Assure Ecommerce and Retail Operations Uptime with ThousandEyes
The infrastructure and the security essentials of information technology in an enterprise project charter
1. [PROJECT CHARTER]
EXECUTIVE SUMMARY
This project is mainly focused on that what
infrastructure is suitable for a business and why every organization has different
requirements in this project we recommend some new and required technology
which help to make an Enterprise state of the Art and must identify the security
essentials of an enterprise which helps to protect data from manipulation and
alteration. The project will integrate improved technology solutions with our
current platform in order to establish a more robust security infrastructure.
Page | 1
2. [PROJECT CHARTER]
PROJECT PURPOSE/JUSTIFICATION
This project is helps to identify the need of
hardware that what actually is the client requirement and also identifies security
vulnerabilities which are usually done by a Network Administrator to give a lead
to an intruders, Attacker or hackers so that they can enter in Domain and
manipulate the Data.
Business Need/Case
The need of new infrastructure is
organizational need and technology advancement as well as social and
economical requirement. This new technology implementation may help in cost
saving, process improvement and new product development.
2
3. [PROJECT CHARTER]
Business Objectives
The business objectives for this project are
in direct support of our corporate strategic plan to improve IT security and reduce
costs associated with loss and waste.
- Designing a new IT Infrastructure for more fast and reliable
network.
- Highlights main threats and defining proactive strategy for Risk
Management
- Implementation of new IT security policy which may be more
helpful in secure data
- Reduce the amount of damages by 50% in the first year
PROJECT DESCRIPTION
This project Information Technology
Infrastructure and IT security essential is mainly focused on that what
infrastructure is suitable for a business and why every organization has different
requirements also describes why consulting and system Integration services for
this consulting we take a real time example of a joint venture between Siemens
and Accenture. We also recommend some new technologies for the state of the
Art Infrastructure as well as the best solution which can provide finest service to
an Enterprise. Project also defined the security threats, Service Level of
Agreements, managerial issues, the internal and external resources of an
Enterprise, Total Cost of Ownership, as well as the most important factor Risk
Page | 3
4. [PROJECT CHARTER]
management. We also recommend some IT security solution which can help to
protect data from stealing, altering and modification.
All hardware and software will be integrated
into the company’s current IT platforms in order to establish increased security
while allowing all systems and processes to continue without interruption.
Assumptions
The project team must assume that the all
parties (stakeholders, project sponsor and all departments) in this project equally
support and collaborate to complete the project. Following are the list of
assumptions.
The purpose of this project will be communicated throughout the company
prior deployment.
The IT manager will provide additional resources if necessary
The project must be fully supported by all parties.
Project Deliverables
The following deliverables must be the
successful completion of the project. Any changes to these deliverables must be
approved by the project sponsor.
Fully deployed effective and efficient infrastructure
Must identify the Risk management and also competitive advantages.
Fully deployed intranet security solution.
4
5. [PROJECT CHARTER]
Abstract
Previous decades have shown a dramatic
increase in the use of information technology in business, education, government,
and elsewhere to assist in executing enterprise processes and accomplishing
institutional objectives. It is likely that this trend will continue as the use of
information technology spreads throughout the enterprise.
I.T security deals with the managerial
procedures and technological safeguards applied to computer hardware, software,
and data to ensure against accidental or deliberate unauthorized access to
computer system data. Therefore it is possible to establish some form of
operational security, which allows the management of a computer installation to
exercise control and be accountable for the installation. Guidelines and
procedures may be established for accountability, for levels of control, and for
system configuration. Preventive measures against internal and external threats
can be developed through risk analysis, assessment, and insurance investigation.
Physical security must prevent loss due to
natural disasters, tampering, and malicious entry and destruction. User
identification and authentication must protect both hardware and software.
Page | 5