Thursday, September 3, 2020

Internet Security free essay sample

| IT Security Consultants, Inc. 555 East 1000 South, Salt Lake City, UtahPhone Number: (801) 555-0100 Fax: (801) 555-0110 | 2/23/2009| | FTD Enterprises| Request for Proposal| | Brandon Moore Justin JoosBrandon LittleMark PetersonJason Kilgore| | **This archive meets a solicitation for proposition from FTD Enterprises to execute a security foundation and different assignments expressed in the proposition. | Table of Contents Company Overview3 Project Team Staffing4 Executive Summary7 Scope, Approach, and Methodology8 Risk Assessment8 Problems and Solutions8 Assumptions13 Project Management14 Resources14 Task List15 Network Topology24 Deliverables29 Budget30 Appendix: Detailed Budget33 Appendix: Risk Assessment35 Appendix: Continuity Plan37 Appendix: Backup/Disaster Recovery Plan45 Appendix: Business References51 Appendix: References52 1. Organization Overview IT Security Consultants, Inc. was established in 2001. We are a counseling and systems administration arrangements supplier. Our staff comprises of experienced designers, venture directors, examiners, and application engineers to assist associations with making the best utilization of their frameworks, individuals and procedures. IT Security Consultants, Inc. is lead by an exceptionally qualified gathering of business and innovation experts whose aggregate foundations comprise of long periods of experience. We will compose a custom exposition test on Web Security or then again any comparable point explicitly for you Don't WasteYour Time Recruit WRITER Just 13.90/page This top to bottom experience is balanced in business methodology and systems administration procedures. We have overseen ventures all through the IT range: from key system arranging, gadget determination to establishment, application improvement, transformation, preparing, and support. Our prosperity is predicated on high gauge, experienced experts who assemble positive, enduring associations with our customers. We work intimately with our customers to comprehend their objectives so our ventures can live up to their necessities and desires. Cautious arranging is the way to forestalling costly astonishments and disillusionments. We guarantee that the proposals we set forward are implementable inside a sensible time period and sensible cost-go, in light of your operational needs. Our Mission: To surpass customer desires at each phase of the procedure by offering remarkable support and guaranteeing, through advancement and industry best practices, the best arrangements. . Task Team Staffing Brandon Moore IT Security Consultants, Inc. President Brandon Moore is the CEO and fellow benefactor of IT Security Consultants, Inc. , an extraordinary PC organize counseling firm. Since 2004, IT Security Consultants, Inc. has been perceived as a main counseling organization. Brandon presently keeps up a Bachelor’s of Computer Science and a Master’s of Business Administration. Brandon Moore st arted his vocation in data security five years prior with an enormous web advancement organization. Afterward, Brandon was an advisor for rising specialized organizations, before starting his own. He started IT Security Consultants, Inc. in 2001 with the craving to bring answers for security and unwavering quality worries to different organizations at present without the assets or information to do as such. The ventures IT Security Consultants, Inc. takes on are commonly enormous and regularly exorbitant. As CEO of IT Security Consultants, Inc. , Brandon takes a certified enthusiasm for every one of his clients, and includes himself in the structure and arranging of most undertakings. He has manufactured IT Security Consultants, Inc. o not exclusively be a data security power house, yet to likewise give phenomenal upkeep and client care to clients. Justin JoosPresident As President and fellow benefactor of IT Security Consultants, Inc. , Justin deals with every significant part of theâ company, including: Sales, Marketing, Customer Service, Accounting, Human Resources, and Recruit ing. Already, he held top administration positions at Vitronix, a $75 million frameworks integrator and preparing association. Vitronix had the first and biggest Microsoft and Novell approved instructional hubs in the Northeast and worked 7 instructional hubs. Before Vitronix, Justin was a Department Manager at Federated Stores in Boston, MA where he finished their Executive Training Program. Justin has his Bachelor’s Degree in Computer Science, and a MBA in Business Administration. Task Team Staffing Jason Kilgore †Sales Director Jason Kilgore went along with IT Security Consultants, Inc. in 2005 and started an effective deals vocation finishing in his job as Sales Director. Jason selects, creates, and deals with the business group and is answerable for the general coordination and administration of all business exercises to address the issues of IT Security Consultants, Inc. ustomers and the destinations of IT Security Consultants, Inc . ’s field-tested strategies and systems. Jason additionally gives master guidance on Linux answers for the organization framework. Preceding working at IT Security Consultants, Inc . , Jason was a General Manager and a corporate coach with The Discovery Zone. Jim Halgren †Informati on Systems Manager Jim joined Capstone Securities in 2003 and has developed in different situations to his current position which he has held since 2005. He is answerable for the company’s propelled IT framework including: framework and application programming, PCs and servers, and correspondences. His training remembers an Associate’s Degree for systems administration, a Bachelors Degree in Information Security and a Masters Degree in Computer Science. Jim is no more peculiar to organize security and execution of systems, having gone through 7 years as a security specialist and a system engineer, which showed him the significance of appropriate system security and the significance of security arrangements. Jim has over 10 years of systems administration and security experience, differing from enormous to little systems. His insight and procedures have created through long stretches of crucial system correspondences work. His experience comes full circle in a rich arrangement of certifications for his focus in data security. Task Team Staffing Mark Peterson †Business/Financial Manager Mark Peterson went along with IT Security Consultants, Inc. in 2002, in the wake of coming back from working in China. Imprint has a Bachelor’s Degree in Information Security, a minor in Chinese, and a Master’s in Business. Imprint likewise has college showing experience and has made numerous introductions before gathering crowds, and corporate senior administration. Imprint is an inspiration who keeps individuals concentrated on the objective; he is a middle person who discovers shared view among the two players and an audience. With involvement with PCs, many guess that he should be ignorant regarding what others are attempting to discuss, however his thoughtfulness regarding non-verbal prompts and enthusiasm for arriving at agreement makes that a helpless presumption. Imprint is an expert with eyes that see the entire picture and not only a limited fragment. Imprint has structured and customized PC frameworks for an assortment of customers and took care of the accounts for two fruitful organizations as a business person. Accordingly, he can talk bits and bytes to the specialized staff and charges and credits with the CFO. He can consider a solicitation for new programming or equipment and judge an upgrade of a current business process is adequate on account of his ability in enhancement. Experience has prepared Mark to perceive that the center issue at the base of practically any data innovation issue is typically a people issue, not an innovation one. Except if individuals are propelled to change, except if they are associated with discovering answers for the current issues, and except if they speak with one another, the best innovation will undoubtedly frustrate. 3. Official Summary For a while workers and administrators of FTD Enterprises have griped of data transmission and availability issues inside its system; there have additionally been issues with burglary and worries over the trustworthiness of licensed innovation. In addition, FTD Enterprises has communicated worry for by and large system security and the high turnover pace of IT staff. A RFP was given on December first 2008, mentioning an appraisal and answers for the numerous issues happening inside FTD Enterprises. During the most recent couple of weeks, we at IT Security Consultants, Inc. have surveyed the RFP and contextual analyses gave by FTD Enterprises regarding its security and system concerns; we have discovered a few vulnerabilities that we will address in detail. The principle classes of concern are: * Business Continuity * Building/Perimeter Security * System Access * Physical Access * Data Center and Communication Closets Network Security Given these territories of concern, we suggest the accompanying activities: * Backup and debacle recuperation methods * Personnel checkpoints and video reconnaissance * Implementation and authorization of security approaches and methodology * Server and systems administration hardware solidifying * Improvement of WAN/LAN associations notwithstanding these in advance of referenced classifications, we will address diff erent concerns with respect to the secrecy, respectability, and accessibility of FTD Enterprises’ frameworks. At IT Security Consultants, Inc. we have an expert group of specialists that consolidate expertise, information, experience, and industry confirmations to give you the most ideal debut administration at a moderate cost. We will make your business forms progressively effective and bring down your general expenses. 4. Extension, Approach, and Methodology IT Security Consultants, Inc. is a business devoted to offering incredible support and proposals concerning organizing needs. This archive is intended to give an increasingly itemized diagram of how IT Security Consultants, Inc. an enhance the system foundation of FTD Enterprises. 4. 1 Risk Assessment The accompanying table delineates FTD Enterprises’ zones of worry with respect to security

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.