STP Limited is an Australian manufacturer of cabinets and these cabinets are made in a factory that is owned by the company. The headquarters of the company are located in Wollongong and there are three other office locations as well in Sydney, Bathurst and Lithgow. The most recent out of all is the office that is located in Sydney and there are computerized mechanisms in place in this office for the manufacturing of cupboard and drawer fronts. Some clients have the capability to install these fronts on their own while other needs them to be installed by the company representatives. It is being considered to make use of vans for the purpose of installation which may be owned by the company or another franchise. With the current office arrangements and infrastructure, the recent expansion of the office and business activities can no longer be managed correctly. There are many changes that are being done in the organization in terms of the implementation of the website, updates in the information system, new customer management and accounting system along with improved stock control system. There are distributed databases that are used in STP Limited. The organization is now looking to work upon the improvement in its networking and communication channel.
The company is working on the initiatives to enhance its network architecture and the communication framework that is followed. There are a number of tools and new techniques that are already in place in terms of the networking architecture of the company. There are a lot many tools, gadgets and equipment that are being used and are present in the company in all of its office locations. All the four office locations are connected and equipped with the Internet through the ADSL connection. The company has also implemented the Bring Your Own Devices (BYOD) strategy and scheme in the organization which provides the permission to the employees to carry and use their personally owned devices for the fulfillment and execution of the organizational activities.
Communication is the key to the success of the projects and the organizations. It is necessary for STP Limited to ensure that the internal and external stakeholders associated with the company are offered updated details and enhanced information sharing at any hour of the day. With the advancements that will be done in regards to the communication framework, there will be a number of advantages that will be offered to the company. These benefits will be in the form of enhanced information sharing and streamlining of the process of information management. The customers always look for the organizations that may provide them with the details on services being provided at a non-stop basis and the ones that are readily available for the resolution of the queries.
The scope of the project that will be implemented for STP Limited will include the activities and phases that will assist the deployment of the advanced networking and communication channel.
The requirements that are associated with the networks and communication systems shall be analyzed so that the upgrades and modifications that need to be done are highlighted. The planning shall then be carried out in terms of the networking design and architecture and the changes to be developed. The network integration and compatibility checks, implementation and testing will come under the scope of the project.
Parameter/Attribute |
Details & Description |
Strategies and Decisions |
· STP Limited is a company that is making a lot many changes in its current architecture and infrastructure so that the quality of the services that are provided to the customers improve. The primary goal of the company is to improve the customer services and the business operations that are carried out in the organization. The project will serve the same purpose as it will ensure that the network architecture is enhanced which will lead to the improvement of the communication mechanisms and networking mediums. · Many of the activities that will be performed under the domain and scope of the project will make sure that the organizational objectives and goals are met without disturbing the productivity and continuity of the business operations. · There are security protocols and mechanisms that are involved in the project which will make sure that all of the information sets are protected and the privacy is maintained. |
Technical Potential of the Solution |
· There are many networking protocols, devices, gadgets and equipment that will be launched to be used in the four office locations of STP Limited. These components will be based on the latest security and technical aspects and there will not be any issues around compatibility of these components with other tools. · The project will be feasible from the technical point of view as it would be compatible with the rest of the tools and there will be enhanced integration that will be involved. |
Competitive Gains |
· The organizations and firms that are ahead of their competitors in terms of the use of technology gain an edge in the market and among the customers. The same will happen in the case of STP Limited with the use and implementation of latest networking practices. · The quality and the performance of the business operations and activities will improve. This will lead to the better operational continuity along with the better satisfaction of the customers. |
Service Level |
· The management resources and the senior leadership that is associated with STP Limited will decide upon the approach and methodology that shall be used in the project. It will ensure that the project goals and the service excellence are achieved. · The resources that will be used in the project will be allocated as per their skills and knowledge. An analysis of their skill sets will be done which would make sure that the project tasks are successfully completed. |
There are many risks and security attacks that may take place in association with the networks. This has led to the development of a discipline called Network Security. This has become one of the integral parts of the organizations so that the security of the organizational networks can be ensured. With the use of different types of networks along with the increase in the number of networks involved, the likelihood of the network attacks has also increased.
There are many activities that are carried out in STP Limited. This has led to the setting up of different teams and departments. There is also the presence of local IT support and services department for the reporting and resolution of the IT related incidents. The management must analyze and make sure that there are enough resources present in this department for the easy and smooth execution of the services. There are technologies that have been developed that shall be used for remotely managing the support and maintenance tasks. Enhanced form of control and monitoring shall be carried out by network administrators and managers along with the security team to keep a track of all the technical and operational issues for their avoidance and prevention.
With the increase in the frequency of the security risks and attacks, there are many different protocols that have been developed and implemented in the company. The use of web and cloud computing is also necessary in the current times. To avoid the associated risks, the company makes use of secure HTTP, Server Socket Layer (SSL) and many other protocols for the security of the network and transport layers.
The offices of STP Limited are located and have been set up in four different locations. It is important to ensure that the security of the offices and the information sets that are associated with each office are maintained and protected. Due to this reason, an integrated networking scheme is required to be implemented so that the network security and the tracking of network activities become easier and easy to implement.
Secure routing is also one of the prime necessities of the networks and networking operations that are carried out in the organization. With the aid of this practice, the data packets that will be transferred from one location to the other will be done securely and with enhanced for of protection as well. This will also eliminate nay necessity to install the security tools and gadgets separately for all the four locations.
The types of the network security attacks are not constant. There are newer forms of network security attacks and risks that are being created and launched by the attackers. Also, there are many changes that are being done in the form of the existing security attacks. Due to the changing form of the threats that are involved, it is very essential to ensure that the controls that are implemented are not static. Currently, the controls that are being used are signature based in nature. These controls do not have the potential to manage and track the threats that are not known in advance.
It is, therefore, required that the controls are developed and implemented in such a manner that they are reactive in nature. These controls shall have the ability to handle the dynamic nature of the threats and shall be ad-hoc so that the changes in terms of the type of the threats are handled carefully and correctly.
STP Limited has its branch office that is located in Wollongong. There are many security controls and threats that are associated with the branch office and there are security controls that shall be implemented in the branch office as listed below.
Mobile devices are being increasingly used in the business units for the execution and accomplishment of the business tasks and activities. The use of these devices cannot be ruled out any longer since they serve many of the business necessities and operations. However, with the use of the mobile devices, there are many security risks and attacks that take place in terms of the loss of device, breaching of information that is present in these devices, unauthorized access to the device, denial of service and malware attacks and many more.
It is necessary to follow certain steps and procedures for maintaining and assuring the safety of the mobile devices and platforms.
There are many hardware and tools that will be required for the execution of the services and networking operations in association with STP Limited.
The use of mobile and computing devices cannot be ruled out any longer since they serve many of the business necessities and operations. However, with the use of the mobile devices, there are many security risks and attacks that take place in terms of the loss of device, breaching of information that is present in these devices, unauthorized access to the device, denial of service and malware attacks and many more. There are many risks and security attacks that may take place in association with the networks. This has led to the development of a discipline called Network Security. This has become one of the integral parts of the organizations so that the security of the organizational networks can be ensured. With the use of different types of networks along with the increase in the number of networks involved, the likelihood of the network attacks has also increased.
All of these risks can have a negative impact on the continuity of the business tasks and operations. There are measures that need to be taken to make sure that the risks are avoided and the continuity of the business activities are maintained.
There are many components and entities that are involved with STP Limited, such as mobile device, technical systems and tools, network connections, databases and many more. The use of the devices cannot be ruled out any longer since they serve many of the business necessities and operations. However, with the use of the mobile devices, there are many security risks and attacks that take place in terms of the loss of device, breaching of information that is present in these devices, unauthorized access to the device, denial of service and malware attacks and many more. There are many risks and security attacks that may take place in association with the networks. This has led to the development of a discipline called Network Security. This has become one of the integral parts of the organizations so that the security of the organizational networks can be ensured. With the use of different types of networks along with the increase in the number of networks involved, the likelihood of the network attacks has also increased.
These risks need to be managed by a suitable strategy.
All the security risks and other forms of risks associated with STP Limited shall be analyzed by making use of the data sources and the information gathered from these sources. The identified risks shall be listed down.
Every risk will have a resource that will be have the prime responsibility for the handling of the risk. The list of the identified risks shall be mapped with these stakeholders and responsible resources.
The following risk register has been prepared after analyzing the risks that may take place in STP Limited in association with the project and the suitable response that may be provided. There are other factors such as description, probability and impact that are also included in the table.
Risk |
Description |
Probability |
Impact |
Response Strategy |
Technical Faults |
There may be failure of the network ing equipment and gadgets or the other technical tools being used in the company. |
The probability with this risk in association with STP Limited is medium. |
The impact of this risk in association with STP Limited will be medium. |
The risk needs to be handled and managed by using and implementing a suitable risk response strategy. The strategy and method that shall be applied in case of this risk shall be risk transfer. |
Compatibility Issues |
There may be issues with the compatibility of the technical or networking tools with each other or the other components used in the company. |
The probability with this risk in association with STP Limited is low. |
The impact of this risk in association with STP Limited will be high. |
The risk needs to be handled and managed by using and implementing a suitable risk response strategy. The strategy and method that shall be applied in case of this risk shall be risk avoidance. |
Operational Errors |
The resources may bring up the operational mistakes and errors that can have a significant impact. |
The probability with this risk in association with STP Limited is high. |
The impact of this risk in association with STP Limited will be medium. |
The risk needs to be handled and managed by using and implementing a suitable risk response strategy. The strategy and method that shall be applied in case of this risk shall be risk mitigation. |
Estimation Risks |
There may be risks such as schedule overrun or overrun of the budget that may come up due to incorrect estimations. |
The probability with this risk in association with STP Limited is medium. |
The impact of this risk in association with STP Limited will be high. |
The risk needs to be handled and managed by using and implementing a suitable risk response strategy. The strategy and method that shall be applied in case of this risk shall be risk avoidance. |
Quality Risks |
The quality parameters and standards may not be adhered by the resources. |
The probability with this risk in association with STP Limited is low. |
The impact of this risk in association with STP Limited will be high. |
The risk needs to be handled and managed by using and implementing a suitable risk response strategy. The strategy and method that shall be applied in case of this risk shall be risk avoidance. |
Security Attacks on the information sets |
There may be risks and attacks that may be attempted by the malevolent entities on the information sets and data sets. |
The probability with this risk in association with STP Limited is high. |
The impact of this risk in association with STP Limited will be high. |
The risk needs to be handled and managed by using and implementing a suitable risk response strategy. The strategy and method that shall be applied in case of this risk shall be risk avoidance and mitigation. |
Network security attacks |
There may be risks and attacks that may be attempted by the malevolent entities on the networks and connections. |
The probability with this risk in association with STP Limited is high. |
The impact of this risk in association with STP Limited will be high. |
The risk needs to be handled and managed by using and implementing a suitable risk response strategy. The strategy and method that shall be applied in case of this risk shall be risk avoidance and mitigation. |
Ethical & Legal Risks |
The ethical parameters and standards may not be adhered by the resources. These may also lead to the legal punishments and obligations. |
The probability with this risk in association with STP Limited is low. |
The impact of this risk in association with STP Limited will be high. |
The risk needs to be handled and managed by using and implementing a suitable risk response strategy. The strategy and method that shall be applied in case of this risk shall be risk avoidance. |
Every risk has been mapped with a suitable strategy that may be applied in case of the risk as per the nature and type of the risk. The table shall show the risk management and security teams with this information so that risks can be handled and managed correctly.
There are various treatment methods and mechanisms that may be followed in the case of the risks that identified and assessed. Some of these methods include risk transfer, risk avoidance, risk acceptance and mitigation of the risks. These treatment methods shall be identified and applied to every risk.
The treatment methods shall be applied and the status of the treatment shall be tracked and monitored by the security managers and the senior leadership of STP Limited. The progress shall be reviewed and there shall be use of review tools and controls for this purpose.
Conclusions
STP Limited is an Australian manufacturer of cabinets and these cabinets are made in a factory that is owned by the company. The headquarters of the company are located in Wollongong and there are three other office locations as well in Sydney, Bathurst and Lithgow. With the current office arrangements and infrastructure, the recent expansion of the office and business activities can no longer be managed correctly. There are many changes that are being done in the organization in terms of the implementation of the website, updates in the information system, new customer management and accounting system along with improved stock control system. The company is working on the initiatives to enhance its network architecture and the communication framework that is followed. There are a number of tools and new techniques that are already in place in terms of the networking architecture of the company. There are a lot many tools, gadgets and equipment that are being used and are present in the company in all of its office locations. Communication is the key to the success of the projects and the organizations. It is necessary for STP Limited to ensure that the internal and external stakeholders associated with the company are offered updated details and enhanced information sharing at any hour of the day. The requirements that are associated with the networks and communication systems shall be analyzed so that the upgrades and modifications that need to be done are highlighted. The planning shall then be carried out in terms of the networking design and architecture and the changes to be developed. The network integration and compatibility checks, implementation and testing will come under the scope of the project. STP Limited has its branch office that is located in Wollongong. There are many security controls and threats that are associated with the branch office and there are security controls that shall be implemented in the branch office and other three offices as well.
Network Security
Infrastructure integration:
Company’s Mobile Population
WLAN Evaluation
References
Alabady, S, “Design and Implementation of a Network Security Model for Cooperative Network..”. in , , 2009, <https://www.iajet.org/iajet_files/vol.1/no.2/Design%20and%20Implementation%20of%20a%20Network%20Security%20Model%20for%20Cooperative%20Network.pdf> [accessed 11 October 2017].
Berg, H, “Risk Management: Procedures, Methods and Experiences.”. in , , 2010, <https://ww.gnedenko-forum.org/Journal/2010/022010/RTA_2_2010-09.pdf> [accessed 11 October 2017].
Canavan, J, “Fundamentals of Network Security.”. in , , 2001, <https://whc.es/Network/Fundamentals%20of%20Network%20Security.pdf.1.pdf> [accessed 11 October 2017].
Chi, T, “Alignment between business environment characteristics, competitive priorities, supply chain structures, and firm business performance.”. in Strategic Direction, 26, 2010.
Cisco, “Wireless and Network Security Integration Solution Overview.”. in , , 2008, <https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mobility/secwlandg20/sec_wireless_overview.pdf> [accessed 11 October 2017].
Crane, L, “Introduction to Risk Management.”. in , , 2013, <https://extensionrme.org/pubs/IntroductionToRiskManagement.pdf> [accessed 11 October 2017].
Dcu, “Introduction to Risk Management.”. in , , 2015, <https://www.dcu.ie/sites/default/files/ocoo/pdfs/Risk%20Mgt%20Training%20Slides.pdf> [accessed 11 October 2017].
Debono, R, “Project Risk Management.”. in , , 2016, <https://www.isaca.org/chapters11/Malta/Documents/Events/210416%20-%20Mark_Debono%20-%20Understanding_Risk_in_the_Field_of_Project_Management.pdf> [accessed 11 October 2017].
Gomes, C, & M Yasin, “Toward promoting effective strategic performance: the relevance of the alignment of performance measurement and competitive strategic choices.”. in International Journal of Business Excellence, 12, 2017, 329.
Joshi, M, & R Karkade, “Network Security with Cryptography.”. in , , 2015, <https://www.ijcsmc.com/docs/papers/January2015/V4I1201544.pdf> [accessed 11 October 2017].
Pareek, R, “Network Security: An Approach towards Secure Computing.”. in , , 2011, <https://www.rroij.com/open-access/network-security-an-approach-towards-secure-computing-160-163.pdf> [accessed 11 October 2017].
Sampangi, R, “A Security Suite for Wireless Body Area Networks.”. in International Journal of Network Security & Its Applications, 4, 2012, 97-116.
Soriano, M, “Information and Network Security.”. in , , 2011, <https://improvet.cvut.cz/project/download/C2EN/Information_and_network_security.pdf> [accessed 11 October 2017].
Souppaya, M, “Guidelines for Managing the Security of Mobile Devices in the Enterprise.”. in , , 2013, <https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r1.pdf> [accessed 11 October 2017].
Strebe, M, “Network Security Foundations.”. in , , 2004, <https://imcs.dvfu.ru/lib.int/docs/Networks/Security/Network%20Security%20Foundations.pdf> [accessed 11 October 2017].
Sujithra, M, & G Padmavathi, “Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism.”. in , , 2012, <https://dl.icdst.org/pdfs/files/35dc646a4630971fd27c6b2d32661555.pdf> [accessed 11 October 2017].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download