Preview

MMT2 IT strategic solutionTask 2

Powerful Essays
Open Document
Open Document
2750 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
MMT2 IT strategic solutionTask 2
Running Head: MMT2 Task 2 – Communication Plan

IT Strategic Solutions – MMT2 Task 2

Communication Plan
Western Governor’s University

1

MMT2 Task 2 – Communication Plan

2

A. Communication Plan for Implementing Adaptive Wireless Intrusion Prevention System
The SWOT analysis conducted on AEnergy’s current IT infrastructure revealed some threats and opportunities that must be properly addressed in order to prepare the company for the planned expansion into the east coast. One of the threats identified was the vulnerability of the wireless network. The proposed technology initiative determined as the solution to the problem is to implement an adaptive wireless intrusion prevention system. As discovered in the SWOT analysis, adaptive wireless intrusion prevention is a wireless network security approach that can be integrated into wireless network infrastructures to provide wireless-specific network threat detection and mitigation against malicious attacks, security vulnerabilities, and sources of performance disruption.
Communication Objectives
The primary objective of this communication plan is to ensure that both internal and external stakeholders understand the reason behind the decision to pursue the proposed technology initiative described above; how it will be planned for; and when changes will be implemented. This is to keep the stakeholders informed and also enable them to participate in the implementation process as required. The plan will also describe how the initiative will satisfy the needs of each group of stakeholders. Finally, a proper communication medium will be employed to ensure each stakeholder group receives the disseminated information in a timely manner and in an appropriate format.
Audience
Internal Stakeholders


Sabelle Arnold, Executive Director and Owner

MMT2 Task 2 – Communication Plan


Cameron Kern, IT Manager



Rory Tysoh, Server Manager

3

External Stakeholders


Company shareholders



Current clients, vendors

You May Also Find These Documents Helpful

  • Good Essays

    Mgt 498

    • 950 Words
    • 4 Pages

    Establish a path to proceed forward with the company’s mission and goals. The company will need to determine a way to analyze the success of the implementation…

    • 950 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Str 581 Week 5

    • 1636 Words
    • 7 Pages

    Developing a solid Implementation Plan involves outlining short-term objectives, functional tactics, action items, milestones and deadlines, tasks and task ownership, and resource allocation. The short-term objectives for Summarize It! include:…

    • 1636 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    respect to its storage capabilities ahead of its plans to expand to the east coast.…

    • 2578 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    comply with them. They must also be reviewed and updated regularly as the needs of the…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Threat of new entrants: IT can be used to improve processes and efficiency. This will increase the barriers for entry for new entrants.…

    • 1078 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Threats) analysis would be applied to what this corporation may face in or near the…

    • 2625 Words
    • 19 Pages
    Better Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Satisfactory Essays

    During this process the client and the professional will start the process of implementing the plan that was devised in the previous stage. The implementation process should start right away to ensure that the client does not change their mind and so that they get the help that they need as soon as possible.…

    • 782 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    High-level goals and plans for all areas of information technology that affect the business, not just the infrastructure. A road map for IT is useful in illustrating overall strategy.…

    • 1596 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    What should also be taken from this macro analysis is that rarely should an issue be considered solely a threat or opportunity. Instead every threat should be seen as an opportunity to distance the company from its competitors and every opportunity a chance to fall behind. The ability…

    • 3418 Words
    • 14 Pages
    Best Essays
  • Better Essays

    o Threats – arise when conditions in the external environment endanger the integrity & profitability of the company’s business…

    • 1897 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    In wireless networks the security concerns are considered an important issue, various techniques are used for that purpose. Traditional security mechanisms (authentication, encryption) provide an abstract level of security but some reactive security mechanisms and deep level of inspection is always required. Here some basic intrusion detection systems are discussed and analyzed, and we have shown the advantages and limitations of each technique through a specific comparison between that techniques. And finally we have talked in some details about the HawkEye IDS and we have shown its architecture and mechanism of work, and talked about its advantages over the other IDS we have discussed.…

    • 4430 Words
    • 18 Pages
    Powerful Essays
  • Better Essays

    network intrusion detection

    • 10618 Words
    • 43 Pages

    mitigate attack consequences. The system and security evaluations demonstrate the efficiency and effectiveness of the proposed…

    • 10618 Words
    • 43 Pages
    Better Essays
  • Satisfactory Essays

    Wireless Security Policy

    • 462 Words
    • 2 Pages

    Wireless security policy for a medium-sized banking organization using the following structure: Wireless Security Policy - A wireless policy for a medium-sized banking organization will needed to deploy a wireless LAN to the network and there will not need an onsite IT. The remote can be manage by a standalone intelligent access point which will integrated the wireless LAN by streamline the configuration and management the system.…

    • 462 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Chipotle

    • 8563 Words
    • 26 Pages

    -Provide a discussion of the opportunies and threats within the industry that are particularly applicable to your firm.…

    • 8563 Words
    • 26 Pages
    Powerful Essays

Related Topics