Free Essay

Vaan Lan

In: Business and Management

Submitted By este9999
Words 305
Pages 2
Strategic Alternative Implementation-Action Items and Action Plan
After selecting the most appropriate strategy (that is, the strategy with the highest probability of enhancing a firm's strategic competitiveness), you must consider effective implementation. Effective synthesis is important to ensure that you have considered and evaluated all critical implementation issues. Issues you might consider include the structural changes necessary to implement the new strategy. In addition, leadership changes and new controls or incentives may be necessary to implement strategic actions. The implementation actions you recommend should be explicit and thoroughly explained. Occasionally, careful evaluation of implementation actions may show the strategy to be less favorable than you thought originally. A strategy is only as good as the firm's ability to implement it effectively. Therefore, effort to determine effective implementation is important.
Process Issues
You should ensure that your presentation (either oral or written) has logical consistency throughout. For example, if your presentation identifies one purpose, but your analysis focuses on issues that differ from the stated purpose, the logical inconsistency will be apparent. Likewise, your alternatives should flow from the configuration of strengths, weaknesses, opportunities, and threats you identified by the internal and external analyses.
Thoroughness and clarity also are critical to an effective presentation. Thoroughness is represented by the comprehensiveness of the analysis and alternative generation. Furthermore, clarity in the results of the analyses, selection of the best alternative strategy, and design of implementation actions are important. For example, your statement of the strengths and weaknesses should flow clearly and logically from the internal analyses presented.
Presentations (oral or written) that show logical consistency, thoroughness, and clarity of purpose, effective analyses, and feasible recommendations (strategy and implementation) are more effective and will receive more positive evaluations. Furthermore, developing the skills necessary to make such presentations will enhance your future job performance and career success.

Similar Documents

Free Essay

Wireless

...Introduction We have been hired to deploy a wireless network for Citizens First National Bank. We are going to design, test and deploy this network. Banks have been slow to adapt this technology because if the high security standards they must follow. Since security has been improved and the benefits are so great more and more companies are starting to deploy wireless networks. It the next couple pages I will go through the scope of the project along with the goals and requirements. There are some initial testing that we have to get down and setup so auditors will be able to test before we can deploy to all branches. By using auditors it helps protect the bank with a paper trail incase an incident ever happened. This would show that we have followed all requirements and made every possible attempt to protect our customers and employees. We will have 60 days to setup and test before we have to purchase equipment. This should provide plenty of time to get a location up and running and have their auditors in to do testing. After initial testing we will then put a plan in place to bring all branches online one at a time while sticking to the budget. Scope and Goals Scope The major driving force of this project is to add a wireless infrastructure to the entire bank that would allow seamless use between all branches, while maintaining the high security standards that the FCC requires to help protect the customers and employees of the bank. The details of the...

Words: 786 - Pages: 4

Premium Essay

Quality Web Design

...utilize a Microsoft Visual Studio Team Foundation Service (TFS) server to manage their content and the progress of the project. “Team Foundation is a set of tools and technologies that enable a team to collaborate and coordinate their efforts on building a product or completing a project. Team Foundation enhances team communication, tracks work status, supports team roles, enacts the team process, and integrates team tools.” (Microsoft.com (2011) Team Foundation Overview) In addition to the Team Foundation, they also utilize Visual Studio to code, and build the websites. These resources are accesses through different methods. Those methods include WAN connection, VPN connection through a remote office, and through the corporate office via LAN. They also have other services such as Outlook Web Access for E-mail that is accessed via the methods mentioned above. They have also created security control measures that are published through the corporate security manual. Two Security Vulnerabilities Software Vulnerability The main vulnerability I see on the software side would be protecting their Server. Since Quality Web Design utilizes the access to their servers via remote connection and wireless access, these servers can become victims of Man-in-the-Middle...

Words: 927 - Pages: 4

Free Essay

It 241 Appendix a

...Associate Program Material Appendix A Final Project Overview and Timeline Final Project Overview In the final project, you assume the role of a wireless network consultant working for a company called Apex Designs. You must present Apex Designs with a plan that outlines how you intend to design their wireless network. The plan must be based on the recommended steps for designing a WLAN, outlined in the following bulleted list. In addition to the design of the network, Apex Designs has asked that you provide a basic wireless security policy. To that end, your plan must consist of the following elements: • Deployment scenario • IEEE wireless network type • Access point management • Location of wireless devices • Wireless security policy Final Project Timeline Budget your time wisely and work on your project throughout the course. Some of the discussion questions, CheckPoints, and assignments in the course will assist you in creating your final project. If you complete your course activities and use the feedback provided by the instructor, you will be on the right track to complete your project successfully. □ Suggested in Week One: Read the Final Project Overview and Timeline in Appendix A. Review Appendix I and Appendix J. □ Suggested in Week Three: Begin to identify the hardware components that your network may use based on the list of components compiled in the Wireless Network Components assignment. You will not be able to finalize this list...

Words: 446 - Pages: 2

Free Essay

Ilab 5

...installs Chanalyzer on your computer 2. Capture1.wsr: First, capture file for analysis 3. Capture2.wsr: Second, capture file for analysis 4. Capture3.wsr: Third, wireless capture file for analysis 5. Capture4.wsr: Fourth, wireless capture file for analysis 3. Install the Chanalyzer spectrum analysis program by double-clicking on the Chanalyzer_Installer.3.4.msi file. 4. Start the Chanalyzer. Once the Chanalyzer is running, open the first capture file, Capture1.wsr, and let the recording run for a few minutes. Using this capture, answer the following questions in your lab report. Question 1: Are any channels being used that overlap other channels? Question 2: If you had to install a new wireless LAN, what channel would you use? 5. Close Capture1.wsr and open the file Capture2.wsr. Let the recording run for a few minutes. Using this...

Words: 855 - Pages: 4

Premium Essay

It320

...1. What risk exposure are you subjecting your Microsoft Windows systems to by opening up ports on your internal firewall? Buy opening ports in your firewall it is allowing people access to you network and if anybody that trys to get in figures out the port they can potentially gain access to your system. 2. Using the VM’s on your student workstation, how can you test if your Windows internal firewall is configured properly? By going to start -> control Panel -> Select firewall there it gives you the options that are on Windows Firewall. 3. Name at least three significant risks of logging in to access points in airports, hotels and other public places. Explain. E-commerce involves the passing of sensitive information, like credit card numbers or bank account numbers, over the Internet, and the risk of losing the privacy of this information is high in public places. Theft of unencrypted wireless data can easily occur in public areas because WiFi hotspots do not provide encryption, such as WEP, WPA, or WPA2, in order to simplify the connection process and minimize the management workload. Evil twin hotspot: These are hot spots set up by a hacker and made available to the public. Unknowing users who connect to the Internet using these access points are then exposing their sensitive information to the hacker. To avoid being tricked by this set up, check to see if the login to a WiFi hotspot is SSL encrypted, and look for a valid security certificate...

Words: 300 - Pages: 2

Premium Essay

802.11ac Migration Guide

...Aruba Migration Guide 802.11AC MIGRATION GUIDE 802.11ac Aruba Migration Guide Table of Contents Introduction 802.11AC basics Why 802.11ac? 802.11ac technology overview Backward compatibility RF spectrum Multistation MAC throughput > 1 Gbps 256 QAM Wider channels More spatial streams Downlink multi-user MIMO Pros of 802.11ac Cons of 802.11ac Strategy and planning for 802.11ac migration Site planning basics Planning process Minimum requirements and actions to implement 802.11ac Aruba recommendations for 802.11ac migration General Capacity RF planning Installation Wireless RF coverage considerations and questionnaire Summary 3 3 3 4 4 4 5 5 5 5 6 6 6 6 6 6 7 8 8 8 8 8 9 10 Aruba Networks, Inc. 2 802.11ac Aruba Migration Guide Introduction Wi-Fi has become such an amazingly successful technology because it has continuously advanced while remaining backwards compatible. The current state-of-the-art Wi-Fi is known as Wi-Fi CERTIFIED n or 802.11n. 802.11n has become popular because it improves performance. As 802.11n has become a standard interface on PCs, tablets and smartphones, the applications used by these devices have continued to progress. Mobile technology has encountered the next frontier – video. Whether delivering YouTube to smartphones or moving HDTV signals around the office or home, video has become a significant driver of network traffic, chiefly because it requires one or two orders of magnitude more bandwidth than other IP services. Now...

Words: 3787 - Pages: 16

Premium Essay

Wirless Security

...Wireless Security and Monitoring for the Home Network Raymond Turner Version 1.4b GIAC GSEC Practical Assignment August 21, 2003 Abstract Marketing trends estimate that by the end of 2006, 21 million homes will have implemented a Local Area Network (LAN), and of those 21 million homes 65% will use wireless solutions. [1] The rapidly decreasing cost for wireless devices and the proliferation of wireless solutions provided by the major Internet Service Providers seems to clearly support these growth estimates. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Home wireless users and security professionals the world over are conceptually trying to solve similar problems. They both need to find a way to provide a secure working environment. There are two distinct approaches to this security dilemma, security prevention, and security detection. An example of security prevention would be a firewall device that restricts specific traffic or ports to or from specific hosts. Although this provides protection against unauthorized traffic, it has no means for determining if an attack is being attempted via an authorized port. An example of security detection would be an IDS (Intrusion Detection System) device that contains a signature to identify a specific attack via authorized or unauthorized ports. [2] Security professionals often have the technology and resources to develop security solutions based on prevention, detection, or a combination of the two. However, home...

Words: 6220 - Pages: 25

Free Essay

Fair and Responsible Use of Wireless Lan Technology

...Issue Specific Security Policy Title: Fair and Responsible Use of Wireless LAN Technology Classification: Internal Use Only Statement of Policy This policy addresses fair and responsible use of Acme’s wireless local area network (WLAN) technologies. This includes but is not limited to hardware, software and protocols associated with WLANs. It is intended for authorized users within the Acme enterprise. Authorized users are defined as anyone who has been granted approval to access Acme information and information systems. This includes employees and contingent workers. Authorized users are expected to understand and comply with the contents of this document. Appropriate Use Laptop users are permitted, with prior management approval, to use Acme’s internal WLAN solution. The WLAN should be used only when a wired network solution in unavailable or inappropriate for a particular situation. To ensure appropriate protection of privacy, all wireless transmissions will be secured utilizing strong mutual authentication and encryption. When establishing a connection to a public hotspot or WLAN within your home, a VPN connection must be established and used in conjunction with an Acme approved personal firewall solution. Only Acme approved WLAN technologies are permitted within the enterprise. Use of non-standard hardware, software and protocols is strictly prohibited. Systems Management It is the responsibility of the Network Administrator, for Acme’s WLAN, to...

Words: 472 - Pages: 2

Free Essay

Case Project 2-3 Netw390

...Vendor | Model | standard | Bands | Encryption Type | Power over Ethernet | WAN Speed | Cost | Netgear | WNDAP330 | 802.11a/b/g/n | Dual 2.4,5GHZ | WEP, WPA, WPA2 | Yes | 10/100/1000BaseT | $329.99 | Linksys | WAP610N | 802.11a/b/g/n | Dual 2.4,5GHZ | WEP, WPA, WPA2 | No | 10/100BaseT | $86.00 | D-Link | DAP-1522 | 802.11a/b/g/n | 2.4 OR 5 GHz | WPA, WPA2, WPA2 Enterprise | Yes | 100/1000 BaseT | $389.99 | Apple | AirPort | 802.11a/b/g/n | Dual 2.4, 5 GHz | Wep, WPA, WPA2 | No | 100/1000 BaseT | $179.00 | TRENDnet | TEW-637AP | 802.11b/g/n | 2.4 | WEP, WPA, WPA2 | NO | 10/100 BaseT | $63.99 | Motorola | AP-5131 | 802.11a/b/g | 2.4 | WPA, WPA2 | No | 10/100 BaseT | $265.00 | Belkin | | 802.11b/g | 2.4 GHz | WEP, WPA, WPA2 | | 10/100 BaseT | $37.00 | For home use I would pick the Linksys. The reason for this is because of the dual band feature. It is always nice to have a wireless access point that can work on both frequencies to support both your old and new wireless equipment. Also with most networking equipment is is always good to go with a company you trust. For the SOHO application I would use the Netgear. This is primary because it is built for commercial use. It supports POE so you can connect a Cat5 from your switch to it and not worry about finding a plugin to power it. Also this access point supports VPN’s and allows the setup of multiple SSID’s to separate out your user. In a business function this is very useful. As the access point I...

Words: 340 - Pages: 2

Premium Essay

Tjx Companies

...TJX companies are known to have a firewall system that does not block any activity that is suspicious on its own networks. Those data encryption that’s used to secure the wireless network at the TJX store outdated. Several of the home wireless networks are secured by using WPA or WPA2. This technology is a lot more complicated to crack. TJX were still using outdated WEP encryption. TJX locations each were lacking those firewalls and data encryption protocols. The company saved the debit and credit card which is also a violation of all card data security standard. The standard was created to reduce any debit and credit card data stored in the merchant systems. Lack of compliance wasn’t intended but the legacy software did not meet the current security standards. The TJX used several available tools to prevent, and limit the impact. Antivirus and the proper firewall software is installed on each machine and is attached to the network should be in place. Security of the wireless networks should have been created to prevent any possible hacks into the system. Data encryption and appropriately secure those passwords to prevent the attack. When there is lack of proper security the TJX companies will have to pay about 11 billion dollar. The banks that provided the cards that were stolen were forced to spend 300 million dollars to replace those stolen cards which are very expensive all because of card information being stolen. TJX responsibility was to make sure that each of the...

Words: 289 - Pages: 2

Free Essay

It241

...used to do the heavy lifting of any network needs. Also this allows an integration of a LAN to be merged openly with the layout of the WLAN when or if necessary. Deployment Scenario Rationale While taking in the consideration of limitations on the physical side. The floor plan inside the Call Center allows WAP to be covered and access the other ones that maybe outside one another. In any area that won’t be high regard for security or even be mobile wire can be used for connections this way the wireless can still connect and the two can communicate. Hardware Components • Component Name: AP o Rationale for using component: to provide coverage wirelessly through out the entire are to be covered. o Rough cost estimate: around $100.00 and above depending on what is to be used • Component Name: switch o Rationale for using component: allows all AP’s to be connected o Rough cost estimate: $50.00 and up • Component Name: Cables o Rationale for using component: restrict access to what is not need to have and to gain access to network. o Rough cost estimate: $5.00 and up depending on length and so on. Insert bullets for additional components IEEE Wireless Network Type Apex Designs has identified that an 802.11n LAN will be implemented. Access Point Management Apex Designs has decided that thin access points will be used to simplify the management of the wireless LAN. These access points allow the wireless network to be managed from one central location...

Words: 334 - Pages: 2

Premium Essay

Project

...WIRELESS LOCAL AREA NETWORK IMPLEMENTATION SECURITY AND SUPPORT SUBPROJECT Stephen F. Delahunty Project Management in the Technological Environment Scope Definition Plan Wireless Local Area Network Installation Project This document serves to provide a scope definition for the Security and Support subproject of the corporate wireless local area network installation project initiative. It is a functional document to be used by the project team and stakeholders as a central point of reference for this subproject. Security and Support Scope Definition Subproject Justification The business need for this subproject is the constraint to ensure compliance with corporate and industry security standards in order to protect the firm’s information systems and data. If security issues are not addressed there is a potential for a loss of data or access to corporate systems from unauthorized outside parties. Without proper security procedures the firm could increase vulnerability in terms of information technology and proprietary data. Any network-related project such as this wireless network installation must adhere to current corporate security policy and this subproject meets that goal. An additional requirement of this subproject is to facilitate a smooth transition to a pilot program and full implementation. The subproject team will also serve as security subject matter experts for other subproject teams in this overall initiative. ...

Words: 674 - Pages: 3

Premium Essay

Essay

...Files on all personnel Purpose: The purpose of this policy is to set forth a standard for which personnel files are kept and recorded. Scope: All employees, contractors, consultants, temporary and other workers at GDI. Policy: All personnel working for or having access to GDI servers or the network shall have a file maintained for them in HR containing at a minimum Name, Social Security Number, Phone Number, Supervisor’s Phone Number, Security Level Clearance, Length of Employment and Systems that person can access. Physical access list Purpose: The purpose of this list is to establish an access list for persons who have direct physical access to the server control room. Scope: All employees, contractors, consultants, temporary and other workers at GDI. Policy: Only persons who are on the Physical Access list shall have access to the servers control room and the servers themselves. These people are Security of server room Purpose: The purpose of this policy is to implement a set of securities in order to further safeguard the server room from unauthorized access. Scope: All employees, contractors, consultants, temporary and other workers at GDI. Policy: This policy is to set forth a new manner in which the Server Room is secured. The Server Room shall have a keypad on all access points. This keypad will require a different code form every person who has access to the room. It shall also retain a file in which all persons who enter the server room is recorded...

Words: 699 - Pages: 3

Premium Essay

Wireless Technologies Proposal

...12 Wireless Technologies Proposal Learning Team B Jessica L Jones, Christina Valdez, Kathy Moles, & Steven Goodwin Table of Contents * Page 2 * Table of Contents * Page 3 * The problem * The proposed changes * The pros and cons of proposed changes * Page 4 * Justification of decision * Page 5 * The risks involved * The costs * Conclusion * Page 6 * References Wireless Technologies Proposal To: President of Party Plates From: Sales Department of Party Plates Date: February 6, 2012 Subject: Wireless Technologies Proposal The problem: Party Plates currently uses a wired local area network to access the Internet. This requires each desktop and laptop computers be connected to the network via Ethernet cables. Party Plates supplies certain employees with company financed mobile phones. However, the current phones have minimal functions. The proposed changes: An upgrade to a wireless local area network (WLAN) would offer Party Plates several benefits. Providing smart phones instead of current phones to the employees would also be valuable. With smart phones the employees would have several functions at their disposal that would make them more efficient. The pros and cons of proposed changes: Incorporating wireless technologies into any business has advantages and disadvantages. For Party Plates, the wireless technologies that the sales department would like to incorporate are mobile...

Words: 888 - Pages: 4

Free Essay

Help

...LAB 1 PART - A RISK – THREAT - VULNERABILITY | PRIMARY DOMAIN IMPACTED | Unauthorized access from public Internet | LAN –WAN | User destroys data in application and deletes all files | USER | Hacker penetrates your IT infrastructure and gains access to you internal network | SYSTEM APPLICATION | Intra-office employee romance gone bad | USER | Fire destroys primary data center | LAN | Communication circuits outages | WAN | Workstation OS has a known software vulnerability | LAN – WAN | Unauthorized access to organization owned | USER | Workstations | USER | Loss of production data | SYSTEM APPLICATION | Denial of Service attack on organization e-mail Server | LAN – WAN | Remote communications from home office | REMOTE ACCESS | LAN server OS has a known software vulnerability | LAN | User downloads an unknown e-mail attachment | USER | Workstation browser has software vulnerability | WORKSTATION | Service provider has a major network outage | WAN | Weak ingress/ egress traffic filtering degrades Performance | LAN – WAN | User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers | USER | VPN tunneling between remote computer and ingress/egress router | REMOTE ACCESS | WLAN access points are needed for LAN connectivity within a warehouse | LAN – WAN | Need to prevent rogue users from unauthorized WLAN access | WAN | LAB ASSESSMENT QUESTIONS 1. Unauthorized access to organization...

Words: 307 - Pages: 2