Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
The Network Implementation Plan, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Implementation Plan
The school of health requires a reliable and secure network. The threats have been identified, and solutions have been proposed. The proposals need to be implemented to ensure smooth running of operations in the institution. Implementation will come in phases to ensure smooth integration into the system.
The implementation plan has to have the following aspects for it to be a success.
- It must have a time frame
- It must be done by qualified personnel
- Funding has to be adequate
- Staff and the student must be receptive and involved in coming up with this plan in their own levels
- The resources required must be available.
These phases are outlined below.
Phase One – Identifying system requirement
There are various threats to the network that need to be eliminated. This entails first knowing what the system has and what it needs. In the previous papers, various threats that are presumed to occur at any one time were thoroughly discussed. A detailed analysis ought to be done. This detailed analysis will produce a report of the hardware and software requirements for the system to function well (Ciampa, 2011). There are some requirements that must be met in terms of software and hardware compatibility to ensure the network is secure.
The analysis will be in the following areas.
- Software analysis – The software used to maintain and control the network has specific security software which is compatible with it. The compatibility will ensure the system does not crash and be a threat to other installed programs.
- Hardware analysis – This detailed exploration will determine what type of hardware is required to increase the security of the system. This will help to ensure that the installed software is compatible with the required hardware.
- Physical analysis – Access to the location of computers and the servers will give enlightenment to what is required.
- Policies analysis – The policies of the organization in terms of security measures should also be analyzed. This will bring out loopholes that need to be sealed, and any additional requirements to be added.
- Personnel analysis – This will entails analyzing whether the technical staff is competent to run the system. Their qualifications are going to be scrutinized.
Phase Two – Purchasing of the requirements
This entails now analyzing all the requirements by a technician. The technician will analyze all the security problems and recommendations given in phase one. The software and hardware will be bought and verified by the technician. This stage is crucial because it is meant to provide a financial aspect of the needed items.
`The deliverables of this phase will include the following:
- Is funding available for the purchase of the requirements?
- Are the hardware and software available in the market?
- Do the items meet the set standards in the market?
- Can the items be installed with or without the presence of a technician?
Phase Three –implementation of policies
The physical and policy analysis that had been done in phase one will now be implemented. This is the first stage to ensure the hardware is protected. This will be the first stage because it will provide a stepping stone to the other recommendations to be implemented (Ciampa, 2011). It will entail the following:
- The putting of security locks such as finger print activated, key card activated, Iris activated and voice activated locks at locations like server rooms, Computer labs and network administrator’s offices. This type of physical security measures will ensure the hardware and information is protected.
- The number of people allowed to access confidential information is reviewed and people will be assigned security clearances. These clearances are part of the policies that need to be implemented. There is also the aspect of bylaws that need to be maintained to ensure security is assured. This can be things like no sharing of passwords and will apply to both staff and students.
- There is also the hiring of security firms to ensure data and hardware is protected at all costs.
Phase 4- Software and Hardware recommendation
This is the stage where all the hardware and software that was recommended is now installed. Any modifications recommended will also be made to both the hardware and software. The process is outlined below.
- All the software’s and applications recommended will be installed. They will include things like antivirus software, anti spy software, firewalls, wireless network security software, local area network, wide area network, security software and network operating system security software (Blacharski, 1998).
- All the hardware that was recommended is now integrated into the system at various points. Such points include the servers, local area network ports and the wide area distribution ports. This might be technical; therefore, a technician is required to be present.
- The aspect of creating a cloud backup will also be dealt with in this phases. The backup systems will provide real time backup of information.
This phase will be time consuming and may require the whole network to be shut down for a while. There are measures that the organization will put in place to ensure the smooth running of the organization is maintained.
Phase 5 – Observation and review
This phase will entail observing system operation and identifying any flaws that might be present. The flaws are then analyzed and possible remedies implemented. This is particularly beneficial because it asses how staff and students adopt to the new system (Blacharski, 1998). It will then be used as a platform for assessing whether the system was worth the time and money which was invested in it. The need for a technical officer to be there to troubleshoot the system will also have to be considered in this stage. His main work will be fixing the errors and problems in the system.
The above phases will aim at ensuring that the network and information is safe from any external threat. The implementation of a new security system will bring the element of security and confidentiality to the system. Each of the above phases will be aiming at providing security and integrity to the system. The security system of this organization will be effective if all the measures in the phases are well implemented. The smooth running of the organization will be achieved.
References
Blacharski, D. (1998). Network security in a mixed environment. Foster City, CA: IDG Books Worldwide.
Ciampa, M.. (2011). Security+ Guide to Network Security Fundamentals. Kentucky: Cenage learning.
Elahi, A., & Elahi, M. (2006). Data, network, and Internet communications technology. Clifton Park, NY: Thomson Delmar Learning.
Hardjono, T., & Dondeti, L. R. (2005). Security in wireless LANs and MANs. Boston: Artech House.
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee