Topic > Business Requirements - 2038

1 Business Requirements 1.1 Project Overview SMB Computation, a data collection and analysis company, has been in operation for less than two years and has grown exponentially. SMB Computation is looking to create a repository for collected data beyond that of standard relational databases, and their ten terabyte data warehouse is expected to grow about 20% each year. An action plan is being developed to offset the company's growth, and the CEO and I, the CIO, will be examining options for data warehousing, analytics, interfaces and cloud technology, as well as security and infrastructure.1.2 Context including current processThis project will help SMB Computation prepare a security assessment by defining which systems to consider and what approach for the assessment, determining logistical considerations, determining an assessment plan and ensuring that political and legal considerations are met . The goal of the project is to review all documentation and policies in place, examine current system configurations, review system logs, and test current resources for vulnerabilities. The role of the IT department during this project will be to provide but is not limited to the following: CIO: The CIO will oversee the progress and determine the budget for the project in question, as well as responsibility for the purchase of new equipment and updates, while supervising the rest of the IT department. The Analyst: The analyst will communicate with the CIO on strategies to update the company efficiently and will be the primary communication with any third-party vendors that are needed during the project. System Administrator/Database Administrator: The administrator will be responsible for desi...... middle of paper......n resources has become an important task. The preparation of the company's human resources includes planning for future staffing needs, required skills, recruitment and development of employees. 1.3.6 Definition of Terms A list of definitions that will be used throughout the project includes the following: Best Practices: IT best practices include the many processes and frameworks that a company will use to efficiently and effectively carry out tasks IT. Risk: Risks are the possibility of an error occurring in the IT project. Vulnerabilities: Vulnerabilities are security holes in software or operating systems that could provide a way to attack and penetrate the system. Vulnerability Assessment: A vulnerability assessment is the testing and documentation of the effectiveness of security policies and controls.