Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
It Management Inc., Business Plan Example
Hire a Writer for Custom Business Plan
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Problem Description
What is the problem we are trying to solve with the technologies we chose?
Issue: Undefined and potentially hazardous traffic.
As a growing company, it is essential for IT Management Inc. to consider areas of potential danger. Our clientele has more than doubled over the past year requiring us to expand our network. In addition to the expanded clientele, we are now required to retain critical information for that many more accounts within our database. IT security and firewall policy has been set up based on a set of rules. These rules are compromised from four basic elements of destination, service, and action. Until this point, we have utilized a firewall, however at this point we have to consider that we have outgrown this tool. “Industry standards are available and continue to evolve, but do not provide a comprehensive solution. The onus is on the security architect to use the standards as a baseline and devise appropriate security controls applicable to the specific implementation of the service-oriented solution.” (Ghauri 2009) We are projected to have the same type of growth over the next year as well so protecting ourselves and our clientele has to address immediately. In order for IT Management Inc to move forward beyond the basic firewall, they need to consider interoperable heterogeneous solutions with the common thread of standard protocols. SOA, service-oriented architectures, is referred to as the “black-box” software. This software provides protection, prevention, and tractability. Utilizing such an option, the company will be able to monitor and regulate public access to private networks, and unauthorized attempts of entry to the network. Lastly the implementation of phased development methodology: incremental. This slices the system functionality into portions or better termed increments. Each piece is delivered through cross-discipline work. This is consistent from requirements to the deployment. This too is in process groups of inception, elaboration, construction, and transition.
What Technologies were chosen?
What benefits do these technologies provide?
Solution: Firewall, SOA Service-Oriented Architectures, and Phased Development Methodology: Incremental.
IT Management Inc. has recognized that “security is only as good as its weakest link.” The firewall provides options to reject, drop, permit and encrypt the traffic on IPSEC VPN capable firewalls. SOA provides an unparalleled interoperability between varieties of enterprise applications. It is considered the evolutions of component-oriented programming, providing a way to encapsulate, distribute, and reuse business functionality with additional benefits of interoperability across technology platforms. SOA in conjunction with a firewall will provide a comprehensive solution to the industries’ risk. Without implementations of firewall and SOA, it leaves the companies network open for hazards. There will be no default-deny for traffic that has no permission to be accessing select data. There would be not regulatory measures to monitor internal or external dangers, as well as no means to set necessary restrictions.
According to SOA Management – A Must for Operational Excellence (website 2009) the initial expectations of SOA are:
- End-to-end operational governance and visibility
- Improved SLA management and SLA/regulation compliance
- Reduced downtime through rapid troubleshooting and improved root cause analysis
- Proactive maintenance, security breach detection, and prevention through alerts
· Improved incident management through notification - Metrics for service optimization and enhancements
The last technology chosen is phased development methodology, incremental. The inception can identify project requirements, scope and risks where work can be estimated. Elaboration can deliver a working architecture that can mitigate high risks as well as fulfill certain non-functional requirements. Construction fills-in the architecture with production-ready codes from design, testing, implementation, and analysis of functional requirements. Finally, delivers the system into operating environment.
Implementation Approach
What is our approach for incorporating into the organization?
Approach: Organizational Impact
The Firewall, SOA Service-Oriented Architectures, and Phased Development Methodology: Incremental will affect IT Management Inc. in several ways.
The following shows how Firewall, SOA Service-Oriented Architectures, and Phased Development Methodology: Incremental will provide an explanation of the process, tools, privacy, and software/services:
Process: The service implementation and design is decoupled from application business logic. This makes it easy to migrate from existing applications to a service-oriented design without having to rewrite its components.
Tools: Firewalls one or more destination TCP ports, destination UDP ports, and a combination of destination TCP and UDP ports. SOA shows functionality to clients, in house and remote, through clear contracts using an opt-in approach. Phased development methodology: incremental shows the initialization step, the iteration step, and the Project Control List.
Privacy: Firewall provides a shield around the network preventing entrance to unauthorized parties. SOA executes software autonomously with no impact to one another if the off chance of failure were to occur.
Software/services: Firewall offers a broad range of software and services dependent on the need of the users. SOA can be deployed over different protocols to gratify a variety of potential computing scenarios. Support has interoperability with other major vendors. Finally phased development methodology: incremental provides isolated and easy-to-find modules.
In order to effectively implement firewall, SOA, and phased development methodology: incremental while continuing on with business as usual, we will implement firewall and service-oriented architectures in incremental phases. By prioritizing the core components it will provide minimal to no disruption in daily business. The core components are:
Phase 1: Web service management – are becoming the most common method of sharing data and functionality among loosely coupled system.
Phase 2: Service registry – allows organization of information about services and provides facilities to publish and discover services.
Phase 3: Service container – is a physical manifestation of the abstract endpoint, a remote process that can host software components, and implementation of the service interface.
Phase 4: Service repository – working with service registry this is a system for storing, managing, and accessing information. This also referred as service metadata used in the selection, management, invocation, and reuse of services.
Phase 5: Identity and access management infrastructure – is associated with password synchronization, meta-directory, role-based entitlements, single sign-on, web single sign-on, and similar ideas.
Phase 6: System management and monitoring infrastructure – provides professional services that simplify performance monitoring implementation by promoting user adoption and providing faster time to value.
Phase 7: Configuration and release management infrastructure identifies, records, reports, controls, audits, and verifies configuration items that include constituents, baselines, versions, components and their attributes. It also protects the integrity of configuration items by ensuring that only authorized components are authorized and used changes by the IT environment only.
References
Website (2009) SOA Management – A Must for Operational Excellence. Retreived from http://h20195.www2.hp.com/v2/GetPDF.aspx/4AA2-9325ENW.pdf
Ghauri, Atif. (2009) SOA Security 101: Patching the Firehole Wall. Retreived from http://www.informit.com/articles/article.aspx?p=1326604
Stuck with your Business Plan?
Get in touch with one of our experts for instant help!
Tags:
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee