STP Limited: Enhancing Networking Architecture And Communication Framework

Company overview

STP Limited is an Australian manufacturer of cabinets and these cabinets are made in a factory that is owned by the company. The headquarters of the company are located in Wollongong and there are three other office locations as well in Sydney, Bathurst and Lithgow. The most recent out of all is the office that is located in Sydney and there are computerized mechanisms in place in this office for the manufacturing of cupboard and drawer fronts. Some clients have the capability to install these fronts on their own while other needs them to be installed by the company representatives. It is being considered to make use of vans for the purpose of installation which may be owned by the company or another franchise. With the current office arrangements and infrastructure, the recent expansion of the office and business activities can no longer be managed correctly. There are many changes that are being done in the organization in terms of the implementation of the website, updates in the information system, new customer management and accounting system along with improved stock control system. There are distributed databases that are used in STP Limited. The organization is now looking to work upon the improvement in its networking and communication channel.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The company is working on the initiatives to enhance its network architecture and the communication framework that is followed. There are a number of tools and new techniques that are already in place in terms of the networking architecture of the company. There are a lot many tools, gadgets and equipment that are being used and are present in the company in all of its office locations. All the four office locations are connected and equipped with the Internet through the ADSL connection. The company has also implemented the Bring Your Own Devices (BYOD) strategy and scheme in the organization which provides the permission to the employees to carry and use their personally owned devices for the fulfillment and execution of the organizational activities.

Communication is the key to the success of the projects and the organizations. It is necessary for STP Limited to ensure that the internal and external stakeholders associated with the company are offered updated details and enhanced information sharing at any hour of the day. With the advancements that will be done in regards to the communication framework, there will be a number of advantages that will be offered to the company. These benefits will be in the form of enhanced information sharing and streamlining of the process of information management. The customers always look for the organizations that may provide them with the details on services being provided at a non-stop basis and the ones that are readily available for the resolution of the queries.

Initiatives to enhance network architecture and communication framework

The scope of the project that will be implemented for STP Limited will include the activities and phases that will assist the deployment of the advanced networking and communication channel.

The requirements that are associated with the networks and communication systems shall be analyzed so that the upgrades and modifications that need to be done are highlighted. The planning shall then be carried out in terms of the networking design and architecture and the changes to be developed. The network integration and compatibility checks, implementation and testing will come under the scope of the project.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
  • Advanced and assured integration of the four locations and all of the warehouses of the company as a single unit in terms of the execution of operations and information management.
  • Setting up of the security of the networks and communication mediums that are designed to make sure that the information and communication channels are secured and protected.
  • Improvement in the quality and cohesiveness of the services that are provided to the customers.
  • Increase in the levels of the customer satisfaction and customer engagement with the company.

Parameter/Attribute

Details & Description

Strategies and Decisions

· STP Limited is a company that is making a lot many changes in its current architecture and infrastructure so that the quality of the services that are provided to the customers improve. The primary goal of the company is to improve the customer services and the business operations that are carried out in the organization. The project will serve the same purpose as it will ensure that the network architecture is enhanced which will lead to the improvement of the communication mechanisms and networking mediums.

· Many of the activities that will be performed under the domain and scope of the project will make sure that the organizational objectives and goals are met without disturbing the productivity and continuity of the business operations.

· There are security protocols and mechanisms that are involved in the project which will make sure that all of the information sets are protected and the privacy is maintained.  

Technical Potential of the Solution

· There are many networking protocols, devices, gadgets and equipment that will be launched to be used in the four office locations of STP Limited. These components will be based on the latest security and technical aspects and there will not be any issues around compatibility of these components with other tools.

· The project will be feasible from the technical point of view as it would be compatible with the rest of the tools and there will be enhanced integration that will be involved.  

Competitive Gains

· The organizations and firms that are ahead of their competitors in terms of the use of technology gain an edge in the market and among the customers. The same will happen in the case of STP Limited with the use and implementation of latest networking practices.

· The quality and the performance of the business operations and activities will improve. This will lead to the better operational continuity along with the better satisfaction of the customers.   

Service Level

· The management resources and the senior leadership that is associated with STP Limited will decide upon the approach and methodology that shall be used in the project. It will ensure that the project goals and the service excellence are achieved.

· The resources that will be used in the project will be allocated as per their skills and knowledge. An analysis of their skill sets will be done which would make sure that the project tasks are successfully completed.

There are many risks and security attacks that may take place in association with the networks. This has led to the development of a discipline called Network Security. This has become one of the integral parts of the organizations so that the security of the organizational networks can be ensured. With the use of different types of networks along with the increase in the number of networks involved, the likelihood of the network attacks has also increased.

There are many activities that are carried out in STP Limited. This has led to the setting up of different teams and departments. There is also the presence of local IT support and services department for the reporting and resolution of the IT related incidents. The management must analyze and make sure that there are enough resources present in this department for the easy and smooth execution of the services. There are technologies that have been developed that shall be used for remotely managing the support and maintenance tasks. Enhanced form of control and monitoring shall be carried out by network administrators and managers along with the security team to keep a track of all the technical and operational issues for their avoidance and prevention.

With the increase in the frequency of the security risks and attacks, there are many different protocols that have been developed and implemented in the company. The use of web and cloud computing is also necessary in the current times. To avoid the associated risks, the company makes use of secure HTTP, Server Socket Layer (SSL) and many other protocols for the security of the network and transport layers.

The offices of STP Limited are located and have been set up in four different locations. It is important to ensure that the security of the offices and the information sets that are associated with each office are maintained and protected. Due to this reason, an integrated networking scheme is required to be implemented so that the network security and the tracking of network activities become easier and easy to implement.

Scope and requirements of the project

Secure routing is also one of the prime necessities of the networks and networking operations that are carried out in the organization. With the aid of this practice, the data packets that will be transferred from one location to the other will be done securely and with enhanced for of protection as well. This will also eliminate nay necessity to install the security tools and gadgets separately for all the four locations.  

The types of the network security attacks are not constant. There are newer forms of network security attacks and risks that are being created and launched by the attackers. Also, there are many changes that are being done in the form of the existing security attacks. Due to the changing form of the threats that are involved, it is very essential to ensure that the controls that are implemented are not static. Currently, the controls that are being used are signature based in nature. These controls do not have the potential to manage and track the threats that are not known in advance.

It is, therefore, required that the controls are developed and implemented in such a manner that they are reactive in nature. These controls shall have the ability to handle the dynamic nature of the threats and shall be ad-hoc so that the changes in terms of the type of the threats are handled carefully and correctly.

STP Limited has its branch office that is located in Wollongong. There are many security controls and threats that are associated with the branch office and there are security controls that shall be implemented in the branch office as listed below.

  • Virtual Private Networks (VPNs) shall be used in case of the branch office. This will improve the end to end connectivity and security of the branch office and all the entities connected with the branch office. The security of the overall office and the business activities will be improved with the aid of the VPN connections.  
  • The use of internet connection is a necessity in every sector and organization. The same is the case with STP Limited. The security of these connections shall be improved and enhanced with the aid of the security tools and protocols at the internet layer.
  • The set of the services that are associated with the company can be divided in different types, such as, internal activities, core services and external activities. All of the core services are carried out in the branch office. The security of these services shall be improved by making use of logical and administrative controls.
  • It is necessary to make sure that all the information sets that are present in the application are secure and the reliability of the operations is also ensured. 
  • Virtual Private Networks shall be used in case of the branch office. This will improve the end to end connectivity and security of the branch office and all the entities connected with the branch office. The security of the overall office and the business activities will be improved with the aid of the VPN connections.
  • Encryption is one of the most important and necessary aspects that are involved and associated with the information and data sets. There are many encryption algorithms that are present which shall be used in case of STP Limited. Some of these encryption protocols include advanced encryption and triple DES.
  • Firewalls are being used since a long period of time. These are the data security controls which are normally installed at the network layer to verify the authenticity of the traffic and to grant permission only to the traffic that is passed on these authentication checks. However, the installation of the firewalls only at the network layer is not sufficient from the security point of view. It is required to install firewalls in other layers as well so that the overall security and access control can be implemented. There are many vendors that have created and launched their advanced firewalls in the market. These shall be analyzed and used by STP Limited to make sure that the network security along with data security is maintained.
  • The use of firewalls is a basic step and mechanism for the maintenance of security in the organization. There are many forms of risks and attacks that have been created by the attackers which cannot be controlled with the use and implementation of firewalls. It is therefore required to make sure that the advanced access control is used and implemented with the use of latest network security tools and protocols. Many of the data related security controls are also present and have been implemented so that the security of the information sets is maintained.
  • Filtering as the name suggests is a security control which is done with a view to filter the traffic on the basis of clean and suspicious traffic. There is URL and web based filtering techniques that have been developed for making sure that the unwanted and suspicious traffic is avoided. There are many Business Intelligence tools that have also been set up for the same purpose which can be used for the enhancement of the security of the data sets and the networking mediums.
  • The information and data sets that are associated with STP Limited shall be divided and classified in different categories. These categories shall include the division of the information as per the type of the information which may include internal data, security logs, sensitive information, confidential details and likewise. The data security protocols that are developed shall be done according to these information categories only.  

Mobile devices are being increasingly used in the business units for the execution and accomplishment of the business tasks and activities. The use of these devices cannot be ruled out any longer since they serve many of the business necessities and operations. However, with the use of the mobile devices, there are many security risks and attacks that take place in terms of the loss of device, breaching of information that is present in these devices, unauthorized access to the device, denial of service and malware attacks and many more.

It is necessary to follow certain steps and procedures for maintaining and assuring the safety of the mobile devices and platforms.

  • Fingerprinting: This is a technique in which a complete review and analysis of the mobile device is carried out. In this process, the information on the mobile device type, the security status of the device, browser and applications being used in the device, device version and its security scenario and many more information are gathered. This information is then analyzed from the point of view of the security of the organization or the party in which the device will be used.
  • Network Access Controls: There are many automated tools and applications that have been developed which may be used for controlling the access to the networks that are connected with the mobile devices that are connected with STP Limited. These controls and measures include the use of network based intrusion detection systems that are equipped with data analytics tools to study the patterns being followed by the intruders. There are also anti-denial tools and anti-malware tools that are used which can be used for controlling the access of the networks and the traffic associated with the same.
  • Authentication: Many new forms of authentication and associated protocols for the enhancement of security shall be used in case of STP Limited. These authentication measures shall include the use of multi-fold authentication systems and schemes.  

There are many hardware and tools that will be required for the execution of the services and networking operations in association with STP Limited.

  • Computer Systems: Computer systems will be required for the occurrence and execution of many of the project activities. These activities will include integration of the networks and the design of their architecture, development of the networks and the design of the security tools and protocols will also be done by making use of these computer systems.
  • Servers: Many servers will be essential for the connectivity and execution of the development methods and processes. These servers will include web and database servers along with networking and communication mediums.   
  • Peripheral Equipment: A number of external components and peripherals will be necessary for the establishment of the network connections along with the communication tools and protocols. These peripherals will include networking equipment and tools, such as, routers, bridges, hubs, gateways, network interface cards, modems and switches.   
  • Simulators and Emulators: The testing of the networks that will be developed will not be possible to be carried out on the different gadgets and mobile devices. It will be necessary to have a virtual medium to experience the environment of such devices and to test the network and communication mediums on the same. These tools will be of great aid for the execution of such tasks and activities.   
  • Diagnostic Equipment: Troubleshooting will be necessary to understand the functioning of the networking and communication operations. These equipment and tools will be used for the same purpose.   
  • Communication Devices: Tele-communication is one of the most significant operations that will be performed by the networking and communication channels that will be developed. There are devices that have been set up for this purpose which include the tele-communication devices and mediums.

Parameter/Attribute Details & Description; Strategies and Decisions; Technical Potential of the Solution; Competitive Gains; Service Level

The use of mobile and computing devices cannot be ruled out any longer since they serve many of the business necessities and operations. However, with the use of the mobile devices, there are many security risks and attacks that take place in terms of the loss of device, breaching of information that is present in these devices, unauthorized access to the device, denial of service and malware attacks and many more. There are many risks and security attacks that may take place in association with the networks. This has led to the development of a discipline called Network Security. This has become one of the integral parts of the organizations so that the security of the organizational networks can be ensured. With the use of different types of networks along with the increase in the number of networks involved, the likelihood of the network attacks has also increased.

All of these risks can have a negative impact on the continuity of the business tasks and operations. There are measures that need to be taken to make sure that the risks are avoided and the continuity of the business activities are maintained. 

  • Disaster recovery plan must be developed for STP Limited. This plan shall be created after analyzing and identifying all the possible risk areas and the occurrences of the security attacks that may take place in these areas. The plan must focus upon the measures that shall be adopted for minimizing the damage and to minimize the downtime of the services that will be impacted in case of a security risk or an attack.
  • Backup of the data sets is also extremely essential to make sure that the security risks and attacks are avoided. The data backups must be taken by setting up the schedule as automatic. The data will be captured and will be stored in the repositories. This will ensure that any of the security incident and attack on the data sets does not impact the availability of the data for the company.
  • The management must also carry out reviews and monitoring methods for the security and maintenance of the data protection. These shall include conduction of reviews, inspections and walkthroughs.

There are many components and entities that are involved with STP Limited, such as mobile device, technical systems and tools, network connections, databases and many more. The use of the devices cannot be ruled out any longer since they serve many of the business necessities and operations. However, with the use of the mobile devices, there are many security risks and attacks that take place in terms of the loss of device, breaching of information that is present in these devices, unauthorized access to the device, denial of service and malware attacks and many more. There are many risks and security attacks that may take place in association with the networks. This has led to the development of a discipline called Network Security. This has become one of the integral parts of the organizations so that the security of the organizational networks can be ensured. With the use of different types of networks along with the increase in the number of networks involved, the likelihood of the network attacks has also increased.

These risks need to be managed by a suitable strategy.

All the security risks and other forms of risks associated with STP Limited shall be analyzed by making use of the data sources and the information gathered from these sources. The identified risks shall be listed down.

Network security

Every risk will have a resource that will be have the prime responsibility for the handling of the risk. The list of the identified risks shall be mapped with these stakeholders and responsible resources. 

The following risk register has been prepared after analyzing the risks that may take place in STP Limited in association with the project and the suitable response that may be provided. There are other factors such as description, probability and impact that are also included in the table.

Risk

Description

Probability

Impact

Response Strategy

Technical Faults

There may be failure of the network ing equipment and gadgets or the other technical tools being used in the company.

The probability with this risk in association with STP Limited is medium.

The impact of this risk in association with STP Limited will be medium.

The risk needs to be handled and managed by using and implementing a suitable risk response strategy. The strategy and method that shall be applied in case of this risk shall be risk transfer.

Compatibility Issues

There may be issues with the compatibility of the technical or networking tools with each other or the other components used in the company.

The probability with this risk in association with STP Limited is low.

The impact of this risk in association with STP Limited will be high.

The risk needs to be handled and managed by using and implementing a suitable risk response strategy. The strategy and method that shall be applied in case of this risk shall be risk avoidance.

Operational Errors

The resources may bring up the operational mistakes and errors that can have a significant impact.

The probability with this risk in association with STP Limited is high.

The impact of this risk in association with STP Limited will be medium.

The risk needs to be handled and managed by using and implementing a suitable risk response strategy. The strategy and method that shall be applied in case of this risk shall be risk mitigation.

Estimation Risks

There may be risks such as schedule overrun or overrun of the budget that may come up due to incorrect estimations.

The probability with this risk in association with STP Limited is medium.

The impact of this risk in association with STP Limited will be high.

The risk needs to be handled and managed by using and implementing a suitable risk response strategy. The strategy and method that shall be applied in case of this risk shall be risk avoidance.

Quality Risks

The quality parameters and standards may not be adhered by the resources.

The probability with this risk in association with STP Limited is low.

The impact of this risk in association with STP Limited will be high.

The risk needs to be handled and managed by using and implementing a suitable risk response strategy. The strategy and method that shall be applied in case of this risk shall be risk avoidance.

Security Attacks on the information sets

There may be risks and attacks that may be attempted by the malevolent entities on the information sets and data sets.

The probability with this risk in association with STP Limited is high.

The impact of this risk in association with STP Limited will be high.

The risk needs to be handled and managed by using and implementing a suitable risk response strategy. The strategy and method that shall be applied in case of this risk shall be risk avoidance and mitigation.

Network security attacks

There may be risks and attacks that may be attempted by the malevolent entities on the networks and connections.

The probability with this risk in association with STP Limited is high.

The impact of this risk in association with STP Limited will be high.

The risk needs to be handled and managed by using and implementing a suitable risk response strategy. The strategy and method that shall be applied in case of this risk shall be risk avoidance and mitigation.

Ethical & Legal Risks

The ethical parameters and standards may not be adhered by the resources. These may also lead to the legal punishments and obligations.

The probability with this risk in association with STP Limited is low.

The impact of this risk in association with STP Limited will be high.

The risk needs to be handled and managed by using and implementing a suitable risk response strategy. The strategy and method that shall be applied in case of this risk shall be risk avoidance.

Every risk has been mapped with a suitable strategy that may be applied in case of the risk as per the nature and type of the risk. The table shall show the risk management and security teams with this information so that risks can be handled and managed correctly. 

There are various treatment methods and mechanisms that may be followed in the case of the risks that identified and assessed. Some of these methods include risk transfer, risk avoidance, risk acceptance and mitigation of the risks. These treatment methods shall be identified and applied to every risk. 

The treatment methods shall be applied and the status of the treatment shall be tracked and monitored by the security managers and the senior leadership of STP Limited. The progress shall be reviewed and there shall be use of review tools and controls for this purpose.  

Conclusions

STP Limited is an Australian manufacturer of cabinets and these cabinets are made in a factory that is owned by the company. The headquarters of the company are located in Wollongong and there are three other office locations as well in Sydney, Bathurst and Lithgow. With the current office arrangements and infrastructure, the recent expansion of the office and business activities can no longer be managed correctly. There are many changes that are being done in the organization in terms of the implementation of the website, updates in the information system, new customer management and accounting system along with improved stock control system. The company is working on the initiatives to enhance its network architecture and the communication framework that is followed. There are a number of tools and new techniques that are already in place in terms of the networking architecture of the company. There are a lot many tools, gadgets and equipment that are being used and are present in the company in all of its office locations. Communication is the key to the success of the projects and the organizations. It is necessary for STP Limited to ensure that the internal and external stakeholders associated with the company are offered updated details and enhanced information sharing at any hour of the day. The requirements that are associated with the networks and communication systems shall be analyzed so that the upgrades and modifications that need to be done are highlighted. The planning shall then be carried out in terms of the networking design and architecture and the changes to be developed. The network integration and compatibility checks, implementation and testing will come under the scope of the project. STP Limited has its branch office that is located in Wollongong. There are many security controls and threats that are associated with the branch office and there are security controls that shall be implemented in the branch office and other three offices as well.

Network Security

  • Validation and verification of the network security controls must be done on a regular basis.
  • The network activities and the logs associated with them must be reviewed and analyzed.
  • The application usage must also be tracked continuously.

Infrastructure integration:

  • A strong and successful integration must be set up for enhanced infrastructure.
  • The components that are either obsolete or are not applicable to the organization must be discarded.
  • The activities carried out by the resources must also be tracked and maintained regularly.

Company’s Mobile Population

  • The information on the mobile devices that are being used by the entities in the organization must be reviewed and prepared.
  • The employees that are spread over different locations shall also be analyzed and a list must be prepared for the same.

WLAN Evaluation

  • The number of connection shall be analyzed and reviewed.
  • The support and maintenance work that is necessary for every connection must also be understood.
  • The evaluation of the security procedures and policies in association with these connections shall be evaluated.

References

Alabady, S, “Design and Implementation of a Network Security Model for Cooperative Network..”. in , , 2009, <https://www.iajet.org/iajet_files/vol.1/no.2/Design%20and%20Implementation%20of%20a%20Network%20Security%20Model%20for%20Cooperative%20Network.pdf> [accessed 11 October 2017].

Berg, H, “Risk Management: Procedures, Methods and Experiences.”. in , , 2010, <https://ww.gnedenko-forum.org/Journal/2010/022010/RTA_2_2010-09.pdf> [accessed 11 October 2017].

Canavan, J, “Fundamentals of Network Security.”. in , , 2001, <https://whc.es/Network/Fundamentals%20of%20Network%20Security.pdf.1.pdf> [accessed 11 October 2017].

Chi, T, “Alignment between business environment characteristics, competitive priorities, supply chain structures, and firm business performance.”. in Strategic Direction, 26, 2010.

Cisco, “Wireless and Network Security Integration Solution Overview.”. in , , 2008, <https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mobility/secwlandg20/sec_wireless_overview.pdf> [accessed 11 October 2017].

Crane, L, “Introduction to Risk Management.”. in , , 2013, <https://extensionrme.org/pubs/IntroductionToRiskManagement.pdf> [accessed 11 October 2017].

Dcu, “Introduction to Risk Management.”. in , , 2015, <https://www.dcu.ie/sites/default/files/ocoo/pdfs/Risk%20Mgt%20Training%20Slides.pdf> [accessed 11 October 2017].

Debono, R, “Project Risk Management.”. in , , 2016, <https://www.isaca.org/chapters11/Malta/Documents/Events/210416%20-%20Mark_Debono%20-%20Understanding_Risk_in_the_Field_of_Project_Management.pdf> [accessed 11 October 2017].

Gomes, C, & M Yasin, “Toward promoting effective strategic performance: the relevance of the alignment of performance measurement and competitive strategic choices.”. in International Journal of Business Excellence, 12, 2017, 329.

Joshi, M, & R Karkade, “Network Security with Cryptography.”. in , , 2015, <https://www.ijcsmc.com/docs/papers/January2015/V4I1201544.pdf> [accessed 11 October 2017].

Pareek, R, “Network Security: An Approach towards Secure Computing.”. in , , 2011, <https://www.rroij.com/open-access/network-security-an-approach-towards-secure-computing-160-163.pdf> [accessed 11 October 2017].

Sampangi, R, “A Security Suite for Wireless Body Area Networks.”. in International Journal of Network Security & Its Applications, 4, 2012, 97-116.

Soriano, M, “Information and Network Security.”. in , , 2011, <https://improvet.cvut.cz/project/download/C2EN/Information_and_network_security.pdf> [accessed 11 October 2017].

Souppaya, M, “Guidelines for Managing the Security of Mobile Devices in the Enterprise.”. in , , 2013, <https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r1.pdf> [accessed 11 October 2017].

Strebe, M, “Network Security Foundations.”. in , , 2004, <https://imcs.dvfu.ru/lib.int/docs/Networks/Security/Network%20Security%20Foundations.pdf> [accessed 11 October 2017].

Sujithra, M, & G Padmavathi, “Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism.”. in , , 2012, <https://dl.icdst.org/pdfs/files/35dc646a4630971fd27c6b2d32661555.pdf> [accessed 11 October 2017].