SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
[PROJECT CHARTER]
EXECUTIVE SUMMARY
This project is mainly focused on that what
infrastructure is suitable for a business and why every organization has different
requirements in this project we recommend some new and required technology
which help to make an Enterprise state of the Art and must identify the security
essentials of an enterprise which helps to protect data from manipulation and
alteration. The project will integrate improved technology solutions with our
current platform in order to establish a more robust security infrastructure.
Page | 1
[PROJECT CHARTER]
PROJECT PURPOSE/JUSTIFICATION
This project is helps to identify the need of
hardware that what actually is the client requirement and also identifies security
vulnerabilities which are usually done by a Network Administrator to give a lead
to an intruders, Attacker or hackers so that they can enter in Domain and
manipulate the Data.
Business Need/Case
The need of new infrastructure is
organizational need and technology advancement as well as social and
economical requirement. This new technology implementation may help in cost
saving, process improvement and new product development.
2
[PROJECT CHARTER]
Business Objectives
The business objectives for this project are
in direct support of our corporate strategic plan to improve IT security and reduce
costs associated with loss and waste.
- Designing a new IT Infrastructure for more fast and reliable
network.
- Highlights main threats and defining proactive strategy for Risk
Management
- Implementation of new IT security policy which may be more
helpful in secure data
- Reduce the amount of damages by 50% in the first year
PROJECT DESCRIPTION
This project Information Technology
Infrastructure and IT security essential is mainly focused on that what
infrastructure is suitable for a business and why every organization has different
requirements also describes why consulting and system Integration services for
this consulting we take a real time example of a joint venture between Siemens
and Accenture. We also recommend some new technologies for the state of the
Art Infrastructure as well as the best solution which can provide finest service to
an Enterprise. Project also defined the security threats, Service Level of
Agreements, managerial issues, the internal and external resources of an
Enterprise, Total Cost of Ownership, as well as the most important factor Risk
Page | 3
[PROJECT CHARTER]
management. We also recommend some IT security solution which can help to
protect data from stealing, altering and modification.
All hardware and software will be integrated
into the company’s current IT platforms in order to establish increased security
while allowing all systems and processes to continue without interruption.
Assumptions
The project team must assume that the all
parties (stakeholders, project sponsor and all departments) in this project equally
support and collaborate to complete the project. Following are the list of
assumptions.
 The purpose of this project will be communicated throughout the company
prior deployment.
 The IT manager will provide additional resources if necessary
 The project must be fully supported by all parties.
Project Deliverables
The following deliverables must be the
successful completion of the project. Any changes to these deliverables must be
approved by the project sponsor.
 Fully deployed effective and efficient infrastructure
 Must identify the Risk management and also competitive advantages.
 Fully deployed intranet security solution.
4
[PROJECT CHARTER]
Abstract
Previous decades have shown a dramatic
increase in the use of information technology in business, education, government,
and elsewhere to assist in executing enterprise processes and accomplishing
institutional objectives. It is likely that this trend will continue as the use of
information technology spreads throughout the enterprise.
I.T security deals with the managerial
procedures and technological safeguards applied to computer hardware, software,
and data to ensure against accidental or deliberate unauthorized access to
computer system data. Therefore it is possible to establish some form of
operational security, which allows the management of a computer installation to
exercise control and be accountable for the installation. Guidelines and
procedures may be established for accountability, for levels of control, and for
system configuration. Preventive measures against internal and external threats
can be developed through risk analysis, assessment, and insurance investigation.
Physical security must prevent loss due to
natural disasters, tampering, and malicious entry and destruction. User
identification and authentication must protect both hardware and software.
Page | 5

Contenu connexe

Tendances

Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organizationDan Morrill
 
Developing an Information Security Roadmap
Developing an Information Security RoadmapDeveloping an Information Security Roadmap
Developing an Information Security RoadmapAustin Songer
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesGreenway Health
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiDaneWarren
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & StrategyTony Hauxwell
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
A framework for an organization to use in determining if it needs a ciso
A framework for an organization to use in determining if it needs a cisoA framework for an organization to use in determining if it needs a ciso
A framework for an organization to use in determining if it needs a cisoMax Justice
 
Yhcg - IT security and risk management
Yhcg  - IT security and risk managementYhcg  - IT security and risk management
Yhcg - IT security and risk managementWilfred Barretto
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09Tammy Clark
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessnewbie2019
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
Network security policies
Network security policiesNetwork security policies
Network security policiesUsman Mukhtar
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance programSiddharth Janakiram
 
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfsulu98
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
 

Tendances (20)

Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 
Developing an Information Security Roadmap
Developing an Information Security RoadmapDeveloping an Information Security Roadmap
Developing an Information Security Roadmap
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
A framework for an organization to use in determining if it needs a ciso
A framework for an organization to use in determining if it needs a cisoA framework for an organization to use in determining if it needs a ciso
A framework for an organization to use in determining if it needs a ciso
 
Yhcg - IT security and risk management
Yhcg  - IT security and risk managementYhcg  - IT security and risk management
Yhcg - IT security and risk management
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
develop security policy
develop security policydevelop security policy
develop security policy
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
 
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 

En vedette (12)

Warwick Gap Project Charter
Warwick Gap Project CharterWarwick Gap Project Charter
Warwick Gap Project Charter
 
EDLD 5388 Project Charter
EDLD 5388 Project CharterEDLD 5388 Project Charter
EDLD 5388 Project Charter
 
Across Project Charter
Across Project CharterAcross Project Charter
Across Project Charter
 
NG BB 06 Project Charter
NG BB 06 Project CharterNG BB 06 Project Charter
NG BB 06 Project Charter
 
How to Develop a Project Charter
How to Develop a Project CharterHow to Develop a Project Charter
How to Develop a Project Charter
 
Project Charter - How To
Project Charter - How ToProject Charter - How To
Project Charter - How To
 
Product Development Charter
Product Development CharterProduct Development Charter
Product Development Charter
 
Project charter sample
Project charter sampleProject charter sample
Project charter sample
 
The Project Charter Ensuring Quality
The Project Charter Ensuring QualityThe Project Charter Ensuring Quality
The Project Charter Ensuring Quality
 
Pmp – pmbok 5th edition develop project charter
Pmp – pmbok 5th edition develop project charterPmp – pmbok 5th edition develop project charter
Pmp – pmbok 5th edition develop project charter
 
Mobile Marketing Project Charter
Mobile Marketing Project CharterMobile Marketing Project Charter
Mobile Marketing Project Charter
 
Project Charter Guide
Project Charter GuideProject Charter Guide
Project Charter Guide
 

Similaire à The infrastructure and the security essentials of information technology in an enterprise project charter

MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docxRunning Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docxtoltonkendal
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economyaccenture
 
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTSMANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTScsandit
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Apoorva Ajmani
 
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...IJNSA Journal
 
It infrastructure services
It infrastructure servicesIt infrastructure services
It infrastructure servicesdigitaltracks
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureThe Open Group SA
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITYRazorpoint Security
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 
It infrastructure services
It infrastructure servicesIt infrastructure services
It infrastructure servicesdigitaltrackseo
 
06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdfYUSRA FERNANDO
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 
111.pptx
111.pptx111.pptx
111.pptxJESUNPK
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueRapidValue
 

Similaire à The infrastructure and the security essentials of information technology in an enterprise project charter (20)

MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
6 aproaches
6 aproaches6 aproaches
6 aproaches
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docxRunning Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTSMANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206
 
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
 
It infrastructure services
It infrastructure servicesIt infrastructure services
It infrastructure services
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise Architecture
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
It infrastructure services
It infrastructure servicesIt infrastructure services
It infrastructure services
 
06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
111.pptx
111.pptx111.pptx
111.pptx
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 

Dernier

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 

Dernier (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 

The infrastructure and the security essentials of information technology in an enterprise project charter

  • 1. [PROJECT CHARTER] EXECUTIVE SUMMARY This project is mainly focused on that what infrastructure is suitable for a business and why every organization has different requirements in this project we recommend some new and required technology which help to make an Enterprise state of the Art and must identify the security essentials of an enterprise which helps to protect data from manipulation and alteration. The project will integrate improved technology solutions with our current platform in order to establish a more robust security infrastructure. Page | 1
  • 2. [PROJECT CHARTER] PROJECT PURPOSE/JUSTIFICATION This project is helps to identify the need of hardware that what actually is the client requirement and also identifies security vulnerabilities which are usually done by a Network Administrator to give a lead to an intruders, Attacker or hackers so that they can enter in Domain and manipulate the Data. Business Need/Case The need of new infrastructure is organizational need and technology advancement as well as social and economical requirement. This new technology implementation may help in cost saving, process improvement and new product development. 2
  • 3. [PROJECT CHARTER] Business Objectives The business objectives for this project are in direct support of our corporate strategic plan to improve IT security and reduce costs associated with loss and waste. - Designing a new IT Infrastructure for more fast and reliable network. - Highlights main threats and defining proactive strategy for Risk Management - Implementation of new IT security policy which may be more helpful in secure data - Reduce the amount of damages by 50% in the first year PROJECT DESCRIPTION This project Information Technology Infrastructure and IT security essential is mainly focused on that what infrastructure is suitable for a business and why every organization has different requirements also describes why consulting and system Integration services for this consulting we take a real time example of a joint venture between Siemens and Accenture. We also recommend some new technologies for the state of the Art Infrastructure as well as the best solution which can provide finest service to an Enterprise. Project also defined the security threats, Service Level of Agreements, managerial issues, the internal and external resources of an Enterprise, Total Cost of Ownership, as well as the most important factor Risk Page | 3
  • 4. [PROJECT CHARTER] management. We also recommend some IT security solution which can help to protect data from stealing, altering and modification. All hardware and software will be integrated into the company’s current IT platforms in order to establish increased security while allowing all systems and processes to continue without interruption. Assumptions The project team must assume that the all parties (stakeholders, project sponsor and all departments) in this project equally support and collaborate to complete the project. Following are the list of assumptions.  The purpose of this project will be communicated throughout the company prior deployment.  The IT manager will provide additional resources if necessary  The project must be fully supported by all parties. Project Deliverables The following deliverables must be the successful completion of the project. Any changes to these deliverables must be approved by the project sponsor.  Fully deployed effective and efficient infrastructure  Must identify the Risk management and also competitive advantages.  Fully deployed intranet security solution. 4
  • 5. [PROJECT CHARTER] Abstract Previous decades have shown a dramatic increase in the use of information technology in business, education, government, and elsewhere to assist in executing enterprise processes and accomplishing institutional objectives. It is likely that this trend will continue as the use of information technology spreads throughout the enterprise. I.T security deals with the managerial procedures and technological safeguards applied to computer hardware, software, and data to ensure against accidental or deliberate unauthorized access to computer system data. Therefore it is possible to establish some form of operational security, which allows the management of a computer installation to exercise control and be accountable for the installation. Guidelines and procedures may be established for accountability, for levels of control, and for system configuration. Preventive measures against internal and external threats can be developed through risk analysis, assessment, and insurance investigation. Physical security must prevent loss due to natural disasters, tampering, and malicious entry and destruction. User identification and authentication must protect both hardware and software. Page | 5