Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

The Network Implementation Plan, Research Paper Example

Pages: 4

Words: 1056

Research Paper

Implementation Plan

The school of health requires a reliable and secure network. The threats have been identified, and solutions have been proposed. The proposals need to be implemented to ensure smooth running of operations in the institution. Implementation will come in phases to ensure smooth integration into the system.

The implementation plan has to have the following aspects for it to be a success.

  1. It must have a time frame
  2. It must be done by qualified personnel
  3. Funding has to be adequate
  4. Staff and the student must be receptive and involved in coming up with this plan in their own levels
  5. The resources required must be available.

These phases are outlined below.

Phase One – Identifying system requirement

There are various threats to the network that need to be eliminated. This entails first knowing what the system has and what it needs. In the previous papers, various threats that are presumed to occur at any one time were thoroughly discussed.  A detailed analysis ought to be done. This detailed analysis will produce a report of the hardware and software requirements for the system to function well (Ciampa, 2011). There are some requirements that must be met in terms of software and hardware compatibility to ensure the network is secure.

The analysis will be in the following areas.

  1. Software analysis – The software used to maintain and control the network has specific security software which is compatible with it. The compatibility will ensure the system does not crash and be a threat to other installed programs.
  2. Hardware analysis – This detailed exploration will determine what type of hardware is required to increase the security of the system. This will help to ensure that the installed software is compatible with the required hardware.
  3. Physical analysis – Access to the location of computers and the servers will give enlightenment to what is required.
  4. Policies analysis – The policies of the organization in terms of security measures should also be analyzed. This will bring out loopholes that need to be sealed, and any additional requirements to be added.
  5. Personnel analysis – This will entails analyzing whether the technical staff is competent to run the system. Their qualifications are going to be scrutinized.

Phase Two – Purchasing of the requirements

This entails now analyzing all the requirements by a technician. The technician will analyze all the security problems and recommendations given in phase one. The software and hardware will be bought and verified by the technician. This stage is crucial because it is meant to provide a financial aspect of the needed items.

`The deliverables of this phase will include the following:

  1. Is funding available for the purchase of the requirements?
  2. Are the hardware and software available in the market?
  3. Do the items meet the set standards in the market?
  4. Can the items be installed with or without the presence of a technician?

Phase Three –implementation of policies

The physical and policy analysis that had been done in phase one will now be implemented. This is the first stage to ensure the hardware is protected.  This will be the first stage because it will provide a stepping stone to the other recommendations to be implemented (Ciampa, 2011). It will entail the following:

  1. The putting of security locks such as finger print activated, key card activated, Iris activated and voice activated locks at locations like server rooms, Computer labs and network administrator’s offices. This type of physical security measures will ensure the hardware and information is protected.
  2. The number of people allowed to access confidential information is reviewed and people will be assigned security clearances. These clearances are part of the policies that need to be implemented. There is also the aspect of bylaws that need to be maintained to ensure security is assured. This can be things like no sharing of passwords and will apply to both staff and students.
  3. There is also the hiring of security firms to ensure data and hardware is protected at all costs.

Phase 4- Software and Hardware recommendation

This is the stage where all the hardware and software that was recommended is now installed. Any modifications recommended will also be made to both the hardware and software. The process is outlined below.

  1. All the software’s and applications recommended will be installed. They will include things like antivirus software, anti spy software, firewalls, wireless network security software, local area network, wide area network, security software and network operating system security software (Blacharski, 1998).
  2. All the hardware that was recommended is now integrated into the system at various points. Such points include the servers, local area network ports and the wide area distribution ports. This might be technical; therefore, a technician is required to be present.
  3. The aspect of creating a cloud backup will also be dealt with in this phases. The backup systems will provide real time backup of information.

This phase will be time consuming and may require the whole network to be shut down for a while. There are measures that the organization will put in place to ensure the smooth running of the organization is maintained.

Phase 5 – Observation and review

This phase will entail observing system operation and identifying any flaws that might be present. The flaws are then analyzed and possible remedies implemented. This is particularly beneficial because it asses how staff and students adopt to the new system (Blacharski, 1998). It will then be used as a platform for assessing whether the system was worth the time and money which was invested in it. The need for a technical officer to be there to troubleshoot the system will also have to be considered in this stage. His main work will be fixing the errors and problems in the system.

The above phases will aim at ensuring that the network and information is safe from any external threat. The implementation of a new security system will bring the element of security and confidentiality to the system. Each of the above phases will be aiming at providing security and integrity to the system. The security system of this organization will be effective if all the measures in the phases are well implemented. The smooth running of the organization will be achieved.

References

Blacharski, D. (1998). Network security in a mixed environment. Foster City, CA: IDG Books Worldwide.

Ciampa, M.. (2011). Security+ Guide to Network Security Fundamentals. Kentucky: Cenage learning.

Elahi, A., & Elahi, M. (2006). Data, network, and Internet communications technology. Clifton Park, NY: Thomson Delmar Learning.

Hardjono, T., & Dondeti, L. R. (2005). Security in wireless LANs and MANs. Boston: Artech House.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

RTI and Enrichment, Research Paper Example

Chapter 1: Background & Purpose Policy, practice, or program choice The selected policy and practice deal with a change to the curriculum offerings. The curriculum [...]

Pages: 11

Words: 3012

Research Paper

Addressing the Problem of Free-Roaming Cats, Research Paper Example

Invasive species have long been a problem in Florida, where the climate allows many animals, insects, plants, fish and other living things to establish themselves [...]

Pages: 6

Words: 1536

Research Paper

Liquid Biopsy in Breast Cancer, Research Paper Example

The abnormal growth of healthy cells in the breast results to breast cancer. Cancer of the breasts is the second killer out of all cancer [...]

Pages: 5

Words: 1385

Research Paper

Staging and Coding, Research Paper Example

Introduction Cancer staging concepts describe the classification of the cancer disease based on how far the cancerous cells have affected the body from the time [...]

Pages: 5

Words: 1352

Research Paper

Contemporary Thought Leaders – Dan Bane, Research Paper Example

Dan Bane, the CEO of the Trader Joe’s grocery chain, recently spoke at a gathering of the Association for Strategic Planning in Los Angeles. His [...]

Pages: 1

Words: 412

Research Paper

Efficient Load Balancing in Cloud Computing Virtual Machines via Dynamic Allocation, Research Paper Example

Abstract This paper provides a method for dynamically assigning cloud resources. The required resources may be set up and booted by the user, and they [...]

Pages: 13

Words: 3569

Research Paper

RTI and Enrichment, Research Paper Example

Chapter 1: Background & Purpose Policy, practice, or program choice The selected policy and practice deal with a change to the curriculum offerings. The curriculum [...]

Pages: 11

Words: 3012

Research Paper

Addressing the Problem of Free-Roaming Cats, Research Paper Example

Invasive species have long been a problem in Florida, where the climate allows many animals, insects, plants, fish and other living things to establish themselves [...]

Pages: 6

Words: 1536

Research Paper

Liquid Biopsy in Breast Cancer, Research Paper Example

The abnormal growth of healthy cells in the breast results to breast cancer. Cancer of the breasts is the second killer out of all cancer [...]

Pages: 5

Words: 1385

Research Paper

Staging and Coding, Research Paper Example

Introduction Cancer staging concepts describe the classification of the cancer disease based on how far the cancerous cells have affected the body from the time [...]

Pages: 5

Words: 1352

Research Paper

Contemporary Thought Leaders – Dan Bane, Research Paper Example

Dan Bane, the CEO of the Trader Joe’s grocery chain, recently spoke at a gathering of the Association for Strategic Planning in Los Angeles. His [...]

Pages: 1

Words: 412

Research Paper

Efficient Load Balancing in Cloud Computing Virtual Machines via Dynamic Allocation, Research Paper Example

Abstract This paper provides a method for dynamically assigning cloud resources. The required resources may be set up and booted by the user, and they [...]

Pages: 13

Words: 3569

Research Paper

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!