All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

 Network System Implementation Plan, Research Paper Example

Pages: 4

Words: 1056

Research Paper

The school of health requires a reliable and secure network. The threats have been identified, and solutions have been proposed. The proposals need to be implemented to ensure smooth running of operations in the institution. Implementation will come in phases to ensure smooth integration into the system.

The implementation plan has to have the following aspects for it to be a success.

  1. It must have a time frame
  2. It must be done by qualified personnel
  3. Funding has to be adequate
  4. Staff and the student must be receptive and involved in coming up with this plan in their own levels
  5. The resources required must be available.

These phases are outlined below.

Phase One – Identifying system requirement

There are various threats to the network that need to be eliminated. This entails first knowing what the system has and what it needs. In the previous papers, various threats that are presumed to occur at any one time were thoroughly discussed.  A detailed analysis ought to be done. This detailed analysis will produce a report of the hardware and software requirements for the system to function well (Ciampa, 2011). There are some requirements that must be met in terms of software and hardware compatibility to ensure the network is secure.

The analysis will be in the following areas.

  1. Software analysis – The software used to maintain and control the network has specific security software which is compatible with it. The compatibility will ensure the system does not crash and be a threat to other installed programs.
  2. Hardware analysis – This detailed exploration will determine what type of hardware is required to increase the security of the system. This will help to ensure that the installed software is compatible with the required hardware.
  3. Physical analysis – Access to the location of computers and the servers will give enlightenment to what is required.
  4. Policies analysis – The policies of the organization in terms of security measures should also be analyzed. This will bring out loopholes that need to be sealed, and any additional requirements to be added.
  5. Personnel analysis – This will entails analyzing whether the technical staff is competent to run the system. Their qualifications are going to be scrutinized.

Phase Two – Purchasing of the requirements

This entails now analyzing all the requirements by a technician. The technician will analyze all the security problems and recommendations given in phase one. The software and hardware will be bought and verified by the technician. This stage is crucial because it is meant to provide a financial aspect of the needed items.

The deliverables of this phase will include the following:

  1. Is funding available for the purchase of the requirements?
  2. Are the hardware and software available in the market?
  3. Do the items meet the set standards in the market?
  4. Can the items be installed with or without the presence of a technician?

Phase Three –implementation of policies

The physical and policy analysis that had been done in phase one will now be implemented. This is the first stage to ensure the hardware is protected.  This will be the first stage because it will provide a stepping stone to the other recommendations to be implemented (Ciampa, 2011). It will entail the following:

  1. The putting of security locks such as finger print activated, key card activated, Iris activated and voice activated locks at locations like server rooms, Computer labs and network administrator’s offices. This type of physical security measures will ensure the hardware and information is protected.
  2. The number of people allowed to access confidential information is reviewed and people will be assigned security clearances. These clearances are part of the policies that need to be implemented. There is also the aspect of bylaws that need to be maintained to ensure security is assured. This can be things like no sharing of passwords and will apply to both staff and students.
  3. There is also the hiring of security firms to ensure data and hardware is protected at all costs.

Phase 4- Software and Hardware recommendation

This is the stage where all the hardware and software that was recommended is now installed. Any modifications recommended will also be made to both the hardware and software. The process is outlined below.

  1. All the software’s and applications recommended will be installed. They will include things like antivirus software, anti spy software, firewalls, wireless network security software, local area network, wide area network, security software and network operating system security software (Blacharski, 1998).
  2. All the hardware that was recommended is now integrated into the system at various points. Such points include the servers, local area network ports and the wide area distribution ports. This might be technical; therefore, a technician is required to be present.
  3. The aspect of creating a cloud backup will also be dealt with in this phases. The backup systems will provide real time backup of information.

This phase will be time consuming and may require the whole network to be shut down for a while. There are measures that the organization will put in place to ensure the smooth running of the organization is maintained.

Phase 5 – Observation and review

This phase will entail observing system operation and identifying any flaws that might be present. The flaws are then analyzed and possible remedies implemented. This is particularly beneficial because it asses how staff and students adopt to the new system (Blacharski, 1998). It will then be used as a platform for assessing whether the system was worth the time and money which was invested in it. The need for a technical officer to be there to troubleshoot the system will also have to be considered in this stage. His main work will be fixing the errors and problems in the system.

The above phases will aim at ensuring that the network and information is safe from any external threat. The implementation of a new security system will bring the element of security and confidentiality to the system. Each of the above phases will be aiming at providing security and integrity to the system. The security system of this organization will be effective if all the measures in the phases are well implemented. The smooth running of the organization will be achieved.

References

Blacharski, D. (1998). Network security in a mixed environment. Foster City, CA: IDG Books Worldwide.

Ciampa, M.. (2011). Security+ Guide to Network Security Fundamentals. Kentucky: Cenage learning.

Elahi, A., & Elahi, M. (2006). Data, network, and Internet communications technology. Clifton Park, NY: Thomson Delmar Learning.

Hardjono, T., & Dondeti, L. R. (2005). Security in wireless LANs and MANs. Boston: Artech House.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper