Create a network management plan and a security plan

Assignment Help Computer Network Security
Reference no: EM131307140

Assignment case study: HandMade Furniture Ltd.

This case study provides background information for both assignment 1 and assignment 2.

As a network consultant, your initial examination of the company has discovered the following facts:

1. It is a single site company with a factory and office on site.

a. There are 80 employees in total, 60 in the factory and 20 in the office.

b. Each office worker has their own PC. There is a mixture of Windows 7, Windows 8 and Windows 10 computers installed together with various versions of Microsoft Office.

c. There are 8 PCs in the factory, all running Windows 7 and Microsoft Office 2010.

d. There is no central subscription to anti-virus software. Staff are left to do this themselves.

2. The network is completely wired and they have not yet started to explore the use of WiFi. If staff brings their own devices to work, they need to make their own provision for Internet access (3G/ 4G etc.)

3. The network runs on a single Windows Server 2012 server. There is an additional NAS (Network Attached Storage) storage device that will store up 10TB of data. There is no formal backup plan; again staff (and individual teams) are expected to manage their own data. Some do this better than others. For example, the design team have their own NAS storage and additionally copy designs to backup DVD on a weekly basis.

4. Internet access is provided through an ADSL account with a local Internet provider. This gives a maximum of 10 Mbit/s of bandwidth. They have found that this is not sufficient for their needs.

a. The company does not have a Web site.

b. There is a single email address for the company that the MD (Managing Director) and her PA (Personal Assistant) have access to.

c. Other staff have set up 'unofficial' company emails for their requirements, for example, the finance team have a shared email address with a Gmail account that they use for ordering.

5. No single person has responsibility to managing the network. A previous office manager (who has now left) had some IT experience and supported the network as part of his job. There have been some serious incidents recently, most notably a serious virus infection that was dealt with by bringing in a local IT technician to clean a number of PCs.

6. The arrangements for printing are very mixed:

a. There is a single inkjet printer in the factory shared between the factory PCs. This printer is networked.

b. In the office, there is a high volume laser printer connected directly to one of the admin support team's PCs. This is connected via Windows printer sharing to the other PCs in the admin team but no-one else has access (in the past, if anyone else needed a large number of documents printing they had to email it to a member of the support team).

c. The remainder of the office use 22 inkjet printers, from a variety of manufacturers. Some of these are connected to individual PCs and some are shared between workgroups.

Assignment - Your report should be 2,500 words in total (+ or - 10%), excluding contents and references.

Title: Devising a Network Management Plan and Security Plan for HandMade Furniture Ltd.

Assignment -

This assignment requires you to create a network management plan and a security plan for HandMade Furniture Ltd. that will include both local and cloud-based services.

Additional Information

  • A decision has been made to upgrade the company Internet connection. Your advice will be appreciated on how this should be done.
  • The company have decided to upgrade all PCs to the latest versions of Microsoft Office and Windows.
  • Email addresses will be provided for all staff via a cloud provider (such as Google Apps for Business or Microsoft Office 365)
  • WiFi will be added to the network and team leaders in the factory will be issued with a WiFi enabled laptop.
  • Staff will be able to bring their own devices to work and connect to the work WiFi network. Advice on how to do this will be appreciated.
  • The company are considering moving away from individual printers to networked 'pull' printing. They would appreciate your advice on the implications of this.
  • The company has decided to move their accounting and stock control systems to a cloud based service, managed and maintained by another company. The provider has a good international reputation, however the board would appreciate you advice on this.
  • Again, the managing director has asked you to produce a briefing paper for the board that addresses the following issues:

Requirements

The purpose of this paper is to:

  • Produce a network management plan for the company based on your advice in the earlier paper.
  • Produce and justify a suitable network security plan for the organization. This should address threats to network security, indicate how these can be mitigated and what steps can be taken to recover from serious incidents.
  • Discuss a range of different approaches to IT support,

Your report should include the following sections:

  • Introduction and terms of reference
  • A detailed network management plan
  • A detailed network security plan, with costing implications
  • Conclusions, recommendations and further advice

This should be written as a fully referenced formal report.

Reference no: EM131307140

Questions Cloud

Identify the stakeholders affected by the externalities : ACC518 - Current Developments in Accounting Thought - Additional Assignment Explains the decision made by the regulators in terms of public interest theory - Explain the decision made by the regulator in terms of the economic interest group theory of..
Find the break even quantity and break even revenue : Find the break-even quantity and break-even revenue for the firm in Exercise 4 if management has set up $55,000 as a target profit that must be obtained.
How can we obtain the bible knowledge : How can we obtain the Bible knowledge? What are the characteristics of Jesus Christ? (5 of them) Please explain it with the Bible verses. What kinds of love are there? What is the highest kind of love? How can display that love?
What is the safety factor with respect to failure : Assuming the bit is a uniform cylinder with 4 mm diameter, what is the safety factor with respect to failure during this operation?
Create a network management plan and a security plan : This assignment requires you to create a network management plan and a security plan for HandMade Furniture Ltd. that will include both local and cloud-based services
Why can not people have everything they want : Why can't people have everything they want? How can you teach "scarcity" in concrete and relevant ways to Pre K or Kinder students?
Calculate the shops contribution margin and revenue : Calculate the shop's contribution margin, Break-even quantity, Break-even revenue and Break-even quantity and revenue if he wants to make $5,000 in profit.
Why the in-plane shear stress is not maximum shear stress : Explain why the in-plane (in the plane of the cylinder wall) shear stress is not the maximum shear stress?
What does the bible say about loving others as a christian : Is God faithful? What does it mean? What does the Bible say about loving others as a Christian? What was the message of the movie "Passion of Christ"?

Reviews

len1307140

12/10/2016 2:00:22 AM

The purpose of this paper is to; Produce a network management plan for the company based on your advice in the earlier paper. Produce and justify a suitable network security plan for the organization. This should address threats to network security, indicate how these can be mitigated and what steps can be taken to recover from serious incidents. This should be written as a fully referenced formal report.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd