12
Move Inn Estates Michael W. Chitwa M00502568

Move Inn Estates Case Study

Embed Size (px)

Citation preview

Page 1: Move Inn Estates Case Study

Move Inn Estates

Michael W. Chitwa

M00502568

Page 2: Move Inn Estates Case Study

INTRODUCTIONThe nature of their business is providing landlords with the market to let out property and tenants looking to rent. As defined in their portfolio, they pride themselves in:

Finding landlords who would like to rent out propertyFinding tenants through use of technology and referrals to link up with a landlordRenting out property to tenantsLooking out for residencies ready to let

The goals of Move Inn Estates plans to have expanded their base in the following areas:

Increase their portfolio to having over 200 propertiesSelling properties – possibly franchiseIncrease their fleet of company carsEmploy additional staff into their growing teamStaffing if neededDrift into the radio and TV market

Page 3: Move Inn Estates Case Study

BENEFITS THAT EMPLOYING IT WILL BRING FOR MOVE INN ESTATES

Improved Communication

Human Capital

Efficiency

Mobility

Property Management

Presentations and Documents

Multi-site Networks

Page 4: Move Inn Estates Case Study

Mind Map – Move Inn Estates

Page 5: Move Inn Estates Case Study

SAFETY AND SECURITY OF IT INFRASTRUCTURE

a) Identification and Access

b) Encryption

c) Protection of Software and Data

d) Disaster-Recovery Plans

Page 6: Move Inn Estates Case Study

IT INFRASTRUCTURE SECURITY POLICY

Preparation: it begins with creating a usage policy statement which outlines users’ roles and responsibilities with regard to security. Next, comes conducting a risk analysis that identifies the risks to your computer/network, resources and data. A threat rating can be assigned as either low risk, medium risk or high risk. Finally, you establish a security team structure which should be aware of the security policy and the technical aspects of security design and implementation.Prevention: this is further subdivided into approving security changes which are changes to network equipment that have a possible impact on the overall security of the network and monitoring security of your network which focuses on detecting changes in the network that indicate a security violation.Response: this is how the organisation will react in the event of a disaster. It can be broken down into security violations, restoration and review. A violation occurs when a security has been breached. This is followed by restoration which ensures that the normal operations of the computer system have been returned. The final part is the review of the processes in creating and maintaining a security policy.

Page 7: Move Inn Estates Case Study

IT BEST PRACTICES

Ensure an antivirus installed in your computer(s).

Ensure that your network firewall is enabled and configured properly.

Update computer and network software as these regular patches fix loop-holes in your software and programs.

Carefully scrutinize software and programs that you download and run on your computer(s).

Avoid using pirated or cracked software as it is more likely to have been tampered with and can damage your computer.

Page 8: Move Inn Estates Case Study

IT BEST PRACTICES, cont’d.Beware of software and websites that are prone to phishing attacks.Do not reuse the same password everywhere. If you do and a leak on one of the websites that you frequent and are registered to is compromised, your personal information would be available to all.Use secure passwords that are easy to remember but not easy to break. The minimum password should be six digits long, contain at least one non-alphanumeric character and a capital letter (Hess, 2013).Take care of email attachments, not all of them could be genuine.Do not use public Wi-Fi hotspots without using a VPN (secure) connection.Beware of what kind of information you publish and share on social media sites.Regularly review your online accounts and credit report.Backup your files or data that you will definitely use later.Secure laptop computer and other portable devices at all times. Lock them up or carry them around with you if you must.Do not store sensitive information or your only copy of critical data, project files, etc. on your portable device

Page 9: Move Inn Estates Case Study

MIND MAP OF SOCIAL NETWORKS AND WEB 2.0 APPLICATIONS

Page 10: Move Inn Estates Case Study

Cost-Benefit Analysis Current

Year (CY) CY +1 CY +2 CY +3 CY +4

Total Amount

Costs

Hardware

£ 4,000.00

Software

£ 2,500.00

Operation and maintenance

£ 1,250.00

User training

£ 2,000.00

Implementation costs

£ 2,500.00

Licences

£ 900.00

Time

£ 1,000.00

Security

£ 2,550.00

Startup fees

£ 5,000.00

Total Costs (Future Value)

£ 21,700.00 £ - £ - £ - £ -

Total Costs (Present Value)

£ 21,700.00 £ - £ - £ - £ -

£21,700.00

Benefits

Intangible Benefits

Improved efficiency

£ -

Property management

£ -

Customer satisfaction

£ -

Improved company reputation

£ -

Tangible Benefits

£ 5,000.00

Communication

£ 5,000.00

Better mobility

£ 9,000.00

Improved performance

£ 4,500.00

Increased Profits

£ 6,500.00

Improved service delivery

£ 1,000.00

Total Benefits (Future Value)

£ 31,000.00 £ - £ - £ - £ -

Total Benefits (Present Value)

£ 31,000.00 £ - £ - £ - £ -

£31,000.00

Page 11: Move Inn Estates Case Study

Disaster Recovery Plan1. Purpose and Objective ............................................................................................................................................ 3

Scope ............................................................................................................................................................................ 3

2. Dependencies .......................................................................................................................................................... 3

3. Disaster Recovery Strategies ................................................................................................................................... 3

4. Disaster Recovery Procedures ................................................................................................................................ 3

Response Phase ............................................................................................................................................................ 3

Resumption Phase ........................................................................................................................................................ 3

Data Center Recovery ............................................................................................................................................... 3

Internal or External Dependency Recovery .............................................................................................................. 3

Significant Network or Other Issue Recovery (Defined by quality of service guidelines) ........................................ 3

Restoration Phase ........................................................................................................................................................ 3

Data Center Recovery ............................................................................................................................................... 3

Internal or External Dependency Recovery .............................................................................................................. 3

Significant Network or Other Issue Recovery (Defined by quality of service guidelines) ........................................ 3

Appendix A: Disaster Recovery Contacts - Admin Contact List ....................................................................................... 3

Appendix B: Document Maintenance Responsibilities and Revision History ................................................................. 3

Appendix C: Server Details .............................................................................................................................................. 3

Appendix D: Glossary/Terms ............................................................................................................................................................ 3

Page 12: Move Inn Estates Case Study

Email Usage PolicyPurpose

Scope

PolicyProhibited use

Personal use

Monitoring

Enforcement

Definitions

Agreement

Revision History