SlideShare a Scribd company logo
1 of 5
Download to read offline
[PROJECT CHARTER]
EXECUTIVE SUMMARY
This project is mainly focused on that what
infrastructure is suitable for a business and why every organization has different
requirements in this project we recommend some new and required technology
which help to make an Enterprise state of the Art and must identify the security
essentials of an enterprise which helps to protect data from manipulation and
alteration. The project will integrate improved technology solutions with our
current platform in order to establish a more robust security infrastructure.
Page | 1
[PROJECT CHARTER]
PROJECT PURPOSE/JUSTIFICATION
This project is helps to identify the need of
hardware that what actually is the client requirement and also identifies security
vulnerabilities which are usually done by a Network Administrator to give a lead
to an intruders, Attacker or hackers so that they can enter in Domain and
manipulate the Data.
Business Need/Case
The need of new infrastructure is
organizational need and technology advancement as well as social and
economical requirement. This new technology implementation may help in cost
saving, process improvement and new product development.
2
[PROJECT CHARTER]
Business Objectives
The business objectives for this project are
in direct support of our corporate strategic plan to improve IT security and reduce
costs associated with loss and waste.
- Designing a new IT Infrastructure for more fast and reliable
network.
- Highlights main threats and defining proactive strategy for Risk
Management
- Implementation of new IT security policy which may be more
helpful in secure data
- Reduce the amount of damages by 50% in the first year
PROJECT DESCRIPTION
This project Information Technology
Infrastructure and IT security essential is mainly focused on that what
infrastructure is suitable for a business and why every organization has different
requirements also describes why consulting and system Integration services for
this consulting we take a real time example of a joint venture between Siemens
and Accenture. We also recommend some new technologies for the state of the
Art Infrastructure as well as the best solution which can provide finest service to
an Enterprise. Project also defined the security threats, Service Level of
Agreements, managerial issues, the internal and external resources of an
Enterprise, Total Cost of Ownership, as well as the most important factor Risk
Page | 3
[PROJECT CHARTER]
management. We also recommend some IT security solution which can help to
protect data from stealing, altering and modification.
All hardware and software will be integrated
into the company’s current IT platforms in order to establish increased security
while allowing all systems and processes to continue without interruption.
Assumptions
The project team must assume that the all
parties (stakeholders, project sponsor and all departments) in this project equally
support and collaborate to complete the project. Following are the list of
assumptions.
 The purpose of this project will be communicated throughout the company
prior deployment.
 The IT manager will provide additional resources if necessary
 The project must be fully supported by all parties.
Project Deliverables
The following deliverables must be the
successful completion of the project. Any changes to these deliverables must be
approved by the project sponsor.
 Fully deployed effective and efficient infrastructure
 Must identify the Risk management and also competitive advantages.
 Fully deployed intranet security solution.
4
[PROJECT CHARTER]
Abstract
Previous decades have shown a dramatic
increase in the use of information technology in business, education, government,
and elsewhere to assist in executing enterprise processes and accomplishing
institutional objectives. It is likely that this trend will continue as the use of
information technology spreads throughout the enterprise.
I.T security deals with the managerial
procedures and technological safeguards applied to computer hardware, software,
and data to ensure against accidental or deliberate unauthorized access to
computer system data. Therefore it is possible to establish some form of
operational security, which allows the management of a computer installation to
exercise control and be accountable for the installation. Guidelines and
procedures may be established for accountability, for levels of control, and for
system configuration. Preventive measures against internal and external threats
can be developed through risk analysis, assessment, and insurance investigation.
Physical security must prevent loss due to
natural disasters, tampering, and malicious entry and destruction. User
identification and authentication must protect both hardware and software.
Page | 5

More Related Content

What's hot

Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
William Godwin
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
Tony Hauxwell
 
Network security policies
Network security policiesNetwork security policies
Network security policies
Usman Mukhtar
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
Siddharth Janakiram
 

What's hot (20)

Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 
Developing an Information Security Roadmap
Developing an Information Security RoadmapDeveloping an Information Security Roadmap
Developing an Information Security Roadmap
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
A framework for an organization to use in determining if it needs a ciso
A framework for an organization to use in determining if it needs a cisoA framework for an organization to use in determining if it needs a ciso
A framework for an organization to use in determining if it needs a ciso
 
Yhcg - IT security and risk management
Yhcg  - IT security and risk managementYhcg  - IT security and risk management
Yhcg - IT security and risk management
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
develop security policy
develop security policydevelop security policy
develop security policy
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
 
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 

Viewers also liked

Warwick Gap Project Charter
Warwick Gap Project CharterWarwick Gap Project Charter
Warwick Gap Project Charter
Petros Leandros
 
EDLD 5388 Project Charter
EDLD 5388 Project CharterEDLD 5388 Project Charter
EDLD 5388 Project Charter
Lisa Costello
 
NG BB 06 Project Charter
NG BB 06 Project CharterNG BB 06 Project Charter
NG BB 06 Project Charter
Leanleaders.org
 
Pmp – pmbok 5th edition develop project charter
Pmp – pmbok 5th edition develop project charterPmp – pmbok 5th edition develop project charter
Pmp – pmbok 5th edition develop project charter
Yudha Pratama, PMP
 

Viewers also liked (12)

Warwick Gap Project Charter
Warwick Gap Project CharterWarwick Gap Project Charter
Warwick Gap Project Charter
 
EDLD 5388 Project Charter
EDLD 5388 Project CharterEDLD 5388 Project Charter
EDLD 5388 Project Charter
 
Across Project Charter
Across Project CharterAcross Project Charter
Across Project Charter
 
NG BB 06 Project Charter
NG BB 06 Project CharterNG BB 06 Project Charter
NG BB 06 Project Charter
 
How to Develop a Project Charter
How to Develop a Project CharterHow to Develop a Project Charter
How to Develop a Project Charter
 
Project Charter - How To
Project Charter - How ToProject Charter - How To
Project Charter - How To
 
Product Development Charter
Product Development CharterProduct Development Charter
Product Development Charter
 
Project charter sample
Project charter sampleProject charter sample
Project charter sample
 
The Project Charter Ensuring Quality
The Project Charter Ensuring QualityThe Project Charter Ensuring Quality
The Project Charter Ensuring Quality
 
Pmp – pmbok 5th edition develop project charter
Pmp – pmbok 5th edition develop project charterPmp – pmbok 5th edition develop project charter
Pmp – pmbok 5th edition develop project charter
 
Mobile Marketing Project Charter
Mobile Marketing Project CharterMobile Marketing Project Charter
Mobile Marketing Project Charter
 
Project Charter Guide
Project Charter GuideProject Charter Guide
Project Charter Guide
 

Similar to The infrastructure and the security essentials of information technology in an enterprise project charter

Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docxRunning Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
toltonkendal
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206
Apoorva Ajmani
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 

Similar to The infrastructure and the security essentials of information technology in an enterprise project charter (20)

MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
6 aproaches
6 aproaches6 aproaches
6 aproaches
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docxRunning Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTSMANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206
 
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
 
It infrastructure services
It infrastructure servicesIt infrastructure services
It infrastructure services
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise Architecture
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
It infrastructure services
It infrastructure servicesIt infrastructure services
It infrastructure services
 
06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
111.pptx
111.pptx111.pptx
111.pptx
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

The infrastructure and the security essentials of information technology in an enterprise project charter

  • 1. [PROJECT CHARTER] EXECUTIVE SUMMARY This project is mainly focused on that what infrastructure is suitable for a business and why every organization has different requirements in this project we recommend some new and required technology which help to make an Enterprise state of the Art and must identify the security essentials of an enterprise which helps to protect data from manipulation and alteration. The project will integrate improved technology solutions with our current platform in order to establish a more robust security infrastructure. Page | 1
  • 2. [PROJECT CHARTER] PROJECT PURPOSE/JUSTIFICATION This project is helps to identify the need of hardware that what actually is the client requirement and also identifies security vulnerabilities which are usually done by a Network Administrator to give a lead to an intruders, Attacker or hackers so that they can enter in Domain and manipulate the Data. Business Need/Case The need of new infrastructure is organizational need and technology advancement as well as social and economical requirement. This new technology implementation may help in cost saving, process improvement and new product development. 2
  • 3. [PROJECT CHARTER] Business Objectives The business objectives for this project are in direct support of our corporate strategic plan to improve IT security and reduce costs associated with loss and waste. - Designing a new IT Infrastructure for more fast and reliable network. - Highlights main threats and defining proactive strategy for Risk Management - Implementation of new IT security policy which may be more helpful in secure data - Reduce the amount of damages by 50% in the first year PROJECT DESCRIPTION This project Information Technology Infrastructure and IT security essential is mainly focused on that what infrastructure is suitable for a business and why every organization has different requirements also describes why consulting and system Integration services for this consulting we take a real time example of a joint venture between Siemens and Accenture. We also recommend some new technologies for the state of the Art Infrastructure as well as the best solution which can provide finest service to an Enterprise. Project also defined the security threats, Service Level of Agreements, managerial issues, the internal and external resources of an Enterprise, Total Cost of Ownership, as well as the most important factor Risk Page | 3
  • 4. [PROJECT CHARTER] management. We also recommend some IT security solution which can help to protect data from stealing, altering and modification. All hardware and software will be integrated into the company’s current IT platforms in order to establish increased security while allowing all systems and processes to continue without interruption. Assumptions The project team must assume that the all parties (stakeholders, project sponsor and all departments) in this project equally support and collaborate to complete the project. Following are the list of assumptions.  The purpose of this project will be communicated throughout the company prior deployment.  The IT manager will provide additional resources if necessary  The project must be fully supported by all parties. Project Deliverables The following deliverables must be the successful completion of the project. Any changes to these deliverables must be approved by the project sponsor.  Fully deployed effective and efficient infrastructure  Must identify the Risk management and also competitive advantages.  Fully deployed intranet security solution. 4
  • 5. [PROJECT CHARTER] Abstract Previous decades have shown a dramatic increase in the use of information technology in business, education, government, and elsewhere to assist in executing enterprise processes and accomplishing institutional objectives. It is likely that this trend will continue as the use of information technology spreads throughout the enterprise. I.T security deals with the managerial procedures and technological safeguards applied to computer hardware, software, and data to ensure against accidental or deliberate unauthorized access to computer system data. Therefore it is possible to establish some form of operational security, which allows the management of a computer installation to exercise control and be accountable for the installation. Guidelines and procedures may be established for accountability, for levels of control, and for system configuration. Preventive measures against internal and external threats can be developed through risk analysis, assessment, and insurance investigation. Physical security must prevent loss due to natural disasters, tampering, and malicious entry and destruction. User identification and authentication must protect both hardware and software. Page | 5