Executive Summary
Problem/Opportunity
XYZ
Enterprises has a very low and very vulnerable network perimeter. The network
has put the company at risks of attack by the unauthorized intruders. The
company would like to implement a better firewall system than the previous
system that could easily be penetrated. Additionally, the company would like to
make the files accessible to everyone within the company but should remain
certain levels and within the company’s economic standards. Besides the
problem, there is also an opportunity that the company would like to seize. The
company would like to expand its operations thereby including manufacturing and
distribution of fortune cookies.
Recommended
Solution
XYZ
Enterprises is planning to solve the current problem through implementation of
an effective network perimeter to enhance the company’s security posture as
well as the visibility. The proposed network perimeter is expected to build an
accountable and comprehensive picture of communications that allows the company
to manage the flow of the traffic easily, effectively, and securely. The
proposal is meant to replace the current hodgepodge of the point products that
has been keeping essential threat intelligence in silos.
Alternative
Solutions
The alternative solution to the current
network problem at XYZ Enterprises is using open source tools such as Palo Alto
Networks, which is a next-generation firewall. However, the company will have
to strike a balance between blocking all users’ personal applications and
allowing the user to use all of them. The alternative solutions will begin with
having knowledge of the various applications and respective users. The
information will allow the company to create effective policies that will
enable to control the firewall. The policies will extend beyond the traditional
approach that either allows or denies services and applications. However, the
solution will give the company the ability to enable some applications securely
without having to degrade the performance of the firewall (Harrison & Lock,
2004).
Feasibility
Studies
Before the implementation of the network
perimeter, the company has done a feasibility study to evaluate the viability
of the project. The list below provides the principal considerations for the
project (Stevens & Sherwood, 1982).
·
Cost
Justification: The Company has evaluated the cost
advantage in the implementation of the network security
·
Minimize
disruptions during implementations: The network
implementation will be conducted in bits to avoid disruptions for the daily use
of the network.
·
Security:
The security considerations have been established based on the security
guidelines and requirements of the network.
·
Scalability:
The choice of the hardware and design are scalable which will also allow
possible future expansion of the network within the company.
Significant
Risks
·
There is the likelihood that the
implementation of the perimeter will not be completed on time.
·
Weak participation of users in the
project team
·
The project might suffer from unclear
change management procedures that may delay project completion
·
There is likelihood of lack of
definition of change management procedures in the project that may affect the
project negatively
·
Availability of the project team where
they may go missing thereby affecting the negatively regarding completion
·
The project may go beyond the estimated
schedule that would affect the organization negatively regarding inconveniences
Current Environment of the
Organization
Mission
The
company’s mission is to enable system and software developers to advance world
understanding, peace, and goodwill through the development of systems that
support humanity and alleviates poverty.
Vision
XYZ
Enterprises vision is to be the leading company that develops systems and
software with the ability to support humanity and alleviating poverty in the
United States and the world.
Description
of the Current Organization
XYZ
Enterprises is a new company that aims at providing a high quality system and
software and IT services to its customers. It has begun operations recently and
is scheduled to take off well within the next two months. The company is a
partnership that is owned and operated by Norman Smith and Robert Johnson. The
company targets small and medium sized companies and government agencies within
the northern side of Illinois including Chicago and the surrounding areas. The
company will seek major software and system development contracts with medium
sized companies. The company sets its sites as the go-to company for the
establishment for other software and system development companies that do not
have this capability.
Description
of the Current Business Environment
The
company has not been in existence for long. Therefore, it is still in the
process of familiarizing itself with some business environments. However, the
company has gathered enough customers during the time it has been in the
existence. Government policies are favorable, and they will enable growth
within the next decades. Competition is stiff which requires the company to
produce quality products to help add to the current customers. The political
atmosphere is also favorable which is expected to spur the growth of the
company within the next year. The company supports small and medium businesses
through the providence of quality system and software and IT services. The
company stands to gain from its location at the heart of Chicago shopping
district that provides accessible routes to the city’s business core.
Descriptions
of the Organization Technological Environment
The
company has embraced the recent and modern technology in the process of
conducting the business. It has continued to advertise its products and
services through the social media such as Facebook and Twitter among others.
The company also has the fastest technology in the region with the capability
of transmitting at a higher rate compared to others in the same category. It
has CCTV surveillance to maintain its security around the premises. The current
technological environment in the environment is expected to lead the company
into the next phase of growth.
Description of the Problem
Description
of the Recommended Solution
The
recommended solution removes the need for physical media of the traditional LAN
and replaces it with a modern technology such as radio waves. The freedom of
the physical media will also allow any user within the range to pick the
signal. It will also allow connections any point within the radius of the
network perimeter. It is significant compared to the current network. These
features will enable the company users to access files within the range without
the need to worry about security. It will also boost the productivity of the
employees which will lead to the growth of the business (Lester, 2007).
Scope
of the Project
The
current project is a recommendation to improve the security of XYX Enterprises
by implementing a perimeter around the network. The project will solve the
problem by implementing various security measures that are identified in the
perimeter. The project will entail improvement of the overall status of the
network, firewalls, UNIX Security, Intrusion Detection Systems (IDSs), server
security, Virtual Private Network (VPN), Intrusion Prevention Systems (IPSs)
among others. Additionally, the project will aim at evaluating how the above
components relate. The project also aims at assessing the effectiveness of
wireless connections, mobile systems, portable storage devices and other links
within the network. However, the project is not aiming at improving the speed
of the network or adding other components to the network (Moustafaev, 2014).
Assumptions
XYZ
Enterprises has a normal business environment. Therefore, the architecture of
its network and security will be developed through several meetings and
discussions. The meetings cannot be done actively thereby necessitating for the
following assumptions during the proposal of the project (Newel, 2005).
·
Software and systems are the main
products of the company and should be protected from exposure
·
The company has not established itself
in the best way and therefore, it will not need its security known to every
man.
·
All the remote access of the network
from the field through the VPN would be possible via HQ VPN
·
The project committee will not discuss
the application-level security beyond function provided by such security.
·
All the remote offices within the
company will not allow direct connectivity of the employee to the Internet.
·
Conduction of Electronic Data
Interchange (EDI) e-commerce over the Internet is prohibited.
Constraints
There are anticipations of various
constraints that may derail the implementation of the project. While some may
be beyond the capabilities and solutions of the company, some are not beyond
the reach of the company. The project committee has seen the following
constraints that may derail project implementation (Doraiswamy & Shiv,
2012).
·
There may be inadequate manpower within
the organization to enable timely completion of the project.
·
The users will require training at the
end of the project on various security components that will have been added to
the network
·
The management may not support the
project fully
·
Some of the network security components
required in the project may not be available in the local market.
·
The company may not be able to support
the demands of the new-look network security.
·
The funds the company is willing to set
aside for the completion of the project may not be enough.
Data Collection and Analysis
Methodology
One
The
company will employ interviews as the first methodology of data collection and
analysis. The project team chose the methodology because of the data collection
strategy, the type of variable, the accuracy required, knowledge and skills of
the enumerator, and the collection point. Interview comprises of filling with
forms that are completed during the interview between the interviewer and the
respondent. However, interview as a method of data collection is more expensive
than filling questionnaires. They are suitable for complex questions,
illiteracy or low levels of literacy of the respondent or inadequate
cooperation (Olsen, 2011).
The
interview was conducted by determining the information the project required.
The project team wanted to find out the vulnerabilities of the current network
and which improvements were required to better its functionalities. The next
step was determining the audience. The step was easy since the team would
interview the employees from different departments within the company.
Interviews were conducted according to the plan and the wish of the project
team. Determining the questions the respondents would answer was the hardest
thing.
The
results of the interviews were encouraging. Most of the respondents
participated fully. There were no major problems since the level of literacy
and cooperation was high and not what normal interviews in other places would
have turn out. Most of the respondents were convinced about the implementation
of the network perimeter within the company since they had experienced attacks
that emanated from unauthorized intrusions (Axinn & Pearce, 2006).
Methodology
Two
The company employed observations as the
second methodology of data collection and analysis. The project team would make
direct observations to the company network after which it would assess its
security status. The assessment would help the team come up with the most
suitable method that they would to implement perimeter which is a component of
security. The methodology was selected because it is the most effective and
cheap to collect and analyze data.
The
methodology has not a specific process that it should follow. It involves
making direct observations to a phenomenon the researcher wants to study.
Therefore, it would be the same for the company’s project team. They made
direct observations to the company’s network from which they assessed different
security requirements of the network. The outcome of the assessment of the
network was that the network required the addition of some components that
would improve its security and increase its productivity. The outcomes were
also impressive and were some of the reasons that would make the management
embrace the project (Weller & Romney, 1988).
SWOT Analysis
The
initials SWOT are an acronym for Strengths, Weaknesses, Opportunities, and
Threats. They are the basic components of SWOT analysis usually presented as a
matrix with four main parts where each part represents each component. XYZ
Enterprises has similar to other software development companies in that it has
its strengths, weaknesses, opportunities, and threats as presented below (Fine,
2009).
Strengths
·
Adoption of the most current and strong
technology
·
The company offers its products and IT
services at competitive prices
·
The company has a implemented an online
customer sales service with user-friendly services and an interface
·
Excellent customer relationship
management (CRM)
·
The company has a strong base of active
and competent system developers
·
The company has a stateside real-time
customer service that answers customers’ calls promptly
·
The company has excellent reference
customers who are happy without the products and services.
Weaknesses
·
The company’s brand of products and the
company, in general, is little-known
·
The company has a narrow line of
products that go hand in hand with other IT products and services such as data
backup and recovery
·
The current website and network traffic
is low compared to the expected competition
·
The company lacks organic funding
meaning that it has no outside funding other than what it generates from the
sales of systems and IT services
·
Weak buying power and insignificant
influence over the partners
·
The company develops closed source
systems and software
Opportunities
·
The company can displace the high-priced
competition in the software development industry with adoption of more new
technologies
·
The has a chance to subscribe to
services such as Software as a Service (SaaS)
·
OEM opportunities
·
The company has a various opportunity to
venture into markets where the established system developers have not ventured
such as Latin America and Africa
·
The company has an opportunity to create
“Add-on” to the existing software products
·
The company can also leverage from the
already available software and system developers
·
There are possible new acquisitions in
the system and software development markets
Threats
·
The company will be competing with
companies that are large and funded to the tune of million dollars
·
The development of cloud computing could
disrupt some activities that the company depends on for revenue
·
Delays in releasing any new product
could lead to negative change of commitment by the customer that could be
adverse to the company
High Level Project Schedule
Tasks
Project
Role
|
Project
Responsibility
|
Project Sponsor
|
XYZ Enterprises is
the project champion and will therefore provide direction and necessary
support to the team. The management will approve the project for funding and
the scope. The management will also set the priority of the project relative
to other projects in their area of responsibility
|
Government Monitor
|
The government
monitor will be the bridge between the team and the sponsor. Furthermore, the
monitor will be the point of contact for the project manager to manage the
CDC’s daily interests.
|
Project Manager
|
The project manager
will perform daily management of the project. He also has particular
accountability for project management with the approved scope, time, cost,
and quality to delivered requirements, deliverables and customer needs
|
Business Steward
|
A management person
within the company who will be responsible for the success of the whole
project
|
Technical Steward
|
Technical steward
will be responsible for the technical daily aspects of the project. His
responsibilities include details of network perimeter implementation. He is
also responsible for providing technical support and directions to the
project
|
Security Steward
|
Security steward is responsible for
playing the role of maintaining the information security of the project
during implementation
|
Information System Security Officer
(ISSO)
|
Definitions of roles and
responsibilities by the company according to the project
|
High Level Risk Management
Risk
|
Risk
Level (L/M/H)
|
Likelihood
|
Mitigate
Strategy
|
Estimated project
schedule
|
H
|
Certainty
|
Developed detailed
project timeline accompanied by regular baseline reviews
|
Inadequate knowledge
of users
|
M
|
Likely
|
Project manager
assigned to evaluate global implications
|
Creeping of project
scope
|
L
|
Unlikely
|
Initial definitions
of scope in the plan, reviewed regularly to prevent creeping
|
Unrealistic cost estimates
|
L
|
Unlikely
|
Costs included in the plan and also
subject to amendment due to revelation of new scope details
|
Unrealistic timeline estimates
|
M
|
Somewhat likely
|
Frequent review of timeline to prevent
departures of undetected timeline
|
Availability of the project team
|
M
|
Somewhat likely
|
Regular reviewing of the project
momentum at all levels. Identification of impacts caused by unavailability
|
Lack of definition of change
management procedures
|
L
|
Unlikely
|
N/A
|
Unclear change management procedures
|
L
|
Unlikely
|
N/A
|
Weak participation of users in the
project team
|
L
|
Unlikely
|
Full time employee will coordinate
user group participants
|
References
Axinn, W. G., &
Pearce, L. D. (2006). Mixed methods data
collection strategies. Cambridge: Cambridge
University Press.
Doraiswamy, P., &
Shiv, P. (2012). 50 top IT project
management challenges. Cambridgeshire, United
Kingdom: IT Governance Publishing.
Fine, L. G. (2009). The SWOT analysis: Using your strength to
overcome weaknesses, using opportunities
to overcome threats. Berlin: CreateSpace Independent Publishing Platform.
Harrison, F. L., &
Lock, D. (2004). Advanced project
management: A structured approach. Aldershot:
Gower Publishing.
Lester, A. (2007). Project management, planning, and control.
Burlington: Butterworth- Heinemann.
Moustafaev, J. (2014). Project scope management. Boca Raton:
CRC Press.
Newel, M. W. (2005). Preparing for the Project Management
Professional (PMP) Certification Exam.
New York: AMACOM/American Management Association.
Olsen, W. (2011). Data collection: Key debates and methods in
social research. New York: SAGE
Publications.
Stevens, R. E., &
Sherwood, P. K. (1982). How to prepare a
feasibility study: a step by step guide
including 3 model studies. Upper Saddle River: Prentice-Hall.
Weller, S. C., &
Romney, A. K. (1988). Systematic data collection. New York: SAGE Publications.
Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in Online Writing Services if you need a similar paper you can place your order from free essay writing services.
No comments:
Post a Comment