Skip to content

ICTCYS608 Perform Cyber Security Risk Assessments

ICTCYS608 Perform Cyber Security Risk Assessments

Table of Contents

Assessment task 4 – Project. 3

Activity 1. 3

Activity 2. 5

Activity 3. 8

Activity 4. 10

Activity 5. 16

Activity 6. 16

Reference. 18

Assessment task 4 – Project

Activity 1

Discussion of Business Operation

Meeting

Network Engineer – Hello, Good Morning

Manager – Very Good Morning

Network Engineer – How are You ?

Manager – I’m fine. Thank you.

Network Engineer – As we know that we will be deliberating about business procedures that need cyber security and evaluating the work.

Manager – Yes, I know. Future IT company providing IT services such as Application development, technical issues resolution, etc.

Network Engineer – Exactly they are scheduling to implement cybersecurity then giving facilities as protection from cyber-attacks and data breaches.

Manager – So I will provide the information about business and security implemented on the operations.

Network Engineer – Okay! Let’s discussed virtual cyber security

Manager – A virtual space that permits scholars to generate their determined virtual machines, involves a cybernetic laboratory using actual creation agendas.

Network Engineer – It also recognized Many tools to be used Admission controller, Message Safety, Antivirus package, and Cybernetic private network.

Manager – So they required several data as Web telemetry data, Synthetic testing, Controlling data, Application recognition data, and so on. Because it protects all groups of data from injury

Network Engineer – Yes Alright. That’s how they highlight the business operations.

Manager – Cyber security assembles devices, skills, and helps to protect discretion, truthfulness, and computer system availability.

Network engineer – It is also software and monitoring that protects their Email, Network, operating system, and device printing from data theft.

Manager – As they make ICT strategy, applications, Support, and enterprise architecture for a project of the organization.

Network Engineer – Analyzing the association protects hardware and software companies. Problem resolving and announcement skills must be essential.

Manager – yes correct. Thank you.

Meeting Minute Template

Minutes of Meeting: 7 to 10minutes

Meeting Objectives: Providing information and Importance of Cyber security.

Attendees: Network Engineer and Manager

Venue: Room no. 20 (Conference Hall)

Date: 10 March 2022

 No

 

Points discussed Action Suggested Target date
1.

 

Virtual Cybersecurity of business operation. Providing Information on business operation and planned to implement cyber security. After 2 months.
2.

 

Necessities for virtual Cyber security Understand security controls for networks, servers, and applications and how to develop compliant policies. After 4 months
3.

 

Business Operation highlights Controlling the data and application recognize data, for increase the value of the enterprise and earn of profit.

 

 

After 5 months
4.

 

Analysing the business operations which need cyber security Making ICT strategy, problem-solving and communication skills must be compulsory for the organization.

 

 

After 8 months

Activity 2

Preparation of design infrastructure

Report

 

Need of cyber security –  ICTCYS608 Perform Cyber Security Risk Assessments : They need to instrument the cyber security organization for different cyber-attacks as separately outbreak uses changed designs to avoid the outbreaks, as they want to have different types of cyber security infrastructure. A cyber security risk assessment requires an organization to determine its key business objectives and identify the information technology. Cyber security is significant because it keeps all types of data information from robbery and harm, with facts, personally recognizable material, endangered strength data, knowledgeable property, legislative or trade data, information organizations (de Bruijn, et al., 2017).

 

 

Data types to use in Cyber security infrastructure – ICTCYS608 Perform Cyber Security Risk Assessments: Cyber security infrastructure uses various types of data as Serious Substructure security, Submission security, Network Telemetry data, Artificial testing and cybernetic software representative data, regulatory and cloud security data, and application appreciation data also used in cyber security infrastructure. A cyber security risk assessment requires an organization to determine its key business objectives and identify the information technology.

 

 

Security levels in cyber security infrastructure – A future IT company has some safety or security levels to keep the data from the cyber-attacks as Access Evaluating, Authentication, and Authorization. Risk organization must be recognized, skilled, accomplished, and definite. It contains arranging and evaluating the facts and system. Data safety and safety programs will be essential distinct or similarly established procedures and controls that provision data material. Safety scanning is an involuntary method that examines fundamentals web elements, submission, or devices to check for refuge mistakes.

 

 

Requirements of the network server in cyber security –  ICTCYS608 Perform Cyber Security Risk Assessments: It has various types of Network Server which are required, such as Email security that is Significant Influence to reflect when Executing Interacting safety tools, Firewalls are joint basics of a system safety model, Web Security package helps a limited resolve, and Web Subdivision helps to Appropriate possibly negotiated strategies or interferences.

Event organization and security evidence is an organization that combines immediate system circulation monitoring with ancient statistics record folder scanning. Mobile device safety is measured planned to keep complex material deposited on and conducted by laptops, smart phones, tablets, and other devices.

 

Network boundaries to secure – A network boundary is monitoring and regulator of infrastructures at the exterior limit of an evidence system to avoid and perceive hateful and additional unlawful transportation. A line of connection between two areas, or atmospheres that have changed security desires or wants. Operative design, connection, formation, and preservation of web boundary safety instruments thoughtful responsibilities providing in active network security.

 

 

Tools required for implementing cyber security – An operative tool that arranges of any extent can use correct nowadays to revenue act to diminish cyber risk. A Force point is a personalized safety tool mostly considered for cloud users. It is used to describe web security, confine operators from editing specific satisfied, and wedge several invasion efforts. Keypass is an effective encoding device used for individuality organization. Life Lock helps to monitor for recognizing stealing and pressures as well as to perceive, be aware of, and block cybercrimes. VPN tool is strongly related to two webs organized crosswise and entrusted systems. Antivirus software is a planned tool to explore and eradicate package viruses. Metasploit is the best safety package that comprises several tools for implementing dispersion difficult facilities.

 

 

Network access to users – A network that links to contributors to a specific facility and wage-earner, over the transporter network. Future IT companies related the network access to the providers such as VMware professional services, Switch fast technologies, and McAfee security services. A security structure that delivers an operator with protected admission to the system (Nagarajan, et al.,2012)

 

 

Cyber-attacks occurred in the organization – A cyber-attack befalls in the organization when cybercriminals attempt to advantage of banned admission to automated information deposited on a system or a computer. It might cause economic damage, from stealing money, and evidence interruption to the corporate. The middle man in the attack, SQL injection, and phishing, so on. It occurs over ordinary mistakes similarly an operator selecting an easy-to-guess keyword or not altering the defaulting PIN on roughly corresponding an occupation.

 

Activity 3

Designing and planning the infrastructure

Implementation plan and timeframe for implementation

Implementation plan for protection from cyber attacks
Task

 

Months to implement the task

(Timeframe)

The current situation will be analyzed for the security infrastructure  15 days
Different infrastructure will be designed for the attacks which were identified above 15 days
The collaboration will be done with the stakeholders and the team members 15 days
Security measures and the devices will be determined. 15 days
A dynamic culture of security will be built in the future IT 15 days
Data types that will be used in Cybersecurity infrastructure will be analysed and gathered (Furnell, 2021). 15 days
Security levels will be checked in the cyber security infrastructure of the future IT company 15 days
The network serves which will be required will be analyzed and selected for the future IT 15 days
Network boundaries will be set to secure the future IT company. 15 days
A tool that will be required for implementing in the cyber security of the future IT company will be gathered (Coulson, et al., 2018). 15 days
The network will be accessed for the users of the future 15 days
The budget will be reviewed and finalized 10 days
Security monitoring strategies

For monitoring the security some of the strategies will be developed. The different applications can be used for example Splunk, Wireshark, Solar Winds, etc. these are some of the software which is freeware. This software will help monitor the security within the future IT network and this software even notifies whenever there is any kind of breach of security. A cyber security risk assessment requires an organization to determine its key business objectives and identify the information technology.

One of the main strategies is that one of the employees will be available always for monitoring the security status of the future IT and then they will be taking immediate actions (Nestler, et al., 2018).

Activity 4

Meeting with the manager

Meeting

Date: 11th March 2022

Location: meeting room

Time: 3:00 pm

Attendees- manager and network engineer

Network Engineer – Hello, Good Morning

Manager – Very Good Morning

Network Engineer – How are You?

Manager – I’m fine. Thank you.

Network Engineer- so today we are gathered here to discuss the structure which is developed by me. I have developed the implementation plan for protection from cyber-attacks for the future IT company.

Manager- okay

Network Engineer- there are some of the changes in the infrastructure which are required to be made so that development can take place.

Manager- can I know what is infrastructure design.

Network Engineer- yes sure, the security infrastructure design of the organization is the IT network which controls the communications and the systems of the security information. When the security infrastructure is designed it makes sure of the security of the business operations. It helps to document the security procedures and then it also carries out them. A cyber security risk assessment requires an organization to determine its key business objectives and identify the information technology.

Manager- okay

Network Engineer- so the first thing which will be done is to analyze the current situation for the security infrastructure. As we already had to face the various cyber-attacks.

Manager- yes sure.

Network Engineer- we will design different infrastructures for the attacks.

Manager- what kind of protection we can use.

Network engineer- we will use various types of cyber security infrastructure which we can use for the protection of cyberattacks. Cybersecurity infrastructure uses various types of data as Serious Substructure security, Submission security, Network Telemetry data, Artificial testing and cybernetic software representative data, regulatory and cloud security data, and application appreciation data also used in cybersecurity infrastructure.  We can install the VPN capable firewall, security keys, and office 365 secure score. A cyber security risk assessment requires an organization to determine its key business objectives and identify the information technology.

Manager- okay

Network engineer- we also need to conduct the meeting with the employees and stakeholders for the consultation. They will also know about the various infrastructures for the cyber-attacks. They will also have trained for using this software.

Manager- okay

Network engineer- you tell me one thing that how we can improve our security culture.

Manager- for improving the security culture we can get a secure developmentlifecycle. It is foundational to the sustainable security culture. we can also provide rewards and recognition for those employees who are doing the things for security.

Network engineer- yes, very good. We can also build the security community within the future IT.

Manager- yes that is also a good idea. What kind of security levels we will be used in the cyber security infrastructure of future IT?

Network engineer- our company’s future IT company has some safety or security levels to keep the data from the cyber-attacks as Access Evaluating, Authentication, and Authorization. Risk organization must be recognized, skilled, accomplished, and definite. It contains arranging and evaluating the facts and system. Data safety and safety programs will be essential distinct or similarly established procedures and controls that provision data material. Safety scanning is an involuntary method that examines fundamentals web elements, submission, or devices to check for refuge mistakes. A cyber security risk assessment requires an organization to determine its key business objectives and identify the information technology.

Manager- okay we will check all the levels of security. We will also check the entry-level, mid-level and advanced level security.

Network engineer- yes that will be great.

Manger- which network serves will be required to be analyzed and selected?

Network engineer- there are various types of Network Server which are required, such as Email security that is Significant Influence to reflect when Executing Interacting safety tools, Firewalls are joint basics of a system safety model, Web Security package helps a limited resolve, and Web Subdivision helps to Appropriate possibly negotiated strategies or interferences.

Manger- okay

Network engineer- now in some of the areas I need your feedback. we need to set the network boundaries for protection. Which tools will be beneficial for the organization to use for implementing cyber security

Manager- we can use different applications can be used for example Splunk, Wireshark, Solar Winds, etc. these are some of the software is freeware. This software will help monitor the security within the future IT network and this software even notifies whenever there is any kind of breach of security.

Network engineer- okay sure. The network will be used for the user’s future use.

Manger- okay.

Network engineer- what about the budget according to you how much budget can be allocated

Manager- we can be allotted a budget of $ 50000. Is this being okay for the security?

Network engineer- yes it will be okay. I have also emailed you the implementation plan please review it.

Manager- okay

Network engineer- okay thank you everyone for your valuable feedback.

 

Minutes of Meeting

Meeting Objective: To discuss the structure which was developed earlier

Attendees: manager and network engineer

Venue: meeting room

Date: 11th March 2022

No Points Discussed Actions Suggested Target Date
1 The current situation was discussed.

 

Analyze the current organization situation that there is a need to develop the cyber security infrastructure 25th march 2022
2 Different infrastructure was designed for the attacks which were identified above

 

Application security

Firewalls

Access control

25th march 2022
3  

Security measures and the devices were being determined.

 

Strong passwords will be set

Security software will be used

25th march 2022
4 how dynamic culture of security can be built Regular meeting and training sessions 25th march 2022
5 Data types that will be used in Cyber security infrastructure Substructure security, Submission security, Network Telemetry data

Artificial testing Cybernetic software

25th march 2022
6 Security levels will be checked in the cyber security infrastructure Entry-level

Mid-level

Advance level

25th march 2022
7 Which network serves which will be required will be analyzed and selected for the future IT Email security Interacting safety tools, Firewalls

Web Security

Web Subdivision

25th march 2022
8 A tool which will be required for implementing in the cyber security of the future IT company will be gathered (Mouheb, et al., 2019). Splunk

Wireshark

Solar Winds

25th march 2022
9 The budget for the cybersecurity $ 50,000 budget was allotted. 16th march 2022

Activity 5

Implementation of infrastructure

Network boundaries were created. To create the network boundaries, boundary groups were created.

Network technologies were implemented. It involves the use of data systems to manage and deliver digital resources over the network of computers.

Server technologies were implemented. Email security that is Significant Influence to reflect when Executing Interacting safety tools, Firewalls are joint basics of a system safety model, Web Security package helps a limited resolve, and Web Subdivision helps to Appropriate possibly negotiated strategies or interferences (Jin, et al., 2018).

User’s security was implemented for the users. To the servers, the client needs to prove its identity. Strong passwords will be set to be safe from cyber-attacks.

Various security levels were established. Levels 1, 2, and 3 levels were set.

Some of the strategies were developed to monitor network security. The different applications can be used for example Splunk, Wireshark, Solar Winds, etc. these are some of the software which is freeware. This software will help monitor the security within the future IT network and this software even notifies whenever there is any kind of breach of security.

One of the main strategies is that one of the employees will be available always for monitoring the security status of the future IT and then they will be taking immediate actions (Luedtke, et al., 2019).

Activity 6

Test the infrastructure

There is a need to test the infrastructure. All types of cyber security tests involve the internal teams performing the various activities and the assessments which validate the future IT company security postures.

After testing the security infrastructure report will be created and feedback will be taken based on the findings and feedback so that future IT can mitigate the risk and the issues which are identified can be fixed (Zheng, et al., 2019). A cyber security risk assessment requires an organization to determine its key business objectives and identify the information technology.

 

 

References

Coulson, T., Mason, M., & Nestler, V. (2018). Cyber capability planning and the need for an expanded cybersecurity workforce. Communications of the IIMA16(2), 2.

de Bruijn, H., & Janssen, M. (2017). Building cybersecurity awareness: The need for evidence-based framing strategies. Government Information Quarterly34(1), 1-7.

Furfaro, A., Argento, L., Parise, A., & Piccolo, A. (2017). Using virtual environments for the assessment of cybersecurity issues in IoT scenarios. Simulation Modelling Practice and Theory73, 43-54.

Furnell, S. (2021). The cybersecurity workforce and skills. Computers & Security100, 102080.https://reader.elsevier.com/reader/sd/pii/S0167404820303539?token=F9F91C1ED2B65C785CBC31DCC63AF98DF2E10ED82C338DA4DF91873A4FE7CB7FFDFA96E69E8C1A99508706D5D4D7E413&originRegion=eu-west-1&originCreation=20220311063533

Jin, G., Tu, M., Kim, T. H., Heffron, J., & White, J. (2018). Evaluation of game-based learning in cybersecurity education for high school students. Journal of Education and Learning (EduLearn)12(1), 150-158.https://www.researchgate.net/profile/Ge-Jin-2/publication/324228918_Evaluation_of_Game-Based_Learning_in_Cybersecurity_Education_for_High_School_Students/links/5b7c5a594585151fd124f87a/Evaluation-of-Game-Based-Learning-in-Cybersecurity-Education-for-High-School-Students.pdf

Mouheb, D., Abbas, S., &Mearabti, M. (2019). Cybersecurity curriculum design: A survey. In Transactions on Edutainment XV (pp. 93-107). Springer, Berlin, Heidelberg.https://sci-hub.hkvisa.net/10.1007/978-3-662-59351-6_9

Nagarajan, A., Allbeck, J. M., Sood, A., & Janssen, T. L. (2012, May). Exploring game design for cybersecurity training. In 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER) (pp. 256-262). IEEE.

Rahman, N., Sairi, I., Zizi, N., & Khalid, F. (2020). The importance of cybersecurity education in school. International Journal of Information and Education Technology10(5), 378-382.http://www.ijiet.org/vol10/1393-JR419.pdf

Rebahi, Y., Hohberg, S., Shi, L., Parreira, B. M., Kourtis, A., Comi, P., & Ramos, A. (2015, December). Virtual security appliances: the next generation security. In 2015 International Conference on Communications, Management and Telecommunications (ComManTel) (pp. 103-110). IEEE.

Zheng, K., Albert, L. A., Luedtke, J. R., & Towle, E. (2019). A budgeted maximum multiple coverage model for cybersecurity planning and management. IISE Transactions51(12), 1303-1317.

BSBMKG609  Develop a Marketing Plan

 

Task 1

Business Name: Red rooster

Prepared by:

Student ID:

Date:12th March 20222

The marketing plan of the red rooster

Main address: https://en.wikipedia.org/wiki/Chatswood,_New_South_Wales Australia

ABN:[ABN] ABN51008754096

ACN:[ACN] ACN 008 754 096

[Red Rooster] Marketing Plan Prepared: 12th march 2022]

Table of Contents

Marketing Plan Summary p.

The Business

The Future       

TheMarket      

The Finances

The Business………………………………………………………………………………………………………………. p.

Business overview

S.W.O.T. analysis

S.W.O.T.activity sheet

Products/services

Sales/marketing personnel

The Future………………………………………………………………………………………………………………… p.

Vision statement

Mission statement

Goals/objectives

TheMarket………………………………………………………………………………………………………………… p.

Unique selling position                

Your customers/clients               

Your comp etitors           

Marketresearch            

Markettar gets               

Environmental/industry analysis             

Marketing strategy       

Advertising & sales        

The Finances………………………………………………………………………………………………………………. p.

Price

Expected sales                  

Marketing budget                            

Monitoring/measurement activities        

Supporting documentation……………………………………………………………………………………………. p.

Glossary…………………………………………………………………………………………………………………….. p.

Marketing Plan Summary

For the Red rooster company, the marketing plan has been developed. It is a document that lays out the efforts of marketing for the business in an upcoming time, it is generally a year. The marketing plan of the Red rooster outlines the various marketing strategies, advertising activities, promotional activities which are planned for the particular period. In the marketing plan, the SWOT analysis of the Red rooster is done in which some of the weaknesses and strengths of the red rooster are identified. Strategies are set for one year. Product and services have been developed to increase the sales of the Red rooster and the budget has been allocated for the particular task.

The roles and responsibilities are also analyzed in the marketing plan. Key customers and competitors are identified. Various strategies have also been developed to compete with the competitors. The Red rooster will do print media advertising and online advertising. The Sales strategy which will be used by the red rooster is the SPIN selling technique. The target market of the company is also analyzed. And to whom the services will be provided the most has been also analyzed. To the customers of Australia, the company is providing its services. The target market of the red rooster is divided into three segments. This segment is individual sit-down, individual takeaway, and groups (Bui, 2020).

The Business

 

Business Name: Red rooster

Business structure: Company

 

ABN: ABN51008754096

 

ACN: ACN 008 754 096

 

Business Location: Australia

 

Date established: 1972

 

Business owner(s): Founded by Peter Kailis. The current Owner is Marcus Samuelsson

 

Relevant owner experience: Organisation was established in 1972 and various facilities are provided by the origination in the more than 250+ restaurants in Australia

Products/services: All over Australia, the company provides one of the best quality of food.

 

The Future

 

Vision statement:

 

The vision of Red rooster is to expand business in Asia as well till 2025 and to the individuals provides the heady food services. The slogan of the red rooster is “you can’t get more iconic than RED rooster”

Goals/objectives:

 

The short-term goals of the red rooster are to increase the revenue by June 2022 to 10%.

And the long-term, goal of the red rooster is to expand its business in most of Australia and its nearby countries (Bui, 2020).

 

The Market Target market:

To the customers of Australia, the company is providing its services. The target market of the red rooster is divided into three segments. This segment is individual sit-down, individual takeaway, and groups.

 

Marketing strategy:

 

With the help of the integrated marketing mix, the organization wants to enter the market. By creating the marketing strategy, it will help to create customer awareness regarding the red rooster value. It represents the target market and works towards maintaining and developing the referrals and customers’ loyalty (Ferreira, et al., 2021).

 

The Finances

 

There is a need for $ 300k. this budget will cover the renovation, lease, equipment, and suppliers for the first 6 months.  From the loan, these types of expenses will be covered. 50% loan and 50% of savings.

 

Per week we are expecting a loss of 500-1000 per month 0-3 months.

 

At the 0-3 months we are expecting the breakeven point.

 

Per week we are expecting a profit of up to 250 to 1000 per week.

 

Per week we are expecting around $ 1000 of profit per year 1 to 2 year.

 

All the funds will be obtained from the stakeholders and some amount of the fund will be sought from the other sources.   The owners of the red rooster invested 200k (Dangnga, et al., 2018).

 

 

The Business Business overview

The current business owner of the red rooster is Marcus Samuelsson. It is located in Australia and it has been operating for the last 15 years.

 

S.W.O.T. analysis

 

 

Strengths Weaknesses
1) In the organization new technologies or advanced technologies are used.

2) In Australia the red roosters cover 350+ restaurants.

3) To the customers the good quality of the food is provided.

4) The location at which business is established is the high traffic location.

 

1) Some branches of the red roosters are having a high rental cost.

2) The organization isn’t able to follow all the rules and laws of the organization.

3) Marketing of the organization is not enough (Ritonga, et al., 2018).

 

 

Opportunities Threats
1) Building the loyalty of the customers

2) Build awareness of the brand

3) To become the trendsetter

5) Change the market

6) Scope of expanding the business in other countries.

7) By adopting the new technologies new methods are also coming (Goncharova, et al., 2019).

1) The business is having the threat of cash flows.

2) Employees are not good enough.

3) Unreliable suppliers.

4) Changing demand of the customers

5) Changes in the laws and regulations

 

S.W.O.T. activity sheet

 

 

S.W.O.T                       weakness/ threat Activity to address weakness/threat Activity completion date
1) Some branches of the red roosters is having a high rental cost To address the threat there is a need to increase the red rooster’s own location and place. 6 months
2) The organization isn’t able to follow all the rules and laws of the organization.

 

To address this threat the red rooster will make sure that all the employees must follow all the rules and laws  1 month
3) Marketing of the organization is not enough To address the threat, the activity which is planned is that there is a need to develop new marketing strategies. 2 month
4) Employees are not good enough.

 

To address this, threat their activity which is planned is that training will be provided to the current employees. it will help to increase their skills and knowledge.

 

1 month
5) Changing demand of the customers The address this threat I activity which will be done is regular customers feedback forms will be filled. It will help to know their taste and their preferences (Figueira, et al., 2021).

 

1 month

 

Products/services

 

Product/Service Description Price
Training will be provided to the employees

 

Training will be provided to the employees to increase their skills and knowledge. it will help to increase employee satisfaction. $ 1000
New marketing strategies will be developed New marketing strategies will be developed to increase the organization’s revenue and sales. New Marketing strategies will help to attract new customers. $ 1000
New places will be found to reduce the rest To minimize the rent charges, the red rooster will find the cheaper locations and find their place (Buhaerah, et al., 2018). $ 1000

 

Market position:

In the market, the services fit in the hospitality industry. The services are in the high end. This compares to the competitors in the quality and the varies as well. In Australia, the value of the company is nice so products like chicken wings and chicken roast are liked by the customers.

Unique selling position:

In the market, the product will succeed because of its quality and based on its nutritional value. Red rooster provides food which is having good nutrition as compared to its competitors.

 

Anticipated demand:

The anticipated quality of the customers which they purchase likely is 5 kg chicken roost. The individual customers buy the services every month whereas customers in groups visit the restaurants every 2 months.

 

Pricing strategy:

The red roosters use the cots pricing strategy as this strategy provides more profit to the organization as compared to other pricing strategies.

 

Value to customer:

The customers view our products as the good quality and good nutrition of food/ our customers also like the taste of the dishes as it is different from the red rooster’s competitors.

Growth potential:

In the future anticipated percentage growth of the product and services is a 10% increase in sales.

 

Sales/marketing personnel

 

Job Title Name Responsibilities
Marketing/ Sales Manager Mr.Oliver Green ·         Business activities are supervised and coordinated by the marketing manager.

·         Product and services are evaluated.

·         To create the marketing plan.

·         To study the political and economic environment (Han, et al., 2020).

·         To launch new services and products in the market.

 

 Marketing/ Sales executives Mr. peter smith ·         For the organization research and develop the new marketing and sales strategies.

·         New campaigns and training programs are developed and implemented by the marketing executive.

Marketing/ Sales officer Mr.Chandler  trump ·         To generate the leads.

·         To make sure that sales goals are met.

·         To prepare monthly and weekly reports timely.

·         Determine the pricing schedule for promotion and negotiating.

·         To provide training for the sales employees.

·         Developing in-depth knowledge about the product and services of the company.

 

The Future

Vision statement

The vision for Red rooster is to expand business in Asia as well till 2025 and to the individuals provides the heady food services. The slogan of the red rooster is “you can’t get more iconic than a RED rooster. The company is planning to open the newer branches in the newer market. In the three years to increase its profit by 8%.

 

Mission statement

 

The vision of the red rooster can be achieved by the improvement its customer’s services and developing new marketing strategies.

 

Goals/objectives

  • The short-term goals of the red rooster are to increase the revenue by June 2022 to 10%.
  • Long term goals of the red rooster are to expand its business in most of Australia and its nearby countries.
  • To the customer offer good and high quality of food.
  • At a reasonable price offer the good quality of food.
  • Within the year to open the new branches of the Red rooster.

Some of the activities which will be undertaken to achieve the set objectives are-

  • A simple and delicious menu will be offered to the customers.
  • Recopies will be offered to the customers as per the Australian culture.
  • Make each customer feel important as they are the only customers to the organisation (Rahmat, et al., 2019).

The Market

 

Unique selling position

In the market, the product will succeed because of its quality and based on its nutritional value. Red rooster provides food which is having good nutrition as compared to its competitors. The Red rooster is having advantages as compared to competitors in that it is having a unique demographic location. T organization is also having a unique menu it offers a wide range of recipes as per Australian culture.

 

Your customers/clients

 

Customer demographics

Our target customers are teenagers & youngsters as they love to eat healthy foods and they are more focused on their fitness. They are located and Australia only (Rahman, et al., 2021).

 

Key customers

Our key customers are the customers who are going to the gym and who are more focused on their health and fitness. to them we can target our product and services by adding health ierrecopies to the menu and then we can deliver the product as per their orders at their homes as well.

 

Customer management

We can maintain a good relationship with the customers by drawing regular interactions with the customer. We can also conduct loyalty programs for the customers and ask them to fill out the customer satisfaction form. To keep the customer coming back we can provide some attractive discounts (Ryu, et al., 2019).

 

Your competitors

 

To rate against the competitors some of the steps will be followed-

  • Competitors will be identified.
  • Information will be gathered about the competitors.
  • Competitors’ strengths and weaknesses will be analyzed.
  • Direct communication will be done with the.
  • Competitive advantages will be identified.

Businesses can improve on what their competitors offer by doing innovation in their products or services (Benzaghta, et al., 2021).

 

Competitor details

 

Competitor Established date Size Market share (%) Value         to customers Strengths Weaknesses
Mac Donald April 15, 1955 USD 2107.6 crores 21.2% Good quality, good taste, and highly trained staff The organization provides food which is mostly liked by the children’s and they also provide the toys to attract the customers.

They provide both veg and nonveg food.

Unstable timings
KFC September 24, 1952 USD 27.9 billion 2.82% Good quality of dishes for the individual, the company provides budget-friendly offers (Faier, et al., 2018). The company provides only non-veg food.

Market research

We have gathered the additional data and a questionnaire was conducted. It helped to analyze the market. We have also analyzed the findings (Morgan, et al., 2019).

Market targets

In the coming year, there is need to increase the sales upt0 10%. The annual gross profit will be $ 500 million.

 

Environmental/industry analysis

The market pictures which have been performed at the result was quite impressive and positive as well. The area is experiencing the growth of population and in the area, there are also some long-term employees. The reason economy is also stable and there is no seasonal variation.

The market size is very wide. In the market, the recent trend which has emerged is an online order and food delivery. We will market the change by developing the new marketing strategy. the external factors which can affect our environment (Kim, H. et al., 2020).

 

Marketing strategy

The overall marketing strategy is to provide a good quality of food to customers at a reasonable price. To achieve this objective, market research will be conducted and customer feedback will be taken (Chari, et al., 2019).

 

Marketing activity/milestone Person responsible Date         of expected completion Cost ($) Success indicator
Online advertising Marketing manager 2 months $ 2000 Increase in the sales by 5%.

 

Customers satisfaction form Marketing manager 2 months

 

$ 500 To increase the customer’s rate

 

Advertising & sales

Advertising and promotional strategy

Planned promotion

/advertising type

Promotional strategy Expected                                     business improvement Cost ($) Target date
Print media advertising This promotion is used as this is one of the most liked activities by the customers.  New recipes will be printed every week and it will also attract its customers. It will increase the customer’s satisfaction and sales will also increase. $ 1000 4 months
Online advertising This promotion strategy is used as most of the customers are online. It will increase the sales of the Red rooster. $ 300 4 months

 

Social media strategy

There is a need to do some brand awareness. It will help more and more customers to know about the red rooster services. Blogs will be used to market the red rooster recipes. Timely interaction will be done with the customers (Merzlyakova, et al., 2019).

 

Sales strategy

The SPIN selling technique was used.

 

Sales and distribution channels

Channel type Products/services Percentage of sales (%) Distribution strategy
Shopfront Drink offer and fast food 70% We have decided to use shopfront channel pipe as it will help to increase the red rooster sales.
Direct mail Home delivery 80% We have decided to use this type of channel as customers can utilize their time and they will pick and place your orders easily online.

 

 

The Finances

There is a need for $ 300k. this budget will cover the renovation, lease, equipment, and suppliers for the first 6 months.  From the loan, these types of expenses will be covered. 50% loan and 50% of savings.

 

  • Per week we are expecting a loss of 500-1000 per month 0-3 months.

 

  • At the 0-3 months we are expecting the breakeven point.

 

  • Per week we are expecting a profit of up to 250 to 1000 per week.

 

  • Per week we are expecting around $ 1000 of profit per year 1 to 2 year.

 

  • All the funds will be obtained from the stakeholders and some amount of the fund will be sought from the other sources. The owners of the red rooster invested 200k (Dimitrescu, et al., 2018).

 

Price

For the product, the price is determined by analyzing the customer’s prices. $ 300k was the price that was determined and this price takes into all the cost of accounts. In the costing, the profit margin is also allocated.

 

Expected sales

They expect sales are $ 500 k. in the recent 3 years we hope to achieve the set figures and there are no seasonal influences.

 

Marketing budget [YEAR]

 

Item Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
Marketing/promotion
Marketing agency 1000 1000 1000 1000 1000 1000 1000 1000 1000 1000 1000 1000
Radio advertising
Television advertising
Print advertising 2000 2000 2000 2000 2000 2000 2000 2000 2000 2000 2000 2000
Online advertising 300 300 300 300 300 300 300 300 300 300 300 300
Social media
Web search optimisation
Mailouts
Giveaways 300 300 300 300 300 300 300 300 300 300 300 300
Events
Branding & artwork
Merchandising
Publications
Catalogues
More…
Marketing/ promotion total $3600 $3600 $3600 $3600 $3600 $3600 $3600 $3600 $3600 $3600 $3600 $3600
Other
Research 100 100 100 100 100 100 100 100 100 100 100 100
Travel 100 100 100 100 100 100 100 100 100 100 100 100
Postage 100 100 100 100 100 100 100 100 100 100 100 100
Administration 100 100 100 100 100 100 100 100 100 100 100 100
Incidentals 100 100 100 100 100 100 100 100 100 100 100 100
More…
Other total $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00
Total $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00

 

Monitoring/measurement activities

 

 

Marketing activity Date            of review Monitoring methods Review outcomes
Print advertising, online advertising,

 

6 months website data was used.

 

The result was positive and there has been increase in the sales of the company.
Online advertising

 

6 months distribution channels were used to monitor the impact (Tarman, et al., 2019). The result was positive and there has been increasing in the sales of the company.

 

Supporting documentation

 

I have attached all the supporting documents with this marketing plan. The attached documents include the following-

·         Start-up costing

·         Cash flows

·         Profit and loss statements

·         Balance sheet

Glossary

Australian Business Number (ABN) – a single identifying number used when dealing with other businesses and the Tax Office.

Australian Company Number (ACN) – the number allocated by the Australian Securities and Investments Commission (ASIC) when you register a company under Corporations Law.

 

Blog –is a shortened word for Weblog (see Weblog).

 

Channel – a way of delivering something to its destination, whether it is a message to be communicated or a physical product to be delivered.

Contract – a legally enforceable agreement made between two or more parties. A contract may be a verbal contract or a written contract (or may be partly verbal and partly written).

 

Demographics – the characteristics of a segment of the population, e.g. customers.

 

Domain name – a name that identifies an organization’s address on the internet, either a website address (the domain name follows the ‘www’) or an email address (the domain name follows the ‘@’ symbol in the email address).

Goods and Services Tax (GST) – a broad-based tax of 10 percent on the sale of most goods and services in Australia.

 

High-end – usually refers to expensive or high quality products/services.

 

Market position– referstothepositionanorganization,productorservicehasinthemarket,usually in relation to its competition.

 

Milestone – a goal or objective with a target date.

 

Mission statement – is a statement outlining how an organization intends on achieving its vision.

 

Social media – a group of technology including Blogs, online networks (e.g. Twitter, Facebook, MySpace, LinkedIn) and online collaboration tools often used to expand your network/market reach or collaborate on a large scale.

Unique selling position–a characteristic of a business or a product/service that set sit apart from the competition.

Vision statement – an inspiring statement that expresses an organisation’s main ambitions/goals.

 

Weblog – (also known as a Blog) an individual’s or organisation’s online website displaying a reverse- chronological list of entries (known as posts). Posts typically include thoughts, observations, promotions, links, images or videos. A Weblog is publically available and allows readers to comment on posts.

 

 

Reference

Benzaghta, M. A., Elwalda, A., Mousa, M. M., Erkan, I., & Rahman, M. (2021). SWOT analysis applications: An integrative literature review. Journal of Global Business Insights6(1), 55-73.

Bui, T. T. N. (2020). Inbound Marketing Plan for Small & Medium-Sized Businesses.
Olivas, A. (2021). Creating a Marketing Plan for a Local Small Business.

Dangnga, M. S., Arman, M., &Buhaerah, M. (2018, July). Marketing Strategy Development Model of Increasing Sales Volume of Dangke Cracker: Enrekang Regency Food Specialty. In 2018 3rd International Conference on Education, Sports, Arts and Management Engineering (ICESAME 2018) (pp. 8-11). Atlantis Press.

Dimitrescu, A., Babis, C., Alecusan, A., Chivu, O., &Faier, A. (2018). Management of a marketing plan. Fiability& Durability1, 279-285.

Ferreira, D. C., Marques, R. C., Nunes, A. M., &Figueira, J. R. (2021). Customers satisfaction in pediatric inpatient services: A multiple criteria satisfaction analysis. Socio-Economic Planning Sciences78, 101036.

Goncharova, N. A., Solosichenko, T. Z., &Merzlyakova, N. V. (2019). Brand platform as an element of a company marketing strategy. International Journal of Supply Chain Management8(4), 815.

Han, D., Bae, Y. H., Kim, T. Y., Jung, J., Lee, C., & Kim, H. S. (2020). Classification of Environmental Industry and Technology Competitiveness Evaluation. Journal of Wetlands Research22(4), 245-256.

Morgan, N. A., Whitler, K. A., Feng, H., & Chari, S. (2019). Research in marketing strategy. Journal of the Academy of Marketing Science47(1), 4-29.

Ritonga, H. M., Setiawan, N., El Fikri, M., Pramono, C., Ritonga, M., Hakim, T., &Nasution, M. D. T. P. (2018). Rural Tourism Marketing Strategy AndSwot Analysis: A Case Study Of Bandar PasirMandoge Sub-District In North Sumatera. International Journal of Civil Engineering and Technology9(9), 1617-1631.

Ryu, M. H., Cho, Y., & Lee, D. (2019). Should small-scale online retailers diversify distribution channels into offline channels? Focused on the clothing and fashion industry. Journal of Retailing and Consumer Services47, 74-77.

Tarman, H. A., Soleh, S. M., Ari, A., &Rahmat, T. A. (2019). Leveraging brand equity by applying brand communication and forming city branding based on unique selling proposition (a case of crafts city). J. Bus. Adm. Stud5(5), 74-83.