16
THE INSTITUTE OF FINANCE MANAGEMENT Faculty of computing information system and mathematics Beauty Plc. Virtual Private Network proposal Project Members ELIUD ERICK BIT/09/31017 JULIANA MBUKE BIT/09/29262 YETHROY JEROME BIT/09/29212 MICHAEL GEORGE BIT/09/29268 BEATRICE AYOUB BIT/09/29181 HOKORORO SOPHIA BIT/09/28619 KIDAVA JACKSON BIT/09/29227 KAJIRU ANTONY T. BIT/09/29220 MHANUKA BARAKA BIT/09/29267 MBARUKU ABASI BIT/09/29258

Beauty Plc. VPN Project Proposal

Embed Size (px)

Citation preview

Page 1: Beauty Plc. VPN Project Proposal

THE INSTITUTE OF FINANCE MANAGEMENT

Faculty of computing information system and

mathematics

Beauty Plc. Virtual Private Network proposal

Project Members

ELIUD ERICK BIT/09/31017

JULIANA MBUKE BIT/09/29262

YETHROY JEROME BIT/09/29212

MICHAEL GEORGE BIT/09/29268

BEATRICE AYOUB BIT/09/29181

HOKORORO SOPHIA BIT/09/28619

KIDAVA JACKSON BIT/09/29227

KAJIRU ANTONY T. BIT/09/29220

MHANUKA BARAKA BIT/09/29267

MBARUKU ABASI BIT/09/29258

Page 2: Beauty Plc. VPN Project Proposal

ii

Table of Contents Abstract. ....................................................................................................................................................... iii

Chapter 1 ....................................................................................................................................................... 1

Introduction .............................................................................................................................................. 1

Current problems of Beauty Plc. ............................................................................................................... 1

Ways to overcome the problems. ............................................................................................................. 2

Implementing of organization .................................................................................................................. 2

Chapter 2. ...................................................................................................................................................... 3

Project Goals ............................................................................................................................................. 3

Objectives. ............................................................................................................................................ 3

Project Scope ....................................................................................................................................... 3

Project deliverables. ............................................................................................................................ 3

Importance of VPN to the organization ............................................................................................. 4

Risks associated with Virtual Private Network ......................................................................................... 4

Client ......................................................................................................................................................... 5

The project team ....................................................................................................................................... 5

Chapter 3. ...................................................................................................................................................... 6

Proposed approach ................................................................................................................................... 6

Proposed Approach .................................................................................................................................. 6

Chapter 4 ....................................................................................................................................................... 8

Project implementation ............................................................................................................................ 8

Activity Plan ......................................................................................................................................... 8

Resource plan ...................................................................................................................................... 8

Proposal budget ................................................................................................................................. 11

Conclusion and Recommendations ........................................................................................................ 12

References .................................................................................................................................................. 13

Page 3: Beauty Plc. VPN Project Proposal

iii

Abstract. This proposal intends to explain the activities that will be conducted in the implementation of the

VPN network in the Beauty Plc. The proposal consists of four chapters namely; Introduction, Project

goals and objectives Proposed Approach, and Implementation.

In Introduction, there is current problem facing beauty Plc., Priority needs, and implementing

Organization

Project goals consist of objectives, project deliverables, project scope, importance of Virtual Private

Network, and risk evaluation on VPN.

Proposed approach explains the methodologies that will be used to create the VPN, and the

proposed technologies.

In addition, the last chapter explains the activity plan, resource plan, and the financial plan

(Budget).

Page 4: Beauty Plc. VPN Project Proposal

1

Chapter 1

Introduction

The proposal explains the development of the VPN in the Beauty plc. Company. The

network will help the beauty Plc. To solve their current problems they are facing.

A virtual private network (VPN) is the extension of a private network that encompasses

links across shared or public networks like the Internet. A VPN enables user to send data

between two computers across a shared or public internet work in a manner that emulates

the properties of a point-to-point private link. Before the Beauty Plc. has no VPN (Virtual

Private Network) so the company is doing its activities manually such as sharing of data

(Files), exchanging of information within an organization. So the VPN (Virtual Private

Network) technology come with the solution to the problem.

Current problems of Beauty Plc.

Currently the company facing are the following;

Competition due to the entrance of new companies and individuals in cosmetic

industry

Technological advancement since Beauty Plc. uses the old technologies in the

operations.

Market share is reduced since consumer are now aware and exposed to different

products in cosmetics industry

Security issues that include the inventory control and the transaction control are

done physically that set the risk/threat to Beauty Plc.

Large number of employees in the company cause more of the company income or

profit to be used to pay the employees of the two industry they have

Page 5: Beauty Plc. VPN Project Proposal

2

Ways to overcome the problems.

One of the way to solve the current problems is to establish the Virtual private Network,

which solve the problems ;trough the following;

i. Will automate all the operations that ware done manually hence increase

efficiency and accuracy.

ii. The network also will increase the network share through reducing production

and goods costs

iii. Will improve security of company’s data or information as well as security of

transactions they done in their companies

iv. Also will lead to the reduction of the number of employees because most of the

duties will be done automatically.

v. Gaining the competitive advantage over other companies in the cosmetic

industry by introducing new technologies in the productions and operations

Implementing of organization

We as Cloud Networking and consultancy Co. Ltd we deals with issues such as

network(ing) configuration and connections, hardware and software maintenance and

repair, as well as computing(ICT) consultancy. Our organization deals with these activities

for several years so we are capable of doing any activity regarding with the above

mentioned. We had already done tender with many companies such as Africa Barrick

Company ltd, Mtibwa sugar co. ltd, Mtakuja Foundation and most of the project were

succeed.

Page 6: Beauty Plc. VPN Project Proposal

3

Chapter 2.

Project Goals

To develop VPN that will connect Beauty plc. and their braches to overcome business

challenges via the use the application of ICT.

Objectives.

1. Improve quality of cosmetic product and packaging, this will attract new customers

and hence enable winning competitive advantages over other competitors.

2. Implementing automated security facilities, data security, and network security will

enable easy control of materials and proper keeping of transaction records.

3. To reduce operation cost through automating production activities.

4. To reduce number of employees that in turn will lead to increase income.

5. To save the organization money by means of eliminating the need for expensive

long-distance leased lines and reducing long distance telephone charges.

6. To align technology with business in order to create values like customer

awareness, reduce cost efficient.

Project Scope

This project is focused entirely on the alignment of the Information and communication

technology with organization business functions that is how VPN can be positioned to

support organization goals and business objectives.

Project deliverables.

The project deliverables that are expected to be presented are;

The completely working Virtual Private Network and

Network Documentation

User training for the entire Network

Page 7: Beauty Plc. VPN Project Proposal

4

Importance of VPN to the organization

Implementation of VPN technology will benefits Beauty Plc. in the following manner;-

Extend geographic connectivity.

Improve security where data lines have not been ciphered.

Reduce operational costs.

Reduce transit time and transportation costs for remote users.

Simplify network topology in certain scenarios.

Provide global networking opportunities.

Provide telecommuter support. .

Provide faster ROI (return on investment) than traditional carrier leased/owned

WAN lines.

Risks associated with Virtual Private Network

Although the organization will get the benefit form VPN bit, also a VPN technology is

critically associated with security issues. Security must be dealt appropriately to ensure the

confidentiality and integrity of data and information, as well as overall corporate network

security. It may be in either of the following;-

User-credential-related risks VPNs provide easy access from the Internet into a corporate network and its internal resources. VPN security is only as strong as the methods used to authenticate the users (and the devices) at the remote end of the VPN connection. Simple authentication methods based on static passwords are subject to password “cracking” attacks, spy, or even social engineering attacks.

Spread of viruses, worms, and Trojans from remote computers to the internal network Remote access is a major threat issue to network security. Every remote computer that does not meet corporate security requirements may potentially forward an “infection” from its local network environment to an organization’s internal network. Up-to-date antivirus software on the remote computer is required to alleviate this type of risk.

Split tunneling Split tunneling takes place when a computer on the remote end of a VPN tunnel simultaneously exchanges network traffic with both the shared (public) network and the internal (private) network without first placing all of the network traffic inside the VPN tunnel. This provides an opportunity for attackers on the shared network to compromise the remote computer and use it to gain network access to the internal network. A host-based firewall is an effective way to defend against network-based attacks. Furthermore, many organizations have chosen to disallow split tunneling.

Page 8: Beauty Plc. VPN Project Proposal

5

Client

The client of this proposal is Beauty plc.

The project team

The proposed development team members are

ELIUD ERICK (Project Manager)

JULIANA MBUKE (Assistant project Manager)

YETHROY JEROME (System Analyst)

MICHAEL GEORGE (Network Engineer)

MHANUKA BARAKA (ICT Operational Officer)

BEATRICE AYOUB (Network Engineer)

HOKORORO SOPHIA (Computer consultancy)

KIDAVA JACKSON (Computer Technicians)

KAJIRU ANTONY (Computer Technicians)

MBARUKU ABASI (Computer Technicians)

Page 9: Beauty Plc. VPN Project Proposal

6

Chapter 3.

Proposed approach

So many methodologies can be used in developing a certain system. For examples;

Traditional and Enhanced Waterfall SDLC (System Development Life Cycle), prototype,

Joint Application Design (JAD), Rapid Application Development (RAD), Agile Methodologies

and others.

Proposed Approach

There are many methodology as mentioned above, there are strong reasons of having them

but the major and important reasons is that; One system development methodology is not

necessarily suitable for use by all projects. Each of the available methodologies is best

suited to specific kinds of projects, based on various technical, organizational, project and

team considerations.

Due to the fact that the nature/kind of project (VPN) and various techniques use in the

project development, the methodology that will be suitable in this project will be Enhanced

Waterfall SDLC (System Development Life Cycle),SDLC has been divided into six(6) phases,

phases are shown in the diagram below;

Within each phases there are different activities that are carried on, thing that done

in each phase are;

Analysis; Establishes a high-level view of the intended project and determines its

goals. (requirements definition) Defines project goals into defined functions and

operation of the intended application. Analyzes end-user information needs.

Page 10: Beauty Plc. VPN Project Proposal

7

Logical design; Describes desired features and operations in detail, including

screen layouts, business rules, process diagrams, pseudo code and other

documentation.

Physical design; the real code is written here.

Implementation; Brings all the pieces together into a special testing environment,

then checks for errors, bugs and interoperability. The final stage of initial

development, where the software is put into production and runs actual business.

Testing, the code is tested at various levels in software testing. Unit, system and

user acceptance tastings are often performed. This is a grey area as many different

opinions exist as to what the stages of testing are and how much if any iteration

occurs. Iteration is not generally part of the waterfall model, but usually some occur

at this stage. In the testing, the whole system is test one by one.

Operation and Maintenance; what happens during the rest of the software's life:

changes, correction, additions, and moves to a different computing platform and

more. This, the least glamorous and perhaps most important step of all, goes on

seemingly forever.

Why did we choose Enchased system Development Life Cycle (SDLC) as the best

methodology to be used in conducting this project?. Reasons are shown as important of

SDLC below. The important of Enhanced System Development Life Cycle are;

1. Allow iteration process; if your organization has been plagued by problems resulting from

poor requirements management, then a robust requirements management methodology i.e.

Enhanced System Development Life Cycle (SDLC) e would be well advised. Once this

problem has been solved, through a repeatable process, the organization might then

streamline its process, while ensuring that quality is maintained.

2. The orderly sequence of development steps and strict controls for ensuring the

adequacy of documentation and design reviews helps ensure the quality, reliability,

and maintainability of the developed software.

3. Progress of system is measurable.

Page 11: Beauty Plc. VPN Project Proposal

8

Chapter 4

Project implementation

Activity Plan

This part specifies a project schedule with respect to project activities as followed from a chosen

methodology of development, System development life cycle. The schedule point out each activity

i.e. Analysis, Design, Implementation, Testing and Operation and Maintenance with its sub tasks and

their estimated time range.

Resource plan

This part elaborates all resources to be used in the development process, which are network

engineer, analyst, user, software’s and hardware’s. These are allocated on the activity plan based on

which process is undertaken. In addition, these allocated resources will be used in assisting

estimation of project budget from analysis to maintenance phase.

Below is a Gantt chart showing the project schedule that includes project activities with its specific

time range and allocated resources;

Figure 1: A Gantt chart for project schedule indicating activity and resource plan.

Elaboration of project activities from a chart;

Page 12: Beauty Plc. VPN Project Proposal

9

Analysis

Tasks to be done in this phase include a feasibility study of an organization to know its

capabilities in terms of finance, technical support it can offer, cost/benefit factors and

overall current state of an organization.

Another task is requirement gathering and analysis, this will determine clients needs.

Requirements are of two types, Functional requirements (VPN operations) and Non-

functional requirements (extent to which VPN will operate i.e. its constraints, speed,

accuracy)

Analysis phase will take 15 days in which feasibility will take 5 days, requirement gathering

6 days and requirement analysis 4 days.

Design

In design, there is logical design and physical design. Under logical design, the logical

structure of the network will be designed. This includes the diagrams of the network

structure and infrastructure.

In physical design, process of physical allocation of all locations where the equipments will

be installed is undertaken.

The design phase will take 8 days of implantation, in which logical and physical design will

take 4 days each.

Implementation

This phase involves two main stages, namely;

I. Hardware installation

Networking equipments are installed in the area, every device is well configured

and make sure that they communicate to each other. This involves the configuration

of computers, routers, switches, cables, servers, network dishes and other devices.

II. IP and security configuration

IP configuration, process of assigning IP addresses to all the devices connected to

the network is done for devices to communicate with each other.

Security configuration , process where all the protocols are assigned to the

particular network in order to limit the access level of the users and the intruders

from outside the network.

This phase will take 17 days in which 12 days is for hardware installation and 5

days is for IP and security configuration.

Page 13: Beauty Plc. VPN Project Proposal

10

Testing

Testing is done to know performance and if requirements are met. Testing include

integration system testing. In integration testing, individual software modules are

combined and tested as a group. In system testing, testing is conducted on a complete

taking all integrated systems to evaluate system's compliance with its specified

requirements. In this test, the network engineer makes sure that the users are able to access

the network according to their levels. System testing can be performed by number of groups

including users and bring feedback to the engineer if everything is working properly.

This phase will take 10 day. Integration and system testing will take 5 days each.

Operation and Maintenance.

In this phase a process of putting the networking system into working is done. After testing

and ensure that all units are working properly, then users are allowed to use the network.

Maintenance is a continuous activity, but the system will be under developers hand for 10

days afterwards organization will become responsible for the continuous maintenance.

Generally, the whole activity will expected to take total of 60 days to complete.

Page 14: Beauty Plc. VPN Project Proposal

11

Proposal budget

This is a financial plan made for a proposed project; it is represented in tabular form. It indicates in

values in cost of each resource to be used during the implementation of the proposed Virtual

Private Network (VPN) in that business. The budget includes the operational costs and equipment

cost which will be used on the implementation of the VPN.

The following figure shows an estimation of the costs;

Figure 2: A table for budget schedule of a project

Page 15: Beauty Plc. VPN Project Proposal

12

Conclusion and Recommendations

In the completion of the project, it is estimated that the project will increase the organization

advantages. The project will help in reduction of the production cost, hence the reduction of the

reduction of the product price, which will attract more customers. Also, the automation of the

services also will lead to the high quality of goods produced hence that will meet the customer

satisfaction.

The reduction of the number of the employees will also lead to the increase of the organization

profit because the amount of money that will be used to pay the employees will remain to the

organization as a profit.

Page 16: Beauty Plc. VPN Project Proposal

13

References

BRANDON D, 2006, Project management for Modern information Systems, IRM Press, 701 E.

Chocolate Avenue, Suite 200.

Project Management Institute, 2004, A Guide to the Project Management Body of Knowledge (PMBOK Guide), Third Edition, Newtown Square, PA 19073-3299 USA NEBIU B, 2002, Developing Skills of NGOS Project Proposal Writing, Ady Endre ut 9-11, 2000 Szentendre, Hungary , The Regional Environmental Center for Central and Eastern Europe. Available from: http://documents.rec.org/publications/ProposalWriting.pdf [Accessed on 15th December 2011.] Bournemouth University, 2011. BU guide to citation in the Harvard style. Poole: Bournemouth University. Available from: http://www.bournemouth.ac.uk/library/citing_references/docs/Citing_Refs.pdf [Accessed on 15th December 2011].