.31
CPU2: 2nd socket Open $ 84.25
RAM: 20 GB DDRII ECC $ 441.26
Directory structure $ 1,150.32
server specification $ 936.85
server test plan $ 1,125.26
maintenance plan of server $ 123.45
router specification $ 9,867.50
security policy and plan $ 142.60
User Documentation $ 220.18
Project Sign off $ 176.50
Ongoing maintenance Support $ 144.80
Total costs of hardware $ 16,621.14
Software Operating system
Linux Ubuntu 8.04 LTS $ 127.50
Windows server 2008 $ 76.80
VM1 running FTP and Zimbra $ 388.60
VM2 running file sharing, printer queues and
domain administrator $ 786.00
Total cost of software $ 1,378.90
Total cost of project $ 18,000.04
13
Document Page
Pricing details
Hardware description and prices of proxy wall which is comprised of using TP- Link TL-
WR840n 300 mbps Wireless N router will be cost at $756.21, CPU1: Amd Opteron Quad core,
2.4 GHz at $426.31, CPU2: 2nd socket Open at $84.25 and RAM: 20 GB DDRII ECC at
$441.26. Directory structure, server specification, server test plan, maintenance plan of server,
router specification, security policy and plan, User Documentation, Project Sign off and Ongoing
maintenance Support cost at $ 16,621.14.
Software description and prices- Operating system, Linux Ubuntu 8.04 LTS at $127.50,
Windows server 2008 at $76.80, VM1 running FTP and Zimbra at $388.60 and VM2 running
file sharing, printer queues and domain administrator at $786. Thus, the total fund requirement
for this plan is $18000
Professionals service fee
There will be payments to the professionals which are incorporated with the business
activities as per their operating efforts and management of activities held in Skillage IT.
However, they will be payables as per working hour and efforts made by them in the operations.
Installation planning Activity order time
Skillage IT office As per all equipment NA
Developing connection Creating the network system 2 days
Computer and devices setup Purchase and installation with
proper programing
5 days
Project acceptance form
14
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Testing
Implication of such projected plan will require testing of the security system. Therefore,
execution of all machineries, equipment and software is necessary for continuing business
activities. However, it can be done with influences of various stages such as:
Perform cable tester which will execute all the connections and cable used in devices.
Testing the performance of server
Checking conveniency of clients for effective logging
Checking data transactional process as well as confidentiality of records.
Checking data backup and location for storing information with proper security keys.
Further Enhancement
To promote this network system on a most favourable manner which will require that there
will be adequate management and operational control over each task. Therefore, backing up data
is required to be taken seriously as well as there is needed to have large memory for storing
details. Along with this, investment in various units is required to manage the operations as well
as making productive increment in goals and operations. Server controller on domain name of
Skillage IT is required to be highly secured and protected from all malwares or viruses.
CONCLUSION
On the basis of above report it can be said that developing a networking plan in the
organisation will need several techniques and policies which will be helpful in bringing the
15
Document Page
appropriate control over the operational practices in the business activities. Thus, Skillage IT has
been beneficial as if they ascertain all the requirements as well as make appropriate management
plan for the future activities.
16
Document Page
REFERENCES
Books and Journals
Azeem, M., Usman, M. and Fong, A. C. M., 2017. A churn prediction model for prepaid
customers in telecom using fuzzy classifiers. Telecommunication Systems. 66(4). pp.603-
614.
El-Gheriani, M. and et.al., 2017. Major accident modelling using spare data. Process Safety and
Environmental Protection. 106. pp.52-59.
Li, L. and et.al., 2018. Conditioned empirical orthogonal functions for interpolation of runoff
time series along rivers: Application to reconstruction of missing monthly records.
Journal of Hydrology. 556. pp.262-278.
Mokhlespour Esfahani, M. I. and et.al., 2017. Trunk motion system (TMS) using printed body
worn sensor (BWS) via data fusion approach. Sensors. 17(1). p.112.
Shariatinasab, R. and et.al., 2017. Application of ANN and genetic algorithm for evaluation the
optimum location of arresters on power networks due to the switching overvoltages.
Energija. 60(1-4). pp.0-0.
Zhao, B., Wang, J. and Wu, F. X., 2017. Computational Methods to Predict Protein Functions
from Protein-Protein Interaction Networks. Current Protein and Peptide Science. 18(11).
pp.1120-1131.
Online
Create a Maintenance Plan. 2017. [Online]. Available through :<https://docs.microsoft.com/en-
us/sql/relational-databases/maintenance-plans/create-a-maintenance-plan-maintenance-
plan-design-surface?view=sql-server-2017>.
Network Documentation Best Practices: What to Create & Why. 2016. [Online]. Available
through :<https://www.auvik.com/media/blog/network-documentation-best-practices/>.
Physical server vs Virtual server. 2016. [Online]. Available through
:<https://www.rosehosting.com/blog/physical-server-vs-virtual-server-all-you-need-to-
know/>.
Set up a testing server. 2017. [Online]. Available through
:<https://helpx.adobe.com/in/dreamweaver/using/set-testing-server.html>.
The Difference Between Organizational Units and Active Directory Groups. 2017. [Online].
Available through :<https://blog.varonis.com/the-difference-between-organizational-units-
and-active-directory-groups/>.
Working with Domain Structures. 2017. [Online]. Available through
:<https://msdn.microsoft.com/en-us/library/dd163510.aspx>.
17
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
18
chevron_up_icon
1 out of 20
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]