Business analysis of a business proposal
A-Statement of the problem
The non-availability of security in companies and factories create loopholes for exploitation by malicious software. Your system, confidential files should not left unprotected, if left unprotected, chances are that you will be susceptible, vulnerable to cyber-attacks, cyber theft from unfair competitors and information hackers.
B-Benefits:
- Powerful security systems manned by trusted, competent and skilled computer programmers.
- Daily system backups, to be accessed through our shared cloud drive.
- Virtual security
- Gate scanning, and the breaking down of every single file coming in and out.
- Emergency kill-switch systems, in cases of critical situations by sophisticated attackers.
- Maintenance agent, working round the clock.
C- Need
A good security system is needed to protect your valuable information and keep your manufacturing business safe from malicious software (ICANN, 2015; FCC, n.d.).
2. Plan
A- Objectives and Methods
Search Security represented by its Senior Information Security Officer, will supply the client with an advanced information security system through a four-step process: (1) the first phase will be the system analysis phase, then (2) the system design, then (3) installation phase, and finally, (4) the user training phase (Search Security, n.d.).
During the first phase, Search Security will analyze the client’s existing system in order to define the security problem, objectives, and the required resources such as personnel and costs. It will meet with the IT personnel of the client company to identify the needs and expectations of the system.
During the second phase, once the client’s needs and expectations have been understood, Search Security will define the elements of the proposed system, including the components, the security level, modules, system architecture, and specific interfaces and data that will be incorporated into the system.
In the third phase, Search Security will meet with both the management and the IT personnel of the client corporation to illustrate the design of the new security system. Upon approval, the new system will be configured and installed in the client’s system, ready to become running.
In the final phase, five end users will be trained on how to use and to get familiar with the new system.
B- Cost
The cost of system analysis and system design will be $1,000 and $20,000, respectively. The installation of the new system and training of end users for one week will be provided for free then if the client will request training of more users Search Security will charge $150 per session.
C- Expected Results
It is expected that the implementation of the new security system will enhance security and safety of vulnerable information and secure the system from malicious software.
3. Conclusion
A- Summary of Key Points
-
The client complained lack of its system being vulnerable to malicious software.
-
Search Security proposes an advanced security system that will secure the system from malicious software.
-
Installation of the new system will enhance security and safety of vulnerable information and secure the system from malicious software.
-
The cost of system analysis will be $1,000 while system design will cost $20,000.
-
IT staff will receive one-week free training while each additional session will cost $150.
B- Request for Action
The clients will present their requirements and assess the specifications for the proposed system then once the system satisfies the assessments, they will place a purchase order upon executive management’s approval. Then Search Security will develop and install the new system within 30 days of the official Purchase Request.
References
Federal Communications Commission (n.d.). Cyber Security Planning Guide. Retrieved from https://transition.fcc.gov/cyber/cyberplanner.pdf
Internet Corporation for Assigned Names and Numbers (ICANN) (August 10, 2015). Threats, Vulnerabilities and Exploits – oh my!
National Institute of Standards and Technology (2009). THE SYSTEM DEVELOPMEN T LIFE CYCLE (SDLC). Retrieved from http://csrc.nist.gov/publications/nistbul/april2009_system-development-life-cycle.pdf
Search Security(n.d.).Steps in the information security program life cycle. Retrieved from http://searchsecurity.techtarget.com/tip/Steps-in-the-information-security-program-life-cycle
Academic levels
Skills
Paper formats
Urgency types
Assignment types
Prices that are easy on your wallet
Our experts are ready to do an excellent job starting at $14.99 per page
We at GrabMyEssay.com
work according to the General Data Protection Regulation (GDPR), which means you have the control over your personal data. All payment transactions go through a secure online payment system, thus your Billing information is not stored, saved or available to the Company in any way. Additionally, we guarantee confidentiality and anonymity all throughout your cooperation with our Company.