Discuss about the Organization Requires Security for Infrastructure.
A high or low-level organization requires security for its infrastructure for proper and effective working. Nowadays most of the companies are working on Internet-based technologies or in cloud-based technologies so security became an essential thing. Information Technology Infrastructure and its safety are also significant in a business so that we can defeat and postpone any kind of risk from internal or external. A well designed and recognized security for an association ensures business permanence and proactively limiting the shock of the security breach. It is essential for the security of an organization (Partida, 2010). As we all know if a company is operating in something where the consumer’s information’s are stored and transferring around in the virtual world. Then securities of that information’s from threats are necessary to the business growth and security. Security of the consumers or clients information’s is important for the business growth. The assignment is based on taking an organization from the real or virtual world and doing a security assessment of that organization. It also contains a WBS diagram which will show the timeline for the submission of the works which is assigned to the whole project. The WBS diagram is used to show the timeline required for different research papers. The GANTT and PERT chart will additionally describe the overall project.
The Organization which I have chosen for the security is an Australia-based e-commerce company Booktopia. Booktopia is an E-commerce company which is mainly focused on the online bookselling. Recently the company has completed its 11th anniversary and celebrated it largely. The CEO of the company Mr. Tony Nash who had launched this company from his home at a budget of $10/day has achieved a big goal by creating this company a $40 million venture (Morris, 2015). The company serves a number of consumers and rapidly growing its customer base in Australia. The aim of the paper is to analyze the security establishment of the company as the company works and establishments required high-tech security. Information’s of the customers needed to be stored and maintained carefully in the database of the organization. The security establishment of the Booktopia Company should be as per the condition so that it can survive any type of safety break over the organization. The company must have to secure the database and the systems which are involved with the all over the operation. I will have checked the security establishment of the company for the measurement of the security preparation and what company is doing to prevent any kind of security breach from inside or outside. The Booktopia employed a number of employees who are responsible for all of the working facilities and the security measures. Training of the employees is provided by the company authority for the smooth operation of the company works. The security training of the company is provided by the company management to the employees so that they can understand the kind of threat they may face in the future. According to the Verizon report on online data breach, maximum number of security breach happens due to the human error in the operation (Howarth, 2014). This can be minimized by the company by providing proper training to the employees. The assignments will overview the security check of the works and its services.
The company Booktopia is involved in the E-commerce business in Australia, the headquarter of the company is at Lidcombe, New South Wales. The company is providing eBooks, DVD, stationary, magazines online (Booktopia Website, 2016). The company has started to operate on 4th February 2004 on the same day as Facebook Inc. The company has established a well-planned IT infrastructure for the whole operation and for the communication with the employees and with the customers. The company has a website through which the customers can order their books online and they also can choose different products. The company also uses cloud-based storage service for the storage of the information’s related with the customers and with the employees and clients. The cloud-based storage service is becoming very popular among the companies for the storage of the information’s related to the works and customers of the organization. The information’s must be kept secure from any kind of threat so the Booktopia has to create and well-planned security corridor for the security (Vellani, 2006). The company has a well-planned delivery system to the customers and to the client companies.
The Clients of the Booktopia is mainly the general public readers. Apart from the general readers and consumers company also deal with some entertainment companies for the sale of the DVDs and Magazines. Many different organizations also use the online platform of the company for the marketing and sales of the products to the consumer base of the company. The E-commerce companies have to stock up a lot of data and information for that condition they use cloud-based storage space. It is considered as safe and secure for the operation data storage, the company also need to store the information’s related to the client companies.
There are different E-commerce companies which are working in the Australian market such as Temple and Webster, Kogan, The Iconic, Catch of the Day. These companies are working in the E-commerce section and expanding its arms in different sectors too. Apart from the online retailer’s companies, the previously existence of different shops and stores of the magazines and the Game DVD’s can be considered as one of the competitors which are affecting the company. Many different MNC’s are coming into the market for the operation in this sector and they are also adding different categories for the sales. The increasing demand of the E-books and Audio Books has made it compulsory for the e-commerce companies to add into the options they are providing to the customers. This approach by the companies is increasing the competition for them in the market (Smart Company, 2015).
The major process in this sector is the building a website where the consumers can order the books and other stuff online. The company employees then verify the4 orders and update the database with the order and with the address of the customer. The whole process is done on the company server so that that each section of the company can have access to the information’s provided by the customer. The delivery department then picks up the product and delivers it to the customers under a set deadline. The information of the customer and each update will then moved into the database of the company, As the company is using cloud storage so the information’s will be stored in the cloud storage. Providing the cloud storage service to the client companies and securing all the information’s from any kind of threats (Wheeler, 2011).
The company is owned by three first generation Entrepreneurs. Tony Nash, Simon Nash, Steve Traurig. These three peoples have founded the company in the year 2004 in Sydney. As at the4 starting there was a struggle with the operation and the delivery as well as in the marketing so they have set up a budge4t of $10/day for the overall operation. In the present the company is a $40 million company. They have significantly increased the company revenue and operation capabilities so far. In August 2015 they have bought Angus & Robertson Bookworld business in the aim to increase the market share and the revenue of the company. Overall the company has about 100+ employees and well-settled Infrastructure (Morris, 2015). The employees are responsible for the operation and maintenance of the IT as well as the Infrastructure for the efficient operation.
There are different issues which are needed to be addressed. These are
1. Database Security
2. IT Infrastructure security
Network Security
1. Proper Delivery system
2. Maintenance of the Infrastructure.
3. Competitions in the sector
4. Online security hurdles
WBS: The WBS structure is used to define the timeline for the successful submission of all the assessments. I have to submit three different research papers for the project completion. The research papers will consist all the information related to the security establishment of the company, the security measures taken by the company as well as the security measurement. The research papers will also consist of the assistance for the development of the security program as well as the security matrix improvement for the organization. The WBS will describe the timeline for the whole work and the date of submission for the work. The data of the submission of the research paper one is 22 August and for the research paper, 2 is 12 September and research paper 3 is 10 October. The timeline will consist of different small period works which are also described in the work breakdown structure.
Network Diagram- Network diagram will consist of a network blueprint for the whole works which are needed for the4 project completion and research.
GANTT Chart- GANTT chart will consist of the timeline for the different works. It will also consist the start date and the end date of the operation.
WBS structure- The work breakdown structure will show the tabular form of the whole project work and the submission date for the research paper 1, 2, 3.
Pert diagram:
This is the shortest path for the completion of the project within the timeline. I have chosen the PERT diagram to show the project. The PERT chart is a systematic Graphical presentation of the project schedule so it is more understandable to the viewer and team members. The PERT chart helps the project team to visualize and recognize the steps which are needed to be done for the proper completion of the project. The whole project and the schedule can be calculated with the help of PERT chart which helps the team who is involved the project. There could be two kinds of works some are dependable and some are independent of each other so visualizing this scenario would be helpful for the project team.(Laughlin, 2016). I have created PERT chart and described the shortest path which will be needed to complete the project. The path consists of all the required steps and the timeline as well as the steps which are required.
Conclusion:
The Essay is based on describing a company for which I am going to conduct the Security assessment. The company which I have chosen for the security assessment is the Booktopia which is e-commerce Company from Australia. As E-commerce is solely based on Internet technology and they are extensively using the Cloud storage for which they have to select high-tech security. I have also described the company profile, the services in which they are involved and clients with whom they are involved. The company has an extensive customer base and rapidly increasing the marketing share in the country’s online marketplace. I have also created a Work breakdown Structure for the system and described all the required aspects of the project in it. As per the Instruction, I have also attached a PERT chart and NETWORK diagram for the project. The network Diagram described the relationship between different works related to the project along with the timeline involved in it. The PERT chart is also attached which is basically a Graphical representation of the project schedule. There are three different research papers which are needed to submit on different deadline along with the security assessment report.
Reference:
Partida, A. and Andina, D. (2010) IT security management: IT securities – setting up an IT security function. Dordrecht: Springer.
Sennewald.C.A,(2015). Effective Security Management. Butterworth-Heinemann.
Vellani.K,(2006). Strategic Security Management: A Risk Assessment Guide for Decision Makers. Butterworth-Heinemann.
Howarth, .F, (2014), The Role of Human Error in Successful Security Attacks, Retrieved on July 31, 2016, from https://securityintelligence.com/the-role-of-human-error-in-successful-security-attacks/
Morris, .C, (2014), Australia’s Amazon: How Booktopia grew from a $10 budget to a $40 million book business, retrieved on July 31 from https://www.dailytelegraph.com.au/newslocal/parramatta/australias-amazon-how-booktopia-grew-from-a-10-budget-to-a-40-million-book-business/news-story/5026aa07a832f008bcc4327b2622d6f1
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download