IT Security Plan and Implementation Business Plan by Nicky

A proposal for an IT security plan and its implementation for a small business network.
# 150871 | 5,466 words | 14 sources | APA | 2012 | US
Published on Apr 29, 2012 in Computer and Technology (Networks) , Business (General)


$19.95 Buy and instantly download this paper now

Description:

The paper defines an IT security plan for a small business network of thirty computers and three servers that are running Web-based applications, an e-mail system and a database application server. The proposal relies on the Open Systems Interconnect (OSI) model defined by the International Organization for Standardization (ISO). The paper applies a different company's security plan to this case and provides the rationale for this suggested security upgrade. The paper also identifies the key goals and objectives for the plan as well as the project deliverables that will be provided to the customer. The paper includes a plan and timeline for this project as well as a figure and a table.

Outline:
Part 1: IT Security Proposal Summary
Part 2: Review of Other Security Implementations
Part 3: Rationale and Systems Analysis for IT Security Upgrade
Part 4: Goals and Objectives for Upgrade IT Security
Part 5: Project Deliverables
Part 6: Project Plan and Timelines

From the Paper:

"The need for higher levels of security across the corporations' network is accentuated by the fact that the majority of PCs in use today are laptops that rely on WiFi connections throughout the company. The three servers running the website, e-mail systems and database application servers will also need to have specific analysis of their existing security levels based on the options chosen during installation. Operating systems-level security also needs to be first evaluated to see options were configured for firewalls as well. All of these factors need to be taken into account for an initial security audit to be put into place which forms the baseline of security performance evaluation and measurement (Westcott, 2007). Second, the specific connection points throughout the network also need to be evaluated for their levels of existing security as well, with the WiFi network audited and tested (Loo, 2008). Third, the Virtual Private Networks (VPNS) and the selection of security protocols needs to be audited (Westcott, 2007) to evaluate the performance of IPSec versus SSL protocols on overall network performance (Rowan, 2007). Many smaller corporations vacillate between IPSec and SSL as the corporate standard for wireless connections, defining the advantages and disadvantages as the table below has captured."

Sample of Sources Used:

  • Ciampa, Mark (2005). Security+ Guide to Network Security Fundamentals. 2nd Edition. Massachusetts: Thomson Course Technology, 2005
  • Cisco Tutorial (2007). Basics of the OSI Model and associated documents. Accessed from the Internet on October 6, 2009 from location: http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/introint.htm
  • Frankland, J. (2008). IT security metrics: implementation and standards compliance. Network Security, 2008(6), 6-9.
  • Atul Gupta & Rex Hammond. (2005). Information systems security issues and decisions for small businesses: An empirical examination. Information Management & Computer Security, 13(4), 297-310
  • Hickman, Kipp (2007). The SSL Protocol. Netscape Communications Corp. 29 Nov. 1994. 23 Mar. 2007. Accessed from the Internet on October 6, 2009 from location: http://www.llnl.gov/atp/papers/HRM/references/ssl.html>.

Cite this Business Plan:

APA Format

IT Security Plan and Implementation (2012, April 29) Retrieved June 01, 2023, from https://www.academon.com/business-plan/it-security-plan-and-implementation-150871/

MLA Format

"IT Security Plan and Implementation" 29 April 2012. Web. 01 June. 2023. <https://www.academon.com/business-plan/it-security-plan-and-implementation-150871/>

Comments