Preview

Risk Management

Good Essays
Open Document
Open Document
622 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risk Management
The Integrated Distributors Incorporated is a publically traded company that is facing many challenges. The company’s Information technology infrastructure has been ignored and many of its operating locations are running outdated hardware and software, which greatly increases the risk to the network in relations to confidentiality, integrity, and availability. Because of the outdated hardware and software, the company suffered some network compromises through their JV internet site and it led to disclosures of sensitive and strategic information. In order to reduce the risks and vulnerabilities of each location, we must implement access control to ensure confidentiality, integrity, and availability. For the Billing, Montana location we have to consolidate 14 Hewlett Packard Unix servers to 1 UNIX server. Upgrade 75 Microsoft Windows servers to Windows server 2008 R2. Upgrade MS exchange e-mail to latest version. We must find another software vendor to replace Oracle financials for accounting and financial systems, Logisuite 4.2.2, and RouteSim. We have to hire developers to standardize the office automation hardware and software. Convert telecommunications system to a VOIP system. Design and implement a new Acceptable Use Policy (AUP) and upgrade WAN to a T1 MPLS to increase bandwidth. The Warsaw, Poland location, we must Find a new proxy server to replace the IBM Infinity hardened served, hire a new in-house application developer. Must convert the Siemens Saturn series PBX telecommunications system with desktop phones to a VOIP system and enforce the current Acceptable Use Policy. To assess risks and vulnerabilities with the operating IT facilities we must create a mitigation plan. The mitigation plan will ensure what actions or steps to take when a risk were to occur. If the company were to experience risk such as fire, users outages, remote access, opening unknown e-mail attachment or have equipment failure, the mitigation plan will let you know

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    expansion. The following are the key aspects of the IT infrastructure that must be put in place to…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    Enterprise technology solutions tightly integrate hardware, software, and services to address enterprise-wide issues that are not only of strategic importance to Baderman Island’s businesses, but also affect their data centers and networking environments. The following proposed solution sets will aid Baderman Island to assess their current environments, and then design, deploy, and manage the next generation integrated infrastructure to help them maximize the value of their IT infrastructure.…

    • 1483 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Project Part 1

    • 1209 Words
    • 4 Pages

    This Proposal is to assess the situation at the Richman Investments Company. The offices have a total of 5,000 employees, and the office technology inventory includes desktops, mobile computers, and wireless devices. There is a mix of computers running Windows XP, Windows Vista, Windows 7, and Mac OS X. Most of the managers have BlackBerry devices for instant communication, and all employees are provided cell phones. A Windows Active Directory forest with domains is set up for each office, and seven file and print servers are located in the Phoenix office. The Phoenix office also contains two proxy servers, configured as an array, that provide Web cache services and Internet access control for the organization. The majority of applications are Web-based and hosted from the Phoenix office.…

    • 1209 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    A proposal for improving IDI’s computer network infrastructure is the purpose for this proposal. This project is intended to be used by IDI’s information security team to developing a plan to improve IDI’s computer network infrastructure at multiple locations.…

    • 1206 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    The Wild Frontier (3)

    • 1024 Words
    • 4 Pages

    The Wild Frontier has expanded even more with the services and support provided in the past few weeks. Each of the original four (4) satellite offices have doubled in size and four (4) more offices are being opened. The current licensing seats have managed to cover all of the existing personnel, without full utilization but the new demand will overtax them. The owner, Sam Yosemite, gets all fired up if he can’t allocate costs fairly according to use. We also need to make the existing printers cover the additional personnel use without buying new printers, even though the managers have to print off long documents several times each week to provide shooting targets for Sam. To add, some users have been accessing applications and media services they do not need and the IT team needs to curtail this. The budget given for the increased staff is not sufficient for new desktops for each user. Additional storage needs have been identified in the original four (4) satellite offices, as well as some slowdowns in performance. These need to be addressed along with the consideration of Terminal Services Licensing.…

    • 1024 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    The project will consist of Hardware and software refreshes. Currently there is a network workgroup in place. All of the computers are running Windows 2000. One of the computers is being utilized as a “server” for the clinic software Medisoft. A Small Business Server utilizing Microsoft SBS 2008 will be implemented. This server will host the domain, active directory services, security policies, clinic software and be a central point for network storage and backup. All of the client computers will be replaced with new ones running Windows 7. These computers will be joined to the domain enforcing password requirements, security policies and ensuring that all computers are backed up and protected from viruses.…

    • 433 Words
    • 2 Pages
    Powerful Essays
  • Good Essays

    Network Topology Design

    • 430 Words
    • 2 Pages

    The business IT network infrastructure must be upgraded to accommodate the current and future growth of the company. The initial company network infrastructure design presented in Exhibit 1 provides a visual of the network design that included 10 workstations connected to a single stackable switch. This first network design employed a flat network topology, with workstations and servers configured in a peer to peer configuration that used a single ADSL line for Internet access. Fortunately the stackable network switch design is scalable and has enabled the network infrastructure to grow with the company while minimizing end user impact while changes were implemented. Exhibit 2 depicts the current business network infrastructure configuration which supports 100 employees and supporting services including Active Directory, DNS, DHCP, and file sharing for single sign-on convenience, security and simplified network management.…

    • 430 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    With constant reports in the media of hacked sites, denial of service attacks, computer espionage and newly discovered vulnerabilities in applications and hardware, it is impossible for the management of any organization to ignore the likelihood of a security incident occurring. Over the last few years concerns to protect the organization’s assets and minimize liability has grown substantially, of recent it has become management’s personal responsibility to implement effective information security controls.…

    • 2629 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    risk management

    • 4504 Words
    • 29 Pages

    This Guide may not be reproduced without written permission of The Association of Project Managers.…

    • 4504 Words
    • 29 Pages
    Powerful Essays
  • Powerful Essays

    Client Server

    • 1373 Words
    • 6 Pages

    The data processing transactions are conducted using the Vandelay Metropolitan Area Network (MAN). Because of strains on system resources and the over workload of the Vandelay corporation’s IT staff, The Pendant Consulting Group, an independent IT consulting firm, has contracted to study its current network environment and they recommend improvements to its affected environments. The consultants will also confirm the validity of information presented in this profile.…

    • 1373 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    05 Main body RESEARCH REPORT

    • 2746 Words
    • 21 Pages

    The proposed solution that follows involves significant studies for the changes to CAMPCO office network systems. The current hardware used throughout the network was purchased over a long period of time and uses many different technologies. The new basic physical network architecture will require several upgrades in hardware that address these incompatibilities and older technologies. The result will be higher speeds, more reliability, and easier maintenance of network components. The upgraded hardware will use for date-to date transactions, compatible technologies that will greatly facilitate troubleshooting and maintenance as well as resolve the slow access times that are currently being reported.…

    • 2746 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    The designated servers, R830, come preinstalled with all required management software, and SC7000 preconfigured as an SAN server. (Dell, n.d.) Furthermore, the only real requirement of the IT staff is to reconfigure the IP address schemes and security protocols on the servers, accomplishable in under 26 workhours, for a 4 personnel administrator team. Additionally, the requirement to migrate all users over to a single domain, proposed time line by the IT managers 96 workforce hours, by the 10-member helpdesk team. The software development team, senior engineer proposed a 3-week timeline for the software development and a 1-week time for testing and debugging. Software designated to developed in Java, to provide cross platform compatibility. (NetBean,…

    • 1110 Words
    • 5 Pages
    Good Essays
  • Best Essays

    risk management

    • 2069 Words
    • 6 Pages

    http://www.businessdictionary.com/definition/risk-management.html#ixzz2cdr06sCZhttp://www.comcare.gov.au/safety__and__prevention/managing_whs/ohs_risk_management/faqs_on_risk_management *More information on the legislative requirements of risk management can be found in Part 1 of the Occupational Health and Safety (Safety Standards) Regulations 1994. Other parts of the Safety Standards Regulations refer to risk management obligations for specific hazards, activities and places where work is performed. Part 1 of the OHS Code 2008 addresses Risk Management and provides practical guidance to employers. OHS Code 2008http://www.indent.net.au/wp-content/uploads/2009/05/an-introduction-to-risk-management.pdf…

    • 2069 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    Risk Management

    • 109988 Words
    • 1117 Pages

    Annual Report 2011 An overview Operating result (EBIT) Figures in EUR million 1,142.5 1,177.9 928.0 841.4 819.9 732.1 1,200 800 600 538.8 470.9 1,000 400 148.1 91.6 200 0 20021 20031 20041 2005 2006 2007 2008 2009 20102 Group net income (loss) 2011 Figures in EUR million…

    • 109988 Words
    • 1117 Pages
    Powerful Essays