Upgrades Using Project Management Techniques Essay

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Introduction

First of all, it is necessary to mention that network security is regarded to be a rather complicated issue, which can be originally managed and controlled only by experienced IT specialists. Still, with the increase of internet mobility and accessibility, and with the essential increase of wired and wireless communication users, people are obliged to know at least the basics of network security. Despite the fact, that the main actions, aimed at improving the security level, will be performed by the system administrator of the PC network, all the users are obliged to do everything possible to prevent virus or hacking attacks, as well as information and data leakage.

Security Improvement

To begin with, it should be stated that the concepts of network security and information security are similar, and they are often used interchangeably. Still, there is a difference in approaches: network security is the defense from the outside attacks (e.g. black hat hackers, script kiddies, etc.), and information security presupposes the inward defense (negligence of users, data loss, mistakes made by users, etc). Dean (2005) in her guide states the following: “One response to this insider threat in network security is to compartmentalize large networks so that an employee would have to cross an internal boundary and be authenticated when they try to access privileged information. Information security is explicitly concerned with all aspects of protecting information resources, including network security and DLP.

Taking into account, that the upgrade of security system is the project, that should be properly managed, it is necessary to emphasize, that the actions that should be performed for upgrading the security level of the IT network should be the following:

  • A strong firewall and proxy should be adjusted for keeping unwanted people out.
  • A strong Antivirus software package and Internet Security Software package are the most important part of the security mechanism.
  • All the users (employees) should use strong passwords and change them regularly.
  • If a wireless connection is used, there is a strong necessity to use a complicated password.
  • Physical security actions should be undertaken to restrict access to the material part of the IT network.
  • Prepare a network analyzer or network monitor and use it when needed.
  • Implement physical security management like closed-circuit television for entry areas and restricted zones.
  • Security fencing to mark the company’s perimeter.
  • Fire extinguishers for fire-sensitive areas like server rooms and security rooms.
  • Security guards can help to maximize security (Flynn & Kahn, 2003).

From this point of view, it should be stated that project management techniques would be rather helpful for incorporating this project. Originally, the enlisted actions and recommendations will be helpful only if they are properly planned, and the whole personnel of the company take it seriously, putting aside any representation of negligence.

Conclusion

Finally, it is necessary to mention that project management of security improvement techniques should be divided into two parts: network security and information security. All the actions, directed towards granting security should not touch the working process of the personnel, still, their interests should be completely ignored, as confidential information is much more expensive.

References

  1. Dean, T. (2005) “Network+ Guide to Networks” Course Technology publishing
  2. Flynn, N., & Kahn, R. (2003). E-Mail Rules: A Business Guide to Managing Policies, Security, and Legal Issues for E-Mail and Digital Communications. New York: AMACOM
More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, March 11). Upgrades Using Project Management Techniques. https://ivypanda.com/essays/upgrades-using-project-management-techniques/

Work Cited

"Upgrades Using Project Management Techniques." IvyPanda, 11 Mar. 2022, ivypanda.com/essays/upgrades-using-project-management-techniques/.

References

IvyPanda. (2022) 'Upgrades Using Project Management Techniques'. 11 March.

References

IvyPanda. 2022. "Upgrades Using Project Management Techniques." March 11, 2022. https://ivypanda.com/essays/upgrades-using-project-management-techniques/.

1. IvyPanda. "Upgrades Using Project Management Techniques." March 11, 2022. https://ivypanda.com/essays/upgrades-using-project-management-techniques/.


Bibliography


IvyPanda. "Upgrades Using Project Management Techniques." March 11, 2022. https://ivypanda.com/essays/upgrades-using-project-management-techniques/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1