Management has to know the trends and make the necessary technology changes to keep the company competitive. Preparation and planning is key to the implementation of new technology. Managers have to be in tune with how the changes will affect the atmosphere within the company. Providing training and paying attention to the feedback from the workforce allows for a smooth transition. For a successful transformation certain criteria have to be met for the transition of change to the new technology.
PPDIOO Life Cycle The network life cycle is an important set of processes and standards during a network development project. There are different methodologies when developing a network; however, I am going to focus on the Cisco standard known as the PPIDOO model (Wilkins, 2011). This model is a powerful methodology for the design, development, and implementation of networking solutions (National Institute of Standards and Technology, 2009). The reason this model is so powerful is that it describes the entire network life cycle from the project to the network becoming part of the business process; however, it is also this reason that its implementation has to be clear and precise. PPIDOO includes the phases Prepare, Plan, Implement, Design, Operation, and Optimize (Wilkins, 2011).
Developing these procedures include identifying and putting into practice compliance steps and processes. The company will need to implement preventative internal controls that incorporate risk mitigation. This segment of the process includes utilizing systems and benchmarking organizations for compliance techniques. Lastly, the company will need to determine which techniques to put into practice in its compliance attempt. The company will begin to implement its enterprise risk management system by developing an appropriate internal control and corporate governance system.
Phase one will require a consulting team to define the system to be developed and to determine the feasibility of the project. The team must address the question, "what does Bead Bar want to automate in the company?" Bead Bar has identified the desire to move company data, including management, financial, and inventory, to an Information Management System to be share throughout the organization. Once a solution is identified, and the feasibility determined a project scope document will be generated. This document will define the high-level system requirements.
The preparation of human recourses of the company includes planning for future needs of personnel, their required skills, employee recruitment, and employee development. 1.3.6 Definition of Terms A list of definitions that will be used throughout the duration of the project include the following: Best Practices: IT Best practices include the many processes and frameworks that a company will use to efficiently and effectively accomplish IT tasks. Risk: Risks are the potential that an error will occur in the IT project. Vulnerability: vulnerabilities are security holes that are in software or operating systems that could provide a way for the system to be attacked and penetrated. Vulnerability Assessment: A vulnerability assessment is the test and documentation of the effectiveness of both the security policies and controls.
A remote network access policy would define appropriate standards to be applied in connecting to the company’s network while outlining the security standards that devices attempting to connect to the network would follow for successful connectivity. This paper outlines the various network security guidelines that are secure both for the users within an organization and for remote users as well while maintaining a high degree of reliability. Security in Network Management Network management processes that have the backing of senior management are paramount in ensuring that the organization develops security for its network. The management needs to play a great role and incorporate security guidance into their network. The network security guidelines provided here should govern how the network should operate in the area of security, how the network would be developed to maintain security, how security is organized to support upcoming needs, and how the network will comply with the operational and regulatory security needs (Gupta, Chandrashekhar, Sabnis, & Bastry, 2007).
Unit testing will be completed on each of the system components. Mo... ... middle of paper ... ...n outlined the chosen software, hardware and networks in regards to the responsibilities of each. The related resources necessary to properly support and maintain the system were also identified. This is perhaps the most important part of the project as it serves as an investment protection policy for the company. It ensures not only that the project implementation is done, but also demonstrates the lengths the company is willing to go to properly implement new projects.
Another task for senior management to help with the development of the security framework by creating policies, standards, procedures, and guidelines. Thes... ... middle of paper ... ... also need to address external governance in which the company needs to include into their own to conduct business with other companies. A training program will need to be put in place and approved by management and the training program would be easy for employees to understand. Works Cited Grama, A. (2011).
They have been created, installed and used for hands on experience and practical’s so that to impact knowledge and skill to... ... middle of paper ... .... There so many types of Windows server operating systems. So at this stage, the administrator has to determine the best Window Server, which fits the workload consideration plan. The administrator has also to determine the best management tool available to hold and to fit server consolidation plans of a given organization. This is the lot where the Hyper-V manager comes in to consideration because information technology supports the installation, deployment and management of virtual servers After the best management tool has been identified, information technology has to be installed.
Any questions that do arise, the company would have to show the policies are protecti... ... middle of paper ... ... the company or organization's information. The security roles of employees within the company and organization are responsible for the important information. Role-back Access Control will allow the company and organization to keep track of the users. Works Cited Conklin, W.A., White, G., & Williams, D. (2012). Principles of Computer Security: CompTIA Security+™ and Beyond (Exam SY0-301) (3rd ed.).