Business Report Proposal

1674 Words4 Pages

Business Report Proposal

I. Introduction:

Statement of Problem.

In 2003, the company experienced a major increase of problems with the

Local Area Network (LAN). The LAN downtime has double from previous

years. There’s also an increase of maintenance problem with computers

systems this includes hardware and software. Some user’s have acquired the

authority to load there own software on their system, this has attributed to

some user’s purchasing or borrowing software from unimproved sources and

loading them on to their systems. If these actions continue it may cause

irreversible damage to our information system. This is causing this unit

thousandth of dollars per month.

Objective.

This proposal examines the computer and LAN problems from the

viewpoint of new and old employees, the tier one and tier two information

system managers. It then offers a plan to make the system more secure

against hackers. In addition, it recommends ways to improve the computer

and system maintenance making it a more secure environment for the

entire company.

Sources.

The data is compiled from a company wide-interview questionnaire,

interviews with employees; email inquiries to companies similar to 1st

Battalion Engineers, the internet, and over six years of observations of

military information system networks.

Details of the Problem.

This subsection examines the severity and causes of security and maintenance

problems on the LAN.

Severity.

Since 2001, the company has experienced a continuous increase of

computer system problems. Personnel are allowed too many privileges with

their assigned computers and the local area network, and the use of

unapproved software, which only compounds this problem. We experienced

four major system problems in the past year that led to the entire LAN being

in-operable. Many users lack the know-how to operate their system. Upon in-

processing employees are presented with numerous passwords that they

tend to write down on paper and attached to their desk or computer this

represents a major security flaw to any company that processes classified

information.

Causes.

The following were specific concerns noted by the Information System

Manager, technicians, and the employer (in descending order of importance):

1. New employees loading unauthorized software on the company systems.

2. P...

... middle of paper ...

...on Engineer, Interview by

author, Fort Jackson, South Carolina, 23 July 2003

Nettrour, Michael, Information Manager, 1st Battalion Engineer, Interview

by author, Fort Jackson, South Carolina, 23 July 2003

Moore, Benson T, System Technician, 1st Battalion Chemical, interview by

author, Fort Jackson, South Carolina, 25 July 2003

Internetworking design Basic [cited 10 Apr 2002] available at http://www.cisco.com/univercd/cc/td/doc/cisintwk/idg4/nd2002.htm#xtocid0

CIAC “Incident Reporting Procedures” [cited 9 Oct 2001] available at http://doe-is.llnl.gov/CIAC_IncidentReportingGuide3.doc

Entrust-“Internet Security 101 Basic Internet Security” available at

http://www.entrust.com/security101/basic.htm

Microsoft- “Checklist: Assess Your Risk” [ cited 2 April 2002] available at http://www.microsoft.com/security/home/

Dunham, Ken. “Bigelow’s Virus Troubleshooting Pocket Reference”

New York: McGraw-Hill Publishing, 2000.

Bigelow, Stephen J. “Bigelow’s Drive & Memory Troubleshooting Pocket Reference” New York: McGraw-Hill Publishing, 2000.

Whitten Jeffrey and Lonnie Bentley, Systems Analysis and Design

Methods, New York: McGraw-Hill Publishing, 2001

More about Business Report Proposal

Open Document