Blue Tag Data Security was formed to improve the network and security of Blackberry Hill Farm. The farm currently has no central network, limited data backup and collection, and no protection from cyber attacks. This makes communication inefficient and puts customer and supply data at risk. Blue Tag proposes implementing a wireless network with centralized hub, password protected terminals, cloud backup, firewalls and antivirus software, and network monitoring to address these issues. The improved network will provide secure access to data across the farm and guarantee security.
Final presentation system and operation management
1. Blue Tag Data Security
TEAM MEMBERS:
CAP DUY ANH: - 1228255
CHARLIE O’DOWD:- 1012554
LEKE JONATHAN FALAYE:- 1231503
MD.RAKIB HOSSAIN:- 1247475
2. CURRENT STATUS OF BLACKBERRY HILL FARM’S
NETWORK & SECURITY
• No Central Network System
• Limited Records of Supplies Ordered
• Limited Network for New Supply Order Requests
• No Backup of Data
• No Antivirus or Firewalls Around Data to Protect From Cyber Attacks
3. EFFECTS OF NETWORK & SECURITY ISSUES ON
BLACKBERRY HILL FARM
• Inconsistent Customer Volume Data Collection
• Data Not Readily Available for Access Across the Farm
• With No Network:
• Employees Communication Limited to Phone and Face to Face
• With No Backup:
• Data Could Become Corrupt
• With Limited Supply Records Tracking Increases and Decreases is more Difficult
• With a Limited Network for New Supply Order Requests Efficiency is lowered
9. WHY BLUE TAG DATA SECURITY ..!!!
• Will Provide a Simple to Use Network That Will Give Instant Access To Data
• Will Guarantee Security of All Data
• Low System Resources Consumption and Hardware Requirements
• Scalability
10. REFERENCE LIST
Angnitum, nd. Product presentation. [online]. Available at:
<https://www.google.co.uk/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CEYQFjAA&url=http%3A%2F%2Fw
ww.agnitum.com%2Fproducts%2FOutpostNetworkSecurity.pps&ei=oTMvU_idHKTt0gXr44CIBQ&usg=AFQjCNGfut8
CWvW94YnHGQyU6wPiF_2uIw&bvm=bv.62922401,d.d2k&cad=rja > [last access on 23rd March]
RCIS, 2013. Network Monitoring for
Security Checking [online]. Available at: <
https://www.google.co.uk/url?sa=t&rct=j&q=&esrc=s&source=
web&cd=4&cad=rja&uact=8&ved=0CFkQFjAD&url=http%3A%
2F%2Fcrest.cs.ucl.ac.uk%2Ffittest%2Fdownloads%2FRCIS20
13NetworkMonitoring.pptx&ei=oTMvU_idHKTt0gXr44CIBQ&us
g=AFQjCNFEWxMAQ3nnmwQja3nAHiyQQqavHw&bvm=bv.62
922401,d.d2k> last access on 23rd March]
Laudon. k., and Laudon. J., 2013. Essentials of Management information systems.Pearson Education Ltd.
Blackberry. Home. [online] available at :< http://www.blackberry-farm.co.uk/ > last access on 23rd March]
11. THANK YOU FOR LISTENING TO OUR
PRESENTATION
Any Questions?