StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Aryam Internet Cafe and Facing Network Connection - Case Study Example

Cite this document
Summary
The paper "Aryam Internet Cafe and Facing Network Connection" discusses that the Work Breakdown structure has detailed information about the activities that need to be carried out. The Gantt chart represents the schedule of the activities that need to be carried out during the project…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful

Extract of sample "Aryam Internet Cafe and Facing Network Connection"

Abstract

Aryam internet café is facing network connection and security challenges. The most appropriate solution is the design and implementation of a packet tracer. The Work Breakdown structure has detailed information about the activities that need to be carried out. The Gantt chart represents the schedule of the activities that need to be carried out during the project. The analysis was carried out using Information Security Management System (ISMS). A plan-Do-Check-Act approach was utilized during the process. The network security challenge faces most of the organizations worldwide. The team members will be required to study the aspects of network systems and security in order to effectively address the project challenges.

Introduction

Network security challenge is a major problem affecting most of the modern day organizations. Aryam Internet café is also facing the same challenge. The incidences of hacking and loss of data including confidential information is associated with security risks (Schwalbe, 2013). A packet tracer design has been proposed so as to solve the problems facing the organization in terms of the security needs. The paper is thus an analysis of the system requirements.

Project Title

Designing a secured redundant Network for a café

Project Sponsor

Aryam Café

Project Manager

Salem Alshamisi

Start Date

4th September 2016

Projected Finish Date

7th December 2016

Roles and Responsibilities

Name

Project Role

Position

Contact

Aryam Café

Sponsor

Stakeholder

Salem Alshamisi

Project Manager

Group Leader / Network Engineer

056 - 2010461

Rashed Alalawi, Ahmed Alqubaisi,

Saif Aldhaheri,

Waddah Alnuaimi

Team Member

Network Engineer

050 – 3092221

050 - 3323326

052 – 9099927

050 - 7431005

Mohammed Al Shamisi

Customer

Stakeholder

056 - 4404797

Aryam Alain Network specialist

Expert

Dr Moayyad Mohammed

Advisor

Milestones and Deliverables

Milestones

Deliverables

Expected Date

Interview the customer

Stating the overall projects needs

28st September

Comprehensive research

Listing all the Hardware and software needed

30th September

Designing

Design a will structured network

20th October

Simulation

Building a packet tracer network simulation

15th November

Building

Implementing the network design in the HCT’s networking lab

1st December

Project completion

All the aspects of the project are completed successfully

7th December

Client requirements and constrains

The meeting with the client was vital in ensuring that the requirements as well as constrains are established. The technical challenges in relation to the system that is facing the clients include loss of connection, poor connection, network security, ineffective equipment and old computers. Hacking is one of the security challenges that the client has been faced with. Breach of security is a major concern for most of the organization (O’Brien, 2011). The client requirements include new computers as well as a packet tracer design that is secure.

Project sign off

Signatures and Comments

Name

Signature

Date

Salem Alshamisi

      Aryam Alain Network specialist

          Dr Moayyad Mohammed

              Aryam Café

                  Comments: Stakeholder comments here (if any). Add as many rows as you listed in the jobs and responsibilities above.

                  Scope statement

                  Project objectives

                  • To design a perfect and secure network café for the client is effective, easy to uses and with less dangers of hacking.
                  • To ensure that the network is not exposed to vulnarabilities as well as security threats.
                  • To eliminate the problem of sever being down leading to loss of network and connection.
                  • To ensure that the café is equipped with fast and effective computers.

                  Product characteristics and requirements

                  • The new proposed product is secure, efficient, easy to use and cost effective.

                  Project deliverables

                  • To develop a packet tracer design that is totally secure and redundant.
                  • To ensure that the project is completed within the required time and allocated budget.
                  • To develop a new IP address and put in place a new routing protocol.
                  • To deploy a LAN technology and through a Power over Ethernet.
                  • To put in place new high speed computers fully equipped with anti-virus systems.

                  Success criteria

                  • Ability of the network to provide efficient communication between all the branches with less vulnerability.
                  • A reduction in the process time for the transactions by 40%.
                  • Reduce the incidences of security breach by 90% in all the branches.
                  • Reduce the cost of operation by up to AED 20,000.

                  Project schedule cost

                  Work breakdown structure

                  The work breakdown structure is usually comprised of all the activities that need to be carried out during the project (Ren, Kinsy & Zheng, 2015). The work breakdown dictionary highlights the major task and aspects related to the project. The main activities that have been identified include initiation phase, planning phase, Implementation phase, controlling phase and project closing phase. The calculations indicate that the major activities in the work breakdown structure will be completed within a period of 41 days. The work breakdown structure plays a vital role in providing a schedule of how the activities will be carried out. The duration of the activities in the work breakdown structure have been calculated based on best case estimate, probable case estimate and worst case estimate. This was necessitated by the need to make estimations based on different scenarios. The issues of risks as well as delays were considered during the process.

                  Risk management

                  The risks involves in eventualities that may occur during the project management process. The risks have the potential of causing delays as well as increasing the costs of implementing the project. Any project is prone to risks due to the nature of activities that takes place (Sabherwal & Becerra-Fernandez, 2010). The risks has been identified and described on a table. This is under the section possible risks, impacts, probability and remedial action. The possible risks that have been identified in the project include project delays, unplanned exit of a project team member, equipment failure, failure of the system to work and increased cost of the required items. The impacts that the risks has on the project vary depending on the activities that will be affected. Different stakeholders can be involved in bearing the risks based on their roles and activities affected (Sabherwal & Becerra-Fernandez, 2010). Remedial actions have been put in place in the project in order to ensure that the risks are effectively managed.

                  Analysis

                  Methodology

                  There are different methods of carrying out an analysis of the network. The methods selected are mainly based on the area of information system. Penetration testing is one of the areas of security network. It main methodologies involve Open Source Security Testing Methodology Manual, Penetration Testing Framework and NIST penetration testing methodology. The methodologies in this area are mainly for the purposes of determining the ability of the network to with stand the threats. Digital forensics can also be used in terms of determining the integrity of the system in terms of dealing with threats (Sutcliffe, 2013). The US Department of Justice methodology is part of the digital forensics. This method is keen on determining the integrity of every aspect of the system and its components. Intrusion detection is an aspect that is used in dealing with the aspects of threats and attacks on the system. The methodology may involve the use of firewalls to caution the system from threats. Its main advantage involves the ability to detect an intrusion and external threat. The threats and intrusion are usually blocked in advance and hence avoiding the negative security effects on the system. Information Security Management System (ISMS) is an area that deals with network and security. This method is also referred to as ISO 27001project. The methodologies are mainly comprised of policies concerned with information security management as well as related risks (Sutcliffe, 2013). ISMS mainly utilize the Plan-Do-Check-Act approach. The ISMS approach was utilized during the project for the purposes of ensuring that the most effective system is put in place at the café.

                  Selected methodology

                  The Plan-Do-Check-Act approach was used during the process in order to ensure that the entire project requirements are met. The Plan phases mainly involve assessing the information security risks in relation to the challenges that the client was faced with. A packet tracer design was also developed at this point was effective in dealing with the challenges faced by the client. All the necessary controls were also established at the plan phase. The second phase regarding the use of the methodology was the DO phase. This phase mainly involved the implementation of the designs as well as the operating controls. The check phase mainly involved evaluating the performance of the system in terms of its effectiveness and efficiency. This was in relation to the needs of the client and the whole system. The Act phase was the last and it mainly involved continuous assessment of the system and putting in place the required improvement measures. The following is a flow diagram for the selected methodology

                  Cost benefit analysis

                  The implementation of the project will require a total of Dhs 445, 506. However after the implementation, the cafe will be able to save Dhs 20,000 every month. The system will be fully secure and time of carrying out the transaction will be reduced by 40%. This will impact positively on improving the relationship with the customers.

                  Discussion

                  Network problems are common due to the increased threat security threats. The number of people using the networks is also on the increase which has led to problems with the server. Technological advancement is beneficial to the industry. However, continuous changes have to be made in order to ensure that the new technology is fully embraced. An organization may end up with challenges if it does not embrace the new technology. The network connectivity problems impacts negatively on the operations of an organization (Schwalbe, 2013). This is because is slows down the rate of carrying out transactions. This makes it difficult for an organization to transact its activities across different branches. The customers using the network may also end up being frustrated as a result of the network delays and hence impacting negatively on the relationship with the organizations. The presence of fast an effective network is therefore beneficial to the organization as well as its clients. Hacking is a major system security threat that continuous to affect most of the organizations worldwide. It involves unauthorized access to private information. This could be due to various reasons such as using the information for purposes of competition. Some of the hackers may steal the information of an organization and hence making it impossible for the owners to access it (Schwalbe, 2013). This in most cases affects the operations of the organization and in some instances it may ground it.

                  Hackers are also known to for obtaining personal information of the clients through hacking the system of the organization. In the implementation of the project, one of the major challenges involves the aspects of security. The hackers in most cases are one step ahead of any new system (Sabherwal & Becerra-Fernandez, 2010). This means that the system may still be prone to attacks and external threats. The major challenge also involves the need to work with experts. The involvement of experts and consultants increases the costs. It is also difficult to find the required experts on time and hence causing delays. In order for the team to complete the project, the members will be required to study some areas in order to acquire more knowledge. The project members will have to study the aspects of network security and systems. This is mainly for the purposes of ensuring that they obtain more information about the packet tracer design and the challenges facing the client. The information gained will be useful in tackling the security related changes in terms of the effectiveness and efficiency of the system. More information about the security testing methodologies is required. Test will be required even after the system has been fully developed. This will mainly be carried out during to ensure that the system is working effectively. The risk register has identified the failure of the system to work as one of the risk. Lack of technical expertise is one of the main challenges associated with system failure (Sabherwal & Becerra-Fernandez, 2010).

                  Read More
                  The impacts that the risks has on the project vary depending on the activities that will be affected. Different stakeholders can be involved in bearing the risks based on their roles and activities affected (Sabherwal & Becerra-Fernandez, 2010). Remedial actions have been put in place in the project in order to ensure that the risks are effectively managed.

                  Analysis

                  Methodology

                  There are different methods of carrying out an analysis of the network. The methods selected are mainly based on the area of information system. Penetration testing is one of the areas of security network. It main methodologies involve Open Source Security Testing Methodology Manual, Penetration Testing Framework and NIST penetration testing methodology. The methodologies in this area are mainly for the purposes of determining the ability of the network to with stand the threats. Digital forensics can also be used in terms of determining the integrity of the system in terms of dealing with threats (Sutcliffe, 2013). The US Department of Justice methodology is part of the digital forensics. This method is keen on determining the integrity of every aspect of the system and its components. Intrusion detection is an aspect that is used in dealing with the aspects of threats and attacks on the system. The methodology may involve the use of firewalls to caution the system from threats. Its main advantage involves the ability to detect an intrusion and external threat. The threats and intrusion are usually blocked in advance and hence avoiding the negative security effects on the system. Information Security Management System (ISMS) is an area that deals with network and security. This method is also referred to as ISO 27001project. The methodologies are mainly comprised of policies concerned with information security management as well as related risks (Sutcliffe, 2013). ISMS mainly utilize the Plan-Do-Check-Act approach. The ISMS approach was utilized during the project for the purposes of ensuring that the most effective system is put in place at the café.

                  Selected methodology

                  The Plan-Do-Check-Act approach was used during the process in order to ensure that the entire project requirements are met. The Plan phases mainly involve assessing the information security risks in relation to the challenges that the client was faced with. A packet tracer design was also developed at this point was effective in dealing with the challenges faced by the client. All the necessary controls were also established at the plan phase. The second phase regarding the use of the methodology was the DO phase. This phase mainly involved the implementation of the designs as well as the operating controls. The check phase mainly involved evaluating the performance of the system in terms of its effectiveness and efficiency. This was in relation to the needs of the client and the whole system. The Act phase was the last and it mainly involved continuous assessment of the system and putting in place the required improvement measures. The following is a flow diagram for the selected methodology

                  Cost benefit analysis

                  The implementation of the project will require a total of Dhs 445, 506. However after the implementation, the cafe will be able to save Dhs 20,000 every month. The system will be fully secure and time of carrying out the transaction will be reduced by 40%. This will impact positively on improving the relationship with the customers.

                  Discussion

                  Network problems are common due to the increased threat security threats. The number of people using the networks is also on the increase which has led to problems with the server. Technological advancement is beneficial to the industry. However, continuous changes have to be made in order to ensure that the new technology is fully embraced. An organization may end up with challenges if it does not embrace the new technology. The network connectivity problems impacts negatively on the operations of an organization (Schwalbe, 2013). Read More

                  Tags
                  Cite this document
                  • APA
                  • MLA
                  • CHICAGO
                  (Aryam Internet Cafe and Facing Network Connection Case Study Example | Topics and Well Written Essays - 2250 words, n.d.)
                  Aryam Internet Cafe and Facing Network Connection Case Study Example | Topics and Well Written Essays - 2250 words. https://studentshare.org/information-technology/2094147-aryam-internet-cafe-and-facing-network-connection
                  (Aryam Internet Cafe and Facing Network Connection Case Study Example | Topics and Well Written Essays - 2250 Words)
                  Aryam Internet Cafe and Facing Network Connection Case Study Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/information-technology/2094147-aryam-internet-cafe-and-facing-network-connection.
                  “Aryam Internet Cafe and Facing Network Connection Case Study Example | Topics and Well Written Essays - 2250 Words”. https://studentshare.org/information-technology/2094147-aryam-internet-cafe-and-facing-network-connection.
                  • Cited: 0 times

                  CHECK THESE SAMPLES OF Aryam Internet Cafe and Facing Network Connection

                  Facebook and Friendster: A Comparative Study

                  If Facebook was a country, it will be bigger than the U.... .... next only to China and India.... It has more than 600 members and 75 percent of that log in daily to spend at least 75 minutes of their day.... hellip; On a daily basis, more than half a million photos are uploaded everyday and 12 million status updates are posted everyday....
                  25 Pages (6250 words) Research Paper

                  Digital Content Management: Evolution, Application and Impact

                  Digital content management is the buzzword in the modern society and is facing continuous innovation.... With the advancement in the digital content management system and increased access to the information through internet and intranet the protection of intellectual property rights gained importance and different organizations and regulations have been developed....
                  16 Pages (4000 words) Essay

                  Examples of Financial Crime

                  Financial crime reports to using 90% of their financial framework under a secure network.... hellip; The study indicates that most governments apply for financial crime programs on the internet to target civil societies.... Governments get supplies from western companies with technologies that enable them to run financial crime on the internet....
                  17 Pages (4250 words) Coursework

                  Information Engineering Analysis of Medical Center

                  The functionality of the new system is intended to ease access to booking services for the patients since it would be able to support a wide area network.... This paper ''Information Engineering Analysis of Medical Center'' tells that The development of the health care industry is greatly dependent on the introduction of technology to assist in managing the high number of patients....
                  73 Pages (18250 words) Essay

                  Nazi Foreign Policy Ambition

                  The author of the "Nazi Foreign Policy Ambition" paper examines the Aryan Nazi desire to be the world's dominant power in terms of acquiring territory beyond simply Russia and Europe.... No greater example of this is the Nazi's plans to ultimately invade the U.... .... nbsp;… During Hitler's reign, the Germans robbed art in all the newly occupied territories....
                  14 Pages (3500 words) Coursework

                  Matrimonial Websites and Young Muslims

                  arriage is one of the many struggles many young Muslims faced and still are facing in modern society today.... hellip; The internet, seen as the most modern technological advancement influenced the whole society along with matrimonial affairs.... In modern times, Muslims are increasingly turning away from this traditional method, favoring the internet to find their potential spouse (Hasso 2011).... utlineThis study shall firstly explore literature related discussions on marriage in Islam, Marriage in Pakistani culture, globalization, westernization and modernity, internet and online matrimonial sites....
                  27 Pages (6750 words) Research Paper

                  Cybersecurity and Mobile Devices

                  Hence, many nations around the globe are facing several challenges regarding the elimination of the cybersecurity threats and accordingly, have developed a number of tools to restrict their expansion.... Cyber-security concerns mostly arise in situations, wherein, a customer gets connected with the outer world with the help of mobile internet available on the smartphone as yet another important function.... n the present day context, cyber-crime is identified as an important security concern with the development of the internet and technology....
                  10 Pages (2500 words) Essay

                  Packet Tracer Design

                  The Packet tracer is a network simulation program that allows the designers to understand the network's different behaviours.... hellip; Penetration testing is one of the tests conducted to determine the vulnerabilities of the network.... It involved troubleshooting the network to determine the vulnerabilities that hackers may exploit.... Testing is an important process used to determine the network's ability to meet its goals and objectives....
                  16 Pages (4000 words) Term Paper
                  sponsored ads
                  We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
                  Contact Us