Business analysis of a business proposal

GRABMYESSAY.COM OFFERS TO EVALUATE SAMPLES OF VARIOUS TYPES OF PAPERS
High School ・Business ・APA ・4 Sources

A-Statement of the problem

The non-availability of security in companies and factories create loopholes for exploitation by malicious software. Your system, confidential files should not left unprotected, if left unprotected, chances are that you will be susceptible, vulnerable to cyber-attacks, cyber theft from unfair competitors and information hackers.

B-Benefits:

  • Powerful security systems manned by trusted, competent and skilled computer programmers.
  • Daily system backups, to be accessed through our shared cloud drive.
  • Virtual security
  • Gate scanning, and the breaking down of every single file coming in and out.
  • Emergency kill-switch systems, in cases of critical situations by sophisticated attackers.
  • Maintenance agent, working round the clock.

C- Need

A good security system is needed to protect your valuable information and keep your manufacturing business safe from malicious software (ICANN, 2015; FCC, n.d.).

2. Plan

A- Objectives and Methods

Search Security represented by its Senior Information Security Officer, will supply the client with an advanced information security system through a four-step process: (1) the first phase will be the system analysis phase, then (2) the system design, then (3) installation phase, and finally, (4) the user training phase (Search Security, n.d.).

During the first phase, Search Security will analyze the client’s existing system in order to define the security problem, objectives, and the required resources such as personnel and costs. It will meet with the IT personnel of the client company to identify the needs and expectations of the system.

During the second phase, once the client’s needs and expectations have been understood, Search Security will define the elements of the proposed system, including the components, the security level, modules, system architecture, and specific interfaces and data that will be incorporated into the system.

In the third phase, Search Security will meet with both the management and the IT personnel of the client corporation to illustrate the design of the new security system. Upon approval, the new system will be configured and installed in the client’s system, ready to become running.

In the final phase, five end users will be trained on how to use and to get familiar with the new system.

B- Cost

The cost of system analysis and system design will be $1,000 and $20,000, respectively. The installation of the new system and training of end users for one week will be provided for free then if the client will request training of more users Search Security will charge $150 per session.

C- Expected Results

It is expected that the implementation of the new security system will enhance security and safety of vulnerable information and secure the system from malicious software.

3. Conclusion

A- Summary of Key Points

  • The client complained lack of its system being vulnerable to malicious software.

  • Search Security proposes an advanced security system that will secure the system from malicious software.

  • Installation of the new system will enhance security and safety of vulnerable information and secure the system from malicious software.

  • The cost of system analysis will be $1,000 while system design will cost $20,000.

  • IT staff will receive one-week free training while each additional session will cost $150.

B- Request for Action

The clients will present their requirements and assess the specifications for the proposed system then once the system satisfies the assessments, they will place a purchase order upon executive management’s approval. Then Search Security will develop and install the new system within 30 days of the official Purchase Request.

References

Federal Communications Commission (n.d.). Cyber Security Planning Guide. Retrieved from https://transition.fcc.gov/cyber/cyberplanner.pdf

Internet Corporation for Assigned Names and Numbers (ICANN) (August 10, 2015). Threats, Vulnerabilities and Exploits – oh my!

National Institute of Standards and Technology (2009). THE SYSTEM DEVELOPMEN T LIFE CYCLE (SDLC). Retrieved from http://csrc.nist.gov/publications/nistbul/april2009_system-development-life-cycle.pdf

Search Security(n.d.).Steps in the information security program life cycle. Retrieved from http://searchsecurity.techtarget.com/tip/Steps-in-the-information-security-program-life-cycle

Get a price
Academic level
Urgency
Pages *275 words
Total price

Prices that are easy on your wallet

Our experts are ready to do an excellent job starting at $14.99 per page

What Clients Say About Us
Our Customers Rated UsGreat
4.8
Out of 5 Based on 280 Reviews
I experienced difficult times trying to complete huge number of assignments to my university at the same time and you, guys, literally saved me. Everything was done in time and on the highest level! I really appreciate your help.
Edward,
Essay, History, 12 pages, 7 days, Master's
First time when I placed an order with you, I just lacked time to do all the homework and it was a lot going on in my family. But today I’m doing it sometimes just for fun – I really enjoy communicating with your Customer Support members and just letting myself being a bit lazy
Yuong Lo Mui,
Literature review, IT, 17 pages, 4 days, Master's
My GPA is 4.0 and I’ve always been doing everything myself, but there is a class which I was about to fail thus my GPA would decrease first time in so many years. I ordered few assignments to be completed with GrabMyEssay.com and you did a great job! Thanks to you I still remain one of the best students on campus.
Rosalinda,
Essay, Politics, 8 pages, 5 days, Junior
I am not used to such services and I usually write all the papers by myself. But this time I got in a very difficult situation and had to order my paper on this website. To my surprise it appeared to be quite good. Thank you, it is really nice service. Think I'll get back to you soon!
Jeremy,
Thesis, Management, 34 pages, 14 days, Master's
I am on my maternity leave now, so I spend a lot of time at home taking care of my little son. I’ve decided to get one more higher education degree while I’m spending so much time at home and applied for distance learning in one online college. But caring a baby takes even more time then I excepted so I’m the way too busy to write the complicated masters level research works, but GrabMyEssay.com is so-so-so cool! Thank you for that you exist! I don’t know what I would do without you all!
Karen,
Essay, Education, 15 pages, 8 days, Master's
I am studying and working at the same time and it is difficult to cope with university assignments as I am very tired after the work day. You service is a salvation for me as it helps to do everything on time. I am really happy about it. Wish you everything the best! Especially my lovely writer 109!
Desmond,
Coursework, Religion, 11 pages, 7 days, Master's

We at GrabMyEssay.com

work according to the General Data Protection Regulation (GDPR), which means you have the control over your personal data. All payment transactions go through a secure online payment system, thus your Billing information is not stored, saved or available to the Company in any way. Additionally, we guarantee confidentiality and anonymity all throughout your cooperation with our Company.

Try our service with 15% Discount for your first order!   Try our service with 15% Discount for your first order!   Try our service with 15% Discount for your first order!  

Order Now