Project Background
Network project Background
STP limited which is a well-known cabinet makers have four factories at different location namely Wollongong, Lithgow, Sydney and Lithgow and they are sellers of cupboards and front drawer to a large number of customers from different location. STP limited has decided to upgrade the present information system in their location and they have also planned to conduct various business activates which will help in improvising the stock control and accounting system. They have also decided to upgrade the present information system better customer management and website management. The report mainly focuses on the implementation of information system and it role in maintaining privacy and security of the system. Proper investigation has been done and various parameters of the project like scope, requirements, expectation has been discussed in brief. Certain problems have been noticed like poor skilled labor, inappropriate control of stock, lack of product manufacturing, workforce and productivity. The organization has been small number of technical staff to meet the needs of various business. The staff of STP limited needs more staff who technically sound so that they can easily satisfy the needs of businesses.
The scope of the project generally consists of installation and proper configuration of database at four different locations that are Wollongong, Lithgow, Sydney and Lithgow. Internet connection through ASDL (Asymmetric Digital Subscriber line) which was connected with modems and switch comprises of wireless technology which will ultimately help the staff to establish connection through BYOD (Bring your Device). The project has been developed by keeping the fact in mind that project works well in the four major location. The project also emphasizes on certain pans which will help the various employees of the organization to get a proper knowledge for improving the knowledge of business operation. At present they have only one technical staff and part technology mainly focuses on handling various websites and different web services.
The goal mainly comprises of various management tools and internal staff of this firm that is STP limited to establish different business activities and make an easy work for various customers and client of the organization. The ultimate goal of the project is to provide organization with skilled technical staff and it also focuses in increasing the production of customer and clients based application. It also emphasizes in establishing relationship of organization with various customers and client with the adaptation of CRM system along with upgradation of website for supporting the products of organization.
Project Enhancing the Future Growth of STP: Project Scope
During the implementation of a new technology in a organization there are certain risk as well as some advantages. So the management team must check the strength, weakness, challenges and various threats related to it. Now I am IT system manager of STP and my job to make a SWOT analysis on various process of company and mainly aims in checking the various benefits that this IT system has given to STP. The plus points of IT systems are large customer base, cloud computing can help them and many staff are willing to learn. The minus point is that the employees are not technically skilled and there are many vulnerabilities related to threats from inside.
STP limited has some information system in their location and they have achieved some benefits from it. The IT system must be managed by using different strategies which can be internal or external (Summers and Smith, 2014). Internal layer must have applied in the different layers which consists of regulation, policies, people and various products in their location.
IT system of STP limited mainly depends on Internet for monitoring of various strategies, policies and procedure which will ultimately help them in conducting various operation of business. The rules of security generally aim in providing various business operation in a secure and safe way. These policies can be helpful in storing and accessing of data.
STP limited is highly dependent on Internet for carrying out various business activity and WAN can be beneficial in providing them with better and protected services from various threats like virus and different malware software. Big Pond Network has the power to check the secure network by adapting new security features which can help in overcoming the effects of various security breaches. ISP has the power so that the payment system can be used in a better way.
Wireless networking is considered to be risky as the staff of an organization connect various devices like laptops through wireless technology. Various intruders can make use of weak network technology by making an access to the system and hack the important files of the database. Attacks in relation to WLAN can be easily routed through proper configuration of employees and different training programs related to the given employees.
BYOD risk can be helpful in improving different financial risk and various devices are used by users and can be helpful in discloser of important information on system. Other types of problems are the association of various malware activities with software and Operating system. BYOD must be used in such a way that it can protect the operating system form any breach.
Project Goal
STP limited has many things to offer and it has the power to analyze, it can be useful in preparation of various strategies, procedure and policies. This infrastructure will help various staff members to reduce disruption and overcome product related issues.
Software’s are improvising day by day and is getting upgraded on daily basis. The latest software can adjust or work with the old hardware within an organization and security breaches may result from different sites which are not trustworthy and verified (Ciampa, 2012). Those files that run on background can be considered to be vulnerable. Various antivirus software’s must be installed and latest hardware must be used for achieving the best results. End user are required to check risk and with help the management team best decision can be easily made.
STP limited require forward planning and it must store money for purchasing hardware for various activities of business. The members of an organization must have a communication with each other and should make better strategy for improving the present business. They must recognize different suppliers and should understand the needs of business through asset register.
IT asset is helpful for IT services as well as for accountants and it can be helpful in checking the needs of hardware which are essential for replacing in order to achieve betterment for a company. The hardware must be replaced with new one which can easily provide address and recognition. So the IT asset register and STP limited must be careful for selecting the proper hardware.
IT system through the installation and configuration of various cloud application like MYOB and salesforce can be helpful in achieving various activities which will ultimately improve their business activities. Data backup and planning succession are two important topics which will be discussed in the coming section which help STP limited in achieving a better overview of various cloud application which can ultimately help in improving the business growth.
STP limited has decided to use cloud based SaaS apps which can be helpful for organizing for storing various files as Backups. This firm has used cloud backups as per their needs which has help them in attaining competitive edge. They can easily store files using cloud technology and can modify files as backups. They can store and modify different data on cloud technology. This will ultimately reduce cost and can easily buy server to store various files as a backup and chances of virus attacks has been reduced due to advanced cloud vendor technology.
Strategic Alignment of Project
Cloud based technology can be helpful in solving the problems and challenges related to physical security. Physical securities faced here are failures of network, blockage of roads and power outage. Cloud vendor can easily store important data for the organization so that they face any problem and even if the devices are damage the data will be safe. Cloud technology aims in protecting it from any threats from inside.
Any employee of a company can be injured or can suffer from severe illness, members can resign or may even die. Irrespective of consequence the firm must be ready to tackle the mere effects. A suitable successor must be prepared for performing the role of job. Successor must have proper knowledge to check the requirements of various business. They should be preparing for taking proper action which can help in achieving proper decision.
Website of this organization must be designed in such a way that consumers can easily view the available products. Cupboards, drawer fronts having various colors, texture and style must be used and data must be stored in the cloud and it can be easily modifying as per the needs. The availability of stock must be updated at any time. As soon as the product is ordered it be improvised in the database so that various employees across the four factories of this company can easily keep a track of different products.
Adaptation of various technology can be beneficial in minimizing threats, risk and issues of privacy. STP limited must be enough responsive and should take security model for achieving the better growth of the firm.
Security policies must be used for protecting and securing the different assets and can be beneficial in achieving the growth of business. These policies can act as a tool which will help organization in secure conduction of business.
Risk model must analyze the three aspect which can be useful in improving the efficiency of STP limited. Risk model can be helpful in addressing various risk which must be identified and detected. Risk prevention technique must be applied so that to overcome all the risk associate within an organization. Employees of STP must be enough trained so that they can easily handle threat and various data breaches in more efficient way.
Integration information technology can helpful in serving the purpose through SaaS model and PaaS model and better plus points can be easily achieved. PaaS consist of independent vendors of software which has the capability to build and execute various software application. There are still some issues of data breaches, security issues and interoperability issue which can be highlighted and the employee and management team must provide service level agreement to acquire proper services.
Conclusion
From the above discussion it can be easily concluded that security control measures can be helpful in adopting information system in STP limited. Various security breaches have been highlighted through the report and risk related to wireless LAN and BYOD devices has been discussed in brief. The possible ways to overcome the problem has been discussed and the three aspects are policies, people and product can be considered in overcoming security breaches. This report will help STP limited to check various measures which should be taken to improve the given business.
- STP limited should implement policies and procedure properly for carrying out various business process.
- STP limited should run their business through some secured network
- Asset register must be well maintained and the firm should be careful about various risk management procedures
- They must keep a back of important file which contain financial data and customer data.
- The employees of this organization must be trained so that they can provide better services and training can be also helpful in checking various threats.
Australian Taxation Office (ATO) 2016, Taxation Ruling TR 2016/1, Australian Taxation Office, viewed 6 October 2016, <https://www.ato.gov.au/law/view/document?docid=txr/tr20161/nat/ato/00001>.
Batenburg, RS, Mikalef, P, Pateli, A, Van De Wetering. R 2015, ‘Purchasing alignment under multiple contingencies: A configuration theory approach’, Industrial Management & Data Systems vol. 115, no. 4, pp. 625-45, doi: 10.1108/IMDS-10-2014-0298
Ciampa, M 2012, Security + guide to security fundamentals. 5th edn, Cengage, Boston.
Chang, E, Dillon, T, Wu C 2010, ‘Cloud computing: Issues and challenges’, 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp. 27-33, doi: 10.1109/AINA.2010.187
Crawford, M, Horstmann, B, Keller, S, Powell, A & Predmore, C 2005, ‘Information security threats and practices in small businesses’, Information Systems Management, vol. 22, no. 2, pp. 7-19, viewed 20 October 2016, <https://ezproxy.usc.edu.au:2048/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=heh&AN=16195727&site=ehost-live>.
George, E 2013, ‘5 steps to planning for internal successors in a small business environment’, Journal of Financial Planning, vol. 26, no. 8, pp. 21-23, viewed 16 October 2016, <https://web.b.ebscohost.com.ezproxy.usc.edu.au:2048/ehost/pdfviewer/pdfviewer?sid=46892c54-447f-43c5-8e15-93f417c642d0%40sessionmgr102&vid=1&hid=116>.
Greitzer, FL, & Hohimer, RE 2011, ‘Modeling human behavior to anticipate insider attacks’, Journal of Strategic Security, vol. 4, no. 2, pp. 25-48, doi:https://dx.doi.org.ezproxy.usc.edu.au:2048/10.5038/1944-0472.4.2.2
Gupta, A & Hammond, R 2015, ‘Information systems security issues and decisions for small businesses: An empirical examination’, Information Management & Computer Security, vol. 13 no. 4, pp. 297 – 310, doi: 10.1108/09685220510614425
Harris, MA & Patten, KP 2014, ‘Mobile device security considerations for small- and medium-sized enterprise business mobility’, Information Management & Computer Security, vol. 22, no. 1, pp. 97 – 114, doi:10.1108/IMCS-03-2013-0019
Queensland Government 2016, Key components of a digital strategy, Queensland Government, viewed 16 October 2016, <https://www.business.qld.gov.au/business/running/technology-for-business/digital-strategy/key-components>.
Telstra 2016, ‘Broadband security’, Telstra Corporation, viewed 18 September 2016, <https://www.telstra.com.au/support/category/broadband/security/what-is-telstra-network-security>.