Ce diaporama a bien été signalé.
Le téléchargement de votre SlideShare est en cours. ×

The infrastructure and the security essentials of information technology in an enterprise project charter

Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité

Consultez-les par la suite

1 sur 5 Publicité

Plus De Contenu Connexe

Diaporamas pour vous (20)

Publicité

Similaire à The infrastructure and the security essentials of information technology in an enterprise project charter (20)

Plus récents (20)

Publicité

The infrastructure and the security essentials of information technology in an enterprise project charter

  1. 1. [PROJECT CHARTER] EXECUTIVE SUMMARY This project is mainly focused on that what infrastructure is suitable for a business and why every organization has different requirements in this project we recommend some new and required technology which help to make an Enterprise state of the Art and must identify the security essentials of an enterprise which helps to protect data from manipulation and alteration. The project will integrate improved technology solutions with our current platform in order to establish a more robust security infrastructure. Page | 1
  2. 2. [PROJECT CHARTER] PROJECT PURPOSE/JUSTIFICATION This project is helps to identify the need of hardware that what actually is the client requirement and also identifies security vulnerabilities which are usually done by a Network Administrator to give a lead to an intruders, Attacker or hackers so that they can enter in Domain and manipulate the Data. Business Need/Case The need of new infrastructure is organizational need and technology advancement as well as social and economical requirement. This new technology implementation may help in cost saving, process improvement and new product development. 2
  3. 3. [PROJECT CHARTER] Business Objectives The business objectives for this project are in direct support of our corporate strategic plan to improve IT security and reduce costs associated with loss and waste. - Designing a new IT Infrastructure for more fast and reliable network. - Highlights main threats and defining proactive strategy for Risk Management - Implementation of new IT security policy which may be more helpful in secure data - Reduce the amount of damages by 50% in the first year PROJECT DESCRIPTION This project Information Technology Infrastructure and IT security essential is mainly focused on that what infrastructure is suitable for a business and why every organization has different requirements also describes why consulting and system Integration services for this consulting we take a real time example of a joint venture between Siemens and Accenture. We also recommend some new technologies for the state of the Art Infrastructure as well as the best solution which can provide finest service to an Enterprise. Project also defined the security threats, Service Level of Agreements, managerial issues, the internal and external resources of an Enterprise, Total Cost of Ownership, as well as the most important factor Risk Page | 3
  4. 4. [PROJECT CHARTER] management. We also recommend some IT security solution which can help to protect data from stealing, altering and modification. All hardware and software will be integrated into the company’s current IT platforms in order to establish increased security while allowing all systems and processes to continue without interruption. Assumptions The project team must assume that the all parties (stakeholders, project sponsor and all departments) in this project equally support and collaborate to complete the project. Following are the list of assumptions.  The purpose of this project will be communicated throughout the company prior deployment.  The IT manager will provide additional resources if necessary  The project must be fully supported by all parties. Project Deliverables The following deliverables must be the successful completion of the project. Any changes to these deliverables must be approved by the project sponsor.  Fully deployed effective and efficient infrastructure  Must identify the Risk management and also competitive advantages.  Fully deployed intranet security solution. 4
  5. 5. [PROJECT CHARTER] Abstract Previous decades have shown a dramatic increase in the use of information technology in business, education, government, and elsewhere to assist in executing enterprise processes and accomplishing institutional objectives. It is likely that this trend will continue as the use of information technology spreads throughout the enterprise. I.T security deals with the managerial procedures and technological safeguards applied to computer hardware, software, and data to ensure against accidental or deliberate unauthorized access to computer system data. Therefore it is possible to establish some form of operational security, which allows the management of a computer installation to exercise control and be accountable for the installation. Guidelines and procedures may be established for accountability, for levels of control, and for system configuration. Preventive measures against internal and external threats can be developed through risk analysis, assessment, and insurance investigation. Physical security must prevent loss due to natural disasters, tampering, and malicious entry and destruction. User identification and authentication must protect both hardware and software. Page | 5

×