Preview

Task 3

Powerful Essays
Open Document
Open Document
4254 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Task 3
Xemba Translations Expansion Project
Risk Assessment
Marissa Hornbuckle
July 24, 2014

Table of Contents
Risk Assessment Matrix – Addendum 3
Risk Assessment Matrix 3
Risk Metrics 6
Current Project Status 7
General 7
Current 8
Package 1 – Computer Inventory and requirements 8
Package 2 – Technical Support 8
Package 3 – Computing Support 8
Package 4 – Document Servers 8
Package 5 – Shared Drives 8
Package 6 – FTP Sites 8
Package 7 – Firewalls 8
Package 8 – Web-based meetings 9
Hours Report 9
Problem Analysis 10
Over hardware budget 10
Over labor budget 10
Backordered Computers 11
Additional Recommendations 11
Executive Summary 13

Risk Assessment Matrix – Addendum
Risk Assessment Matrix
Description of Risks
Impact
Likelihood of Occurrence (L,M,H)
Degree of Impact (L,M,H)
Initial Action to Take if Event Occurs
Team Member Responsible
Strategies for Prevention and Mitigation
Mobile device access to company network
Hacker access to company network via Bluetooth/wireless networks, open access to send/give company information
L
H
Complete a thorough analysis of the mobile device policies. Periodically examine mobile device usage and identify security risks/threat.

Valene/
Clemencia
Develop mobile device policies/procedure. Implement security safeguards based on policies/procedure documents. Make sure network is designed with mobile devices in mind.
Full system failure
A computer that has full system failure, not allowing the technical support team to reach the computer remotely to provide technical support.
This will cause a delay in project completion. It will take several days or weeks to reinstate an employee’s computer.
M
H
In the event of full system failure, the computer will have to be returned to the company so that the technical team can assess the cause of full system failure, make the necessary upgrade/replacements
Hugh
Indicators of IT assets need to be determined and taken into account for the life expectancy of the equipment being used by

You May Also Find These Documents Helpful

  • Satisfactory Essays

    There are good and bad things about doing business this way. Some of the pros are it is less time consuming, all of the users pictures, music, videos, and documents will be backed up, and the computer will end up getting fixed. Doing it this way is less time consuming and that is both good for the computer repair shop and for the customer. Having everything backed up and the computer getting fixed are probably the two most important things to the owner of the computer.…

    • 250 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Task 2

    • 1094 Words
    • 3 Pages

    Andy saw Bilal standing at a bus stop as he drove past. Andy immediately stopped his car and, in an aggressive manner, ran over to Bilal shouting racist abuse and accusing him (falsely) of being involved in the kidnapping of a child. Andy then punched Bilal, knocking him to the ground. Andy then hit Bilal repeatedly with a rubbish bin which Andy ripped from the bus stop. Bilal’s injuries included a fractured cheekbone and jaw, and severe cuts to his face from which he lost a lot of blood. Bilal needed major surgery to rebuild his face.…

    • 1094 Words
    • 3 Pages
    Good Essays
  • Good Essays

    We provide you with highly proficient technicians who can resolve all the issues related to computers. Our technicians have an excellence in reinstalling the operating systems, if your computer's hard disk failed.…

    • 536 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Filures Paper

    • 498 Words
    • 2 Pages

    Crash failures can halt the distributed system for some time. The most common cause of this type of fault is operating system failure. This type of fault can be isolated to individual "problem" systems and further developed to produce more fault tolerant systems. This type of fault is also seen in centralized systems. How many times has a user seen the blue screen of death on a windows based system?…

    • 498 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    diffusion of the BYOD (Bring Your Own Device) phenomenon. BYOD is the latest trend hitting businesses where employees are bringing their own personal mobile devices. Some of these devices include smartphones and tablets which are brought into their place of work, and used on the corporate network for purposes such as accessing files, email servers, and databases. Over the past few years, employees in many organizations are bringing their own personal devices to the work environment to handle business needs. With employees using their own devices, CIOs and IT departments across the nation are frantically trying to keep up with their employees by ensuring their networks are safe and secure. There is no doubting mobile devices have taking over a big part of our lives. These devices travel with us wherever we go while always being within a short reach away. People are beginning to realize the usefulness of getting work done from their own mobile devices. With this trend enterprises are in need of a policy for employees bringing their own devices to work. Although a relaxed BYOD policy can offer an organization many benefits, it tends to be a double edged sword. A lax policy leaves sensitive data vulnerable; an overly strict one stifles employees trust relationship with their employer. A balance must be struck between offering employees a pleasant and enjoyable work environment and maintaining the security of enterprise data. As the expectations of workspace personnel evolve, organization leaders must find ways to adapt and overcome the challenges that arise when corporate culture has a conflict with social standards and consumer trends. Management must consider the potential detriment to the workforce…

    • 3615 Words
    • 15 Pages
    Best Essays
  • Satisfactory Essays

    Flow Chart

    • 299 Words
    • 2 Pages

    If our systems are not working then our Remote host Dell will have to further trouble shoot and figure out why this happened.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Byod Security Risk

    • 1158 Words
    • 5 Pages

    The introduction of mobile devices in the workplace has been on the rise and there is no denying that these devices are transforming how companies do business. This has introduced the BYOD or Bring Your Own Device model in the workplace and its becoming more popular every day. BYOD is a policy that accepts employees bringing personally owned mobile devices to their workplace and using them to access company data such as email, file servers and databases as well as their personal applications and data. But as data transmissions increase with these devices so does the chances of them being hacked and the burden of successfully managing the mobile devices is laid upon the IT departments. One of the real underlying issue with BYOD and mobile security is the that people in IT, compliance and internal audit aren't willing to stick their necks out and try to enforce their mobile security policies or enforce an effective Enterprise Mobility Management solution.…

    • 1158 Words
    • 5 Pages
    Good Essays
  • Better Essays

    service. If there is hardware failure on a game console it has to be sent to the company…

    • 960 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    * Problem understood to be “antiquated IT hardware and software, no internal IT support, and high turnover among office personnel”.…

    • 809 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The steps that I would have taken to control the risk in this project would have to first implement a method in which worker’s feedback and bug reports for the mobile devices could be recorded and analyzed later. Also, I would have tried to increase communication amongst field workers, the device vendors, and the bureau.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Background and Business Driver: Bring-Your-Own-Device (BYOD) policy iss quite well known to all as this allows employees to bring in personalized devices like smart phones, tablet, even laptops to their workplace to access secure company information and applications. BYOD was successful as it resulted many advantages like increase in productivity, increased…

    • 1273 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    A significant part of this aspect of the business is ensuring that all IT equipment is running effectively and correctly at all times. Whether this means that communication devices such as phones and tablets are functioning optimally, or whether more complex computers are running without a hitch, having equipment that works well all of…

    • 783 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    According to the article “Bring Your Own Risk in BYOD,” the author points out the MDM solutions as well as lessons learned on BYOD implementation. The lessons learned in this article emphasized the security that should be put in place or the measures that organizations need to take in order to operate in a safe and positive environment with BYOD. The Mobile Device Management (MDM) solution, which is part of the Enterprise Mobility Management (EMM), employs solutions to manage risks which allow employees to use their mobile devices to access organizations’ services and data.…

    • 934 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Assignment 2

    • 1685 Words
    • 4 Pages

    Mobile enterprise is when a corporation or large organization that supports critical business functions and use of business applications via wireless mobile devices. Some of the mobile enterprise functions include manage projects, access to e-mail and online chat, provide information about customer relationship management (CRM) and enterprise resource planning (ERP). The reason why many organizations are becoming mobile enterprise nowadays is mainly because the mobile technologies in the workplace provides advanced services and solutions for wireless operators across the world. From the employees’ perspective, mobile enterprises allow them to accessed and updated databases from anywhere in the world at any time with any mobile devices which linked with a web browser and by anyone with permission to access to such services. From the employers’ perspective, mobile enterprise increased workers’ productivity, which includes increasing revenue and margin and work output, it also provide a better and more comprehensive customer experience. Although not every organization can gain benefits from mobile enterprises, some of the major mobile enterprises issues can still affect many organizations, for example, security issues. Therefore it is important to know what are the advantages and disadvantages for organizations wishing to become mobile enterprises. This essay will outline some of the advantages and disadvantages for mobile enterprises, and explain how this can affect both the perspectives of the employers and employees.…

    • 1685 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Bring your own device

    • 3020 Words
    • 13 Pages

    Organizations that do not have IT oversight managing its employees’ mobile devices unintentionally consent to making their assets vulnerable to attack from uninformed user behaviors like improper configuration and risky wireless connections (Search Consumerization). With the mobile market’s flux state adding new emerging technologies rapidly, companies have had to adjust from having their networks only accommodate few devices. Initially, laptops accessed the network through limited VPN concentrators and desktops provided access points for PDAs through synchronization. With new technologies, single devices now may encase several forms of connections: Ethernet, WiFi, Bluetooth, and 3G. Networks now accommodate off-site users through a myriad of application portals and on-site users connected through Wi-Fi accessibility and Bluetooth-enabled desktops. Each connection form provides a unique opportunity for attack. Under BYOD policies, corporations must institute a comprehensive mobile inventory that they manage device discovery. New technological circumstances create scenarios that single devices utilize several connections and individual employees possess many devices of which they may utilize concurrently.…

    • 3020 Words
    • 13 Pages
    Powerful Essays