Sunday, May 3, 2020

Network Analysis of STP Limited Samples †MyAssignmenthelp.com

Question: Discuss about the Network Analysis of STP Limited. Answer: Project overview: Project background: The company, STP limited is concerned with the development and manufacture of cabinet. Their main office location is situated in Wollongong. In addition, for bringing out more productivity and sales, the company has inaugurated new machinery in Sydney. The office in Sydney has various computerized machines for making the business a smooth place. In addition, the cost of production due to the adoption of such machinery is also intended to be reduced. Moreover, the company is also addressing their sales operations by making sales vans to get customer attention in the streets. The project is mainly being done for the increase in sales made by the company. The project is supposed to connect the various offices that the company will inaugurate. Furthermore, the project will also reference the various business solutions in the future as well. Project scope: This report mainly discusses about the scope and the aim of the project. In addition, the project also discusses about addressing the network requirements of the company so that a proper risk management is provided. Furthermore, the report also includes a business continuity plan to be included in the business operations of the company. Project goal: The goal of this project is to successfully implement a business architecture using the newly installed machinery in the Sydney office. Along with this, the project is also supposed to provide the expansion benefits so that their business solutions can be implemented in the future as well. Strategic alignment: The alignment of the project is done by installation of the machinery in Sydney. This is followed by addressing the sales made by the company. For this, the sales van is used to deliver the products to the customers. The sales vans are made to include the product prototypes along with some efficient personnel to install them on the customer houses as well. In addition, the business includes a traditional information system for addressing their reporting systems as well. Network security: Due to the newly implemented machinery in the office location of Sydney, the security implications are to be addressed for mitigating the presence of risks in the system. These risks can lead to various disasters in the system. In extreme cases, it can also lead to loss of business acquisition as well causing grave impacts. Securing data: This section of the report discusses about the various methods which can be used to provide security in data handling. These steps are to be integrated in the business solutions of STP limited. The first security application is the conduction of security audits. The use of security audits are mainly done for analyzing the presence of any vulnerabilities or threats in the system (Chen et al. 2016). The main benefits for the application of a security audit are the provision of analysis of the network infrastructure that will help the company to prevent unethical access or breaches from hackers. The second security process is the adoption of strong policies to help educate the employees regarding the various unethical works. This includes helping educating the people against phishing emails sent or other types of links that steals information once clicked. These are required to be eliminated and the employees are to be made aware of such practices. The third security adoption process is the use of a strong password. This is done to enable authentication on the administrative accounts of the system. In addition, the use of multiple passwords should also be used for accessing different layers of the system (Ghosh 2012). This process is mainly used to provide a hard time to the hackers so that the hacking process of the unethical users can be easily hampered and effective measures can be taken in time to reduce the existence of breaches in the system. The last security adoption framework to be adopted is the use of strong encryption standard for addressing the security requirements of the company. This is mainly done to prevent unethical access to the company data even if the data is lost (Apiecionek and Romantowski 2013). For example, if an important piece of information is lost from the external storage devices and it falls in the wrong hands of the unethical users, access to that data will not be guaranteed due to the presence of encryption on it. Mobile device security: This section of the report discusses about the security adoption techniques to be included in the network of the company. To connect various mobile devices to the office network, the need for a wifi router is required. The best ways to secure a mobile device is by securing the office network. The first security measure to be installed in securing the wifi connection is the frequent changes in the network name. This is a small type of security feature that protects the network in a small level. The second security protocol is the adoption of an encryption standard. These encryption standards are used to cipher the codes and prevent access to unauthorized users (Shin et al. 2014). This helps in securing the mobile network and helps in business continuity processes. The third process of security enhancements are the installation of a firewall technique. The firewall mechanism is already present in most modern routers and the company involved must adopt them into their solutions as well (Tata and Kadoch 2014). The presence of a firewall limits the access of harmful activities from the hackers to enter the system network. The last method of security application is the turning off of DHCP mechanisms. This process turns of the vulnerabilities that can be present due to the presence of hackers o unauthorized users. Hardware purchase plan: This section of the report discusses about the main plan for purchasing the hardware in the system. This new system will be incorporated in Sydney for addressing their business requirements. STP limited has incorporated fine computerized machinery for business solutions. Company requirements: The main requirements of the company are upgrading the network infrastructure to support the new business applications. The first requirements are the distributed databases and the sales people hiring. In addition, the company also needs knowledge about the type of hardware required to be installed in the sales vans. Strategies: The main purchasing strategies involved should be used for getting contracts of the hardware purchases. These are done to reference their needs in the business solutions in the right time (Kilger, Reuter and Stadtler 2015). The main consideration to be included in case of planning a strategy is that the integration of the new hardware does not take much business time so that they can be adopted right away. Cost: The cost is another requirement that is to be analyzed before contacting the hardware providers. This gives a general estimate for the requirements and helps to address them in terms of the cost requirements. Business continuity: The business continuity is a process which is there to ensure the continuity of the business processes. These are mainly adopted for getting an idea about the presence of any threats or vulnerabilities in the system that may halt the business activities (Authority 2014). To reference them, the organization board undertakes various policies and standards to address them in their business solutions. Resilience: This section of the continuity plan is used to address the various requirements for supporting the business infrastructure. In case of the STP limited, the business infrastructure setup can be ensured by properly managing the sales people. These will help the business to not lose their place of business and drive sales in the same place. Recovery: The recovery aspect can be ensured by safely protecting the distributed database of STP limited. The distributed database of the company includes stock control system, customer management system, accounting system and Microsoft Office. The databases are to be safely stored in the system both in the online and the offline mode. The online mode can be done by adopting cloud solutions and the offline mode can be referenced by storing the database in external storage disks (Jrvelinen 2012). Contingency: The contingency plan of a company involves the series of steps to be followed so that the company can recover from any disasters in the system (Torabi, Soufi and Sahebjamnia 2014). The contingency plan in STP limited includes the rolling back of the database functions in the system. This is done by taking the offline version of the database or the online version and applying them to the architecture. This will ensure business continuity without causing any time to waste. Risk management: This section is used to address the risks and vulnerabilities in the system and counter them by presenting a risk management plan. This plan is to be addressed in the business solutions of STP limited. The various steps to be followed in the risk management plan are as follows: Identification: The identification of the risks and vulnerabilities are to be done in this section. The various risks include the analysis of the sales people so that their operations in the business do not cause any problems to be associated with the company (Hull 2012). In addition, the lack of any customer accounts in the system is another risk that is to be identified Analysis: The risks discussed in the first section will be analyzed in this section in details. This includes considering the impacts that may occur due to the presence of such risks (Christoffersen 2012). In addition, this section also includes the consideration to be taken while applying for mitigation of these risks. Risk evaluation: This section evaluates the risks on the basis of their impacts. The sales people evaluation is considered the most prioritized one while the account creation follows after that. In case of wrong evaluation of the sales people credentials, the customer interests can be hampered leading to the company to lose their business. In addition, the customer account creation is also to be made to provide updated services to the customers and efficient management. Furthermore, the use of BYOD program is another risk due to the presence of security implications in any personal devices. Treatment: This section of the report is used to provide a mitigation plan for addressing the risks and the vulnerabilities present in the system (Lam 2014). The sales people evaluation can be done by properly checking their credentials so that their past records can be checked. In addition, the use of a customer account is mainly done for storing the customer credentials and applies them in the business processes. This can be done by contracting with an external supplier of database or creating an in-house application database. These will be used to store the account details so that any processes related to the customer activities can be effectively stored in the system. This will also be used to share the customer details with the company employees to keep them updated. Moreover, the presence of various BYOD policies will be in place to reference the use of personal mobile standards. Review of the risks: This section is used to provide the risk monitoring steps so that the company can effectively monitor them and address the necessary steps needed to mitigate them (Aebi, Sabato and Schmid 2012). Conclusion: This report concludes that the use of various business solutions to reference in the activities of STP limited can help to increase the various business needs. These include the increase in generated revenue and the increase in business processes. From the security portion of the report, it can be said that a successful and secure network can serve a business by reducing the risks that might be present. In addition, the hardware purchase section of the report identifies the requirements of that are also to be addressed for applying them in the business. Furthermore, from the report, the business continuity plan and disaster recovery plan to address the safety of the business process is also provided in this report. Recommendations: This section of the report is used to provide various recommendations to be applied in the business processes. The first recommendation to be included is the acceptance of a cloud solution. This process will be utilized in an efficient way that will solve the business process of handling customer accounts or sharing of the customer details among the employees. Along with this, the cloud solutions will also help in addressing the security of the process. References: Aebi, V., Sabato, G. and Schmid, M., 2012. Risk management, corporate governance, and bank performance in the financial crisis.Journal of Banking Finance,36(12), pp.3213-3226. Apiecionek, ?. and Romantowski, M., 2013. Secure IP network model.Computational Method in Science and Technology,19(4), pp.209-213. Authority, C.A.S., 2014. Business Continuity Management. Chen, F., Xiang, T., Yang, Y. and Chow, S.S., 2016. Secure cloud storage meets with secure network coding.IEEE Transactions on Computers,65(6), pp.1936-1948. Christoffersen, P.F., 2012.Elements of financial risk management. Academic Press. Ghosh, S., 2012.Principles of secure network systems design. Springer Science Business Media. Hull, J., 2012.Risk management and financial institutions,+ Web Site(Vol. 733). John Wiley Sons. Jrvelinen, J., 2012. Information security and business continuity management in interorganizational IT relationships.Information Management Computer Security,20(5), pp.332-349. Kerzner, H., 2013.Project management: a systems approach to planning, scheduling, and controlling. John Wiley Sons. Kilger, C., Reuter, B. and Stadtler, H., 2015. Collaborative planning. InSupply chain management and advanced planning(pp. 257-277). Springer Berlin Heidelberg. Lam, J., 2014.Enterprise risk management: from incentives to controls. John Wiley Sons. Larson, E.W. and Gray, C., 2013.Project Management: The Managerial Process with MS Project. McGraw-Hill. Schwalbe, K., 2015.Information technology project management. Cengage Learning. Shin, S., Song, Y., Lee, T., Lee, S., Chung, J., Porras, P., Yegneswaran, V., Noh, J. and Kang, B.B., 2014, November. Rosemary: A robust, secure, and high-performance network operating system. InProceedings of the 2014 ACM SIGSAC conference on computer and communications security(pp. 78-89). ACM. Shojaiemehr, B. and Rafsanjani, M.K., 2013. A multi-agent based model for collective purchasing in electronic commerce.International Journal of Machine Learning and Cybernetics,4(4), pp.409-417. Tata, C.H.A.F.I.K.A. and Kadoch, M.I.C.H.E.L., 2014, January. Secure network coding based data splitting for public safety D2D communications over LTE heterogeneous networks. In14th IEEE International Conference on Computer and Information Technology (CIT14). Torabi, S.A., Soufi, H.R. and Sahebjamnia, N., 2014. A new framework for business impact analysis in business continuity management (with a case study).Safety Science,68, pp.309-323. Zhang, J., Wen, Y. and Xu, Q., 2012. Simultaneous optimization of crude oil blending and purchase planning with delivery uncertainty consideration.Industrial Engineering Chemistry Research,51(25), pp.8453-8464.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.