Unit 1 – Integrated Distributors Incorporated
Mr. James Hollis
ITT Technological Institute – Miami
IDI cannot continue operating with a neglected IT infrastructure. A plan needs to be prepared to identify every issue with the IT infrastructure. Such plan should describe actions to eliminate or mitigate the risks, and provide a framework within which the improvement, development and delivery of information technology could be increasingly responsive, stable, and secure in the coming years.
Some of the upgrades included on that plan are the following:
•Network infrastructure should be upgraded to Gigabit Ethernet, considerably increasing network speed ...view middle of the document...
As software evolves from version to version, it often becomes easier to use, and more intuitive to put to work. Since employee salaries are a major portion of business expenses, upgrading software is synonymous with investing in employee productivity.
Failure to upgrade software may lead to feelings of neglect since employees have access to and can see the advantages of upgrading long before management makes the decision to upgrade.
Upgrading hardware directly affects the health and success of the overall business, so administrators should take the time to review their options and select systems that fit their business needs. But sometimes a hardware upgrade isn’t that simple. In today’s world, the technology is changing by the minute, and it refuses to wait for anyone to catch up. Router and switch upgrades are the top project priorities for network managers, followed by wireless implementations. Once the choice to begin a network
Hardware upgrade has been made, the key to success will be open and honest communication and cooperation. The networking, security, financial and management teams, as well as the network's users, must all be involved. Determining the complexity of an upgrade requires identifying and understanding the network's key functions and what devices and applications support the current environment, inventorying all hardware and software assets. This is an ideal time to audit current firewall and perimeter defense rule bases and highlight any risks that need to be mitigated.
Information and software classification is necessary to better manage information. If implemented correctly, classification can reduce the cost of protecting information because in today’s environment, the “one size fits all” will no longer work within the complexity of most organization’s platforms that make up the I/T infrastructure. Information classification enhances the probability that controls will be placed on the data where they are needed the most, and not applied where they are not needed. Classification security schemes enhance the usage of data by ensuring the confidentiality, integrity, and availability of information. By implementing a corporate-wide information classification program, good organization practices are enhanced by providing a secure, cost-effective data platform which supports the organization’s business objectives. The key to the successful implementation of the information classification process is senior management support. The corporate information security policy should lay the fundamentals for the classification process, and be the first step in obtaining management support.
IDI risk assessment involves the integration of threat, vulnerability, and
information. It involves deciding which protective measures to take based on a well-defined risk reduction strategy. Many models have been developed by which threats, vulnerabilities, and risks are integrated and then used to inform the allocation of resources to...