ICTCYS608 Perform Cyber Security Risk Assessments
Table of Contents
Assessment task 4 – Project. 3
Activity 1. 3
Activity 2. 5
Activity 3. 8
Activity 4. 10
Activity 5. 16
Activity 6. 16
Reference. 18
Assessment task 4 – Project
Activity 1
Discussion of Business Operation
Meeting
Network Engineer – Hello, Good Morning
Manager – Very Good Morning
Network Engineer – How are You ?
Manager – I’m fine. Thank you.
Network Engineer – As we know that we will be deliberating about business procedures that need cyber security and evaluating the work.
Manager – Yes, I know. Future IT company providing IT services such as Application development, technical issues resolution, etc.
Network Engineer – Exactly they are scheduling to implement cybersecurity then giving facilities as protection from cyber-attacks and data breaches.
Manager – So I will provide the information about business and security implemented on the operations.
Network Engineer – Okay! Let’s discussed virtual cyber security
Manager – A virtual space that permits scholars to generate their determined virtual machines, involves a cybernetic laboratory using actual creation agendas.
Network Engineer – It also recognized Many tools to be used Admission controller, Message Safety, Antivirus package, and Cybernetic private network.
Manager – So they required several data as Web telemetry data, Synthetic testing, Controlling data, Application recognition data, and so on. Because it protects all groups of data from injury
Network Engineer – Yes Alright. That’s how they highlight the business operations.
Manager – Cyber security assembles devices, skills, and helps to protect discretion, truthfulness, and computer system availability.
Network engineer – It is also software and monitoring that protects their Email, Network, operating system, and device printing from data theft.
Manager – As they make ICT strategy, applications, Support, and enterprise architecture for a project of the organization.
Network Engineer – Analyzing the association protects hardware and software companies. Problem resolving and announcement skills must be essential.
Manager – yes correct. Thank you.
Meeting Minute Template
Minutes of Meeting: 7 to 10minutes
Meeting Objectives: Providing information and Importance of Cyber security.
Attendees: Network Engineer and Manager
Venue: Room no. 20 (Conference Hall)
Date: 10 March 2022
No
|
Points discussed |
Action Suggested |
Target date |
1.
|
Virtual Cybersecurity of business operation. |
Providing Information on business operation and planned to implement cyber security. |
After 2 months. |
2.
|
Necessities for virtual Cyber security |
Understand security controls for networks, servers, and applications and how to develop compliant policies. |
After 4 months |
3.
|
Business Operation highlights |
Controlling the data and application recognize data, for increase the value of the enterprise and earn of profit.
|
After 5 months |
4.
|
Analysing the business operations which need cyber security |
Making ICT strategy, problem-solving and communication skills must be compulsory for the organization.
|
After 8 months |
Activity 2
Preparation of design infrastructure
Report
Need of cyber security – ICTCYS608 Perform Cyber Security Risk Assessments : They need to instrument the cyber security organization for different cyber-attacks as separately outbreak uses changed designs to avoid the outbreaks, as they want to have different types of cyber security infrastructure. A cyber security risk assessment requires an organization to determine its key business objectives and identify the information technology. Cyber security is significant because it keeps all types of data information from robbery and harm, with facts, personally recognizable material, endangered strength data, knowledgeable property, legislative or trade data, information organizations (de Bruijn, et al., 2017).
|
Data types to use in Cyber security infrastructure – ICTCYS608 Perform Cyber Security Risk Assessments: Cyber security infrastructure uses various types of data as Serious Substructure security, Submission security, Network Telemetry data, Artificial testing and cybernetic software representative data, regulatory and cloud security data, and application appreciation data also used in cyber security infrastructure. A cyber security risk assessment requires an organization to determine its key business objectives and identify the information technology.
|
Security levels in cyber security infrastructure – A future IT company has some safety or security levels to keep the data from the cyber-attacks as Access Evaluating, Authentication, and Authorization. Risk organization must be recognized, skilled, accomplished, and definite. It contains arranging and evaluating the facts and system. Data safety and safety programs will be essential distinct or similarly established procedures and controls that provision data material. Safety scanning is an involuntary method that examines fundamentals web elements, submission, or devices to check for refuge mistakes.
|
Requirements of the network server in cyber security – ICTCYS608 Perform Cyber Security Risk Assessments: It has various types of Network Server which are required, such as Email security that is Significant Influence to reflect when Executing Interacting safety tools, Firewalls are joint basics of a system safety model, Web Security package helps a limited resolve, and Web Subdivision helps to Appropriate possibly negotiated strategies or interferences.
Event organization and security evidence is an organization that combines immediate system circulation monitoring with ancient statistics record folder scanning. Mobile device safety is measured planned to keep complex material deposited on and conducted by laptops, smart phones, tablets, and other devices. |
Network boundaries to secure – A network boundary is monitoring and regulator of infrastructures at the exterior limit of an evidence system to avoid and perceive hateful and additional unlawful transportation. A line of connection between two areas, or atmospheres that have changed security desires or wants. Operative design, connection, formation, and preservation of web boundary safety instruments thoughtful responsibilities providing in active network security.
|
Tools required for implementing cyber security – An operative tool that arranges of any extent can use correct nowadays to revenue act to diminish cyber risk. A Force point is a personalized safety tool mostly considered for cloud users. It is used to describe web security, confine operators from editing specific satisfied, and wedge several invasion efforts. Keypass is an effective encoding device used for individuality organization. Life Lock helps to monitor for recognizing stealing and pressures as well as to perceive, be aware of, and block cybercrimes. VPN tool is strongly related to two webs organized crosswise and entrusted systems. Antivirus software is a planned tool to explore and eradicate package viruses. Metasploit is the best safety package that comprises several tools for implementing dispersion difficult facilities.
|
Network access to users – A network that links to contributors to a specific facility and wage-earner, over the transporter network. Future IT companies related the network access to the providers such as VMware professional services, Switch fast technologies, and McAfee security services. A security structure that delivers an operator with protected admission to the system (Nagarajan, et al.,2012)
|
Cyber-attacks occurred in the organization – A cyber-attack befalls in the organization when cybercriminals attempt to advantage of banned admission to automated information deposited on a system or a computer. It might cause economic damage, from stealing money, and evidence interruption to the corporate. The middle man in the attack, SQL injection, and phishing, so on. It occurs over ordinary mistakes similarly an operator selecting an easy-to-guess keyword or not altering the defaulting PIN on roughly corresponding an occupation.
|
Activity 3
Designing and planning the infrastructure
Implementation plan and timeframe for implementation
Implementation plan for protection from cyber attacks |
Task
|
Months to implement the task
(Timeframe) |
The current situation will be analyzed for the security infrastructure |
15 days |
Different infrastructure will be designed for the attacks which were identified above |
15 days |
The collaboration will be done with the stakeholders and the team members |
15 days |
Security measures and the devices will be determined. |
15 days |
A dynamic culture of security will be built in the future IT |
15 days |
Data types that will be used in Cybersecurity infrastructure will be analysed and gathered (Furnell, 2021). |
15 days |
Security levels will be checked in the cyber security infrastructure of the future IT company |
15 days |
The network serves which will be required will be analyzed and selected for the future IT |
15 days |
Network boundaries will be set to secure the future IT company. |
15 days |
A tool that will be required for implementing in the cyber security of the future IT company will be gathered (Coulson, et al., 2018). |
15 days |
The network will be accessed for the users of the future |
15 days |
The budget will be reviewed and finalized |
10 days |
|
Security monitoring strategies
For monitoring the security some of the strategies will be developed. The different applications can be used for example Splunk, Wireshark, Solar Winds, etc. these are some of the software which is freeware. This software will help monitor the security within the future IT network and this software even notifies whenever there is any kind of breach of security. A cyber security risk assessment requires an organization to determine its key business objectives and identify the information technology.
One of the main strategies is that one of the employees will be available always for monitoring the security status of the future IT and then they will be taking immediate actions (Nestler, et al., 2018). |
Activity 4
Meeting with the manager
Meeting
Date: 11th March 2022
Location: meeting room
Time: 3:00 pm
Attendees- manager and network engineer
Network Engineer – Hello, Good Morning
Manager – Very Good Morning
Network Engineer – How are You?
Manager – I’m fine. Thank you.
Network Engineer- so today we are gathered here to discuss the structure which is developed by me. I have developed the implementation plan for protection from cyber-attacks for the future IT company.
Manager- okay
Network Engineer- there are some of the changes in the infrastructure which are required to be made so that development can take place.
Manager- can I know what is infrastructure design.
Network Engineer- yes sure, the security infrastructure design of the organization is the IT network which controls the communications and the systems of the security information. When the security infrastructure is designed it makes sure of the security of the business operations. It helps to document the security procedures and then it also carries out them. A cyber security risk assessment requires an organization to determine its key business objectives and identify the information technology.
Manager- okay
Network Engineer- so the first thing which will be done is to analyze the current situation for the security infrastructure. As we already had to face the various cyber-attacks.
Manager- yes sure.
Network Engineer- we will design different infrastructures for the attacks.
Manager- what kind of protection we can use.
Network engineer- we will use various types of cyber security infrastructure which we can use for the protection of cyberattacks. Cybersecurity infrastructure uses various types of data as Serious Substructure security, Submission security, Network Telemetry data, Artificial testing and cybernetic software representative data, regulatory and cloud security data, and application appreciation data also used in cybersecurity infrastructure. We can install the VPN capable firewall, security keys, and office 365 secure score. A cyber security risk assessment requires an organization to determine its key business objectives and identify the information technology.
Manager- okay
Network engineer- we also need to conduct the meeting with the employees and stakeholders for the consultation. They will also know about the various infrastructures for the cyber-attacks. They will also have trained for using this software.
Manager- okay
Network engineer- you tell me one thing that how we can improve our security culture.
Manager- for improving the security culture we can get a secure developmentlifecycle. It is foundational to the sustainable security culture. we can also provide rewards and recognition for those employees who are doing the things for security.
Network engineer- yes, very good. We can also build the security community within the future IT.
Manager- yes that is also a good idea. What kind of security levels we will be used in the cyber security infrastructure of future IT?
Network engineer- our company’s future IT company has some safety or security levels to keep the data from the cyber-attacks as Access Evaluating, Authentication, and Authorization. Risk organization must be recognized, skilled, accomplished, and definite. It contains arranging and evaluating the facts and system. Data safety and safety programs will be essential distinct or similarly established procedures and controls that provision data material. Safety scanning is an involuntary method that examines fundamentals web elements, submission, or devices to check for refuge mistakes. A cyber security risk assessment requires an organization to determine its key business objectives and identify the information technology.
Manager- okay we will check all the levels of security. We will also check the entry-level, mid-level and advanced level security.
Network engineer- yes that will be great.
Manger- which network serves will be required to be analyzed and selected?
Network engineer- there are various types of Network Server which are required, such as Email security that is Significant Influence to reflect when Executing Interacting safety tools, Firewalls are joint basics of a system safety model, Web Security package helps a limited resolve, and Web Subdivision helps to Appropriate possibly negotiated strategies or interferences.
Manger- okay
Network engineer- now in some of the areas I need your feedback. we need to set the network boundaries for protection. Which tools will be beneficial for the organization to use for implementing cyber security
Manager- we can use different applications can be used for example Splunk, Wireshark, Solar Winds, etc. these are some of the software is freeware. This software will help monitor the security within the future IT network and this software even notifies whenever there is any kind of breach of security.
Network engineer- okay sure. The network will be used for the user’s future use.
Manger- okay.
Network engineer- what about the budget according to you how much budget can be allocated
Manager- we can be allotted a budget of $ 50000. Is this being okay for the security?
Network engineer- yes it will be okay. I have also emailed you the implementation plan please review it.
Manager- okay
Network engineer- okay thank you everyone for your valuable feedback. |
Minutes of Meeting
Meeting Objective: To discuss the structure which was developed earlier
Attendees: manager and network engineer
Venue: meeting room
Date: 11th March 2022 |
No |
Points Discussed |
Actions Suggested |
Target Date |
1 |
The current situation was discussed.
|
Analyze the current organization situation that there is a need to develop the cyber security infrastructure |
25th march 2022 |
2 |
Different infrastructure was designed for the attacks which were identified above
|
Application security
Firewalls
Access control |
25th march 2022 |
3 |
Security measures and the devices were being determined.
|
Strong passwords will be set
Security software will be used |
25th march 2022 |
4 |
how dynamic culture of security can be built |
Regular meeting and training sessions |
25th march 2022 |
5 |
Data types that will be used in Cyber security infrastructure |
Substructure security, Submission security, Network Telemetry data
Artificial testing Cybernetic software |
25th march 2022 |
6 |
Security levels will be checked in the cyber security infrastructure |
Entry-level
Mid-level
Advance level |
25th march 2022 |
7 |
Which network serves which will be required will be analyzed and selected for the future IT |
Email security Interacting safety tools, Firewalls
Web Security
Web Subdivision |
25th march 2022 |
8 |
A tool which will be required for implementing in the cyber security of the future IT company will be gathered (Mouheb, et al., 2019). |
Splunk
Wireshark
Solar Winds |
25th march 2022 |
9 |
The budget for the cybersecurity |
$ 50,000 budget was allotted. |
16th march 2022 |
Activity 5
Implementation of infrastructure
Network boundaries were created. To create the network boundaries, boundary groups were created.
Network technologies were implemented. It involves the use of data systems to manage and deliver digital resources over the network of computers.
Server technologies were implemented. Email security that is Significant Influence to reflect when Executing Interacting safety tools, Firewalls are joint basics of a system safety model, Web Security package helps a limited resolve, and Web Subdivision helps to Appropriate possibly negotiated strategies or interferences (Jin, et al., 2018).
User’s security was implemented for the users. To the servers, the client needs to prove its identity. Strong passwords will be set to be safe from cyber-attacks.
Various security levels were established. Levels 1, 2, and 3 levels were set.
Some of the strategies were developed to monitor network security. The different applications can be used for example Splunk, Wireshark, Solar Winds, etc. these are some of the software which is freeware. This software will help monitor the security within the future IT network and this software even notifies whenever there is any kind of breach of security.
One of the main strategies is that one of the employees will be available always for monitoring the security status of the future IT and then they will be taking immediate actions (Luedtke, et al., 2019).
Activity 6
Test the infrastructure
There is a need to test the infrastructure. All types of cyber security tests involve the internal teams performing the various activities and the assessments which validate the future IT company security postures.
After testing the security infrastructure report will be created and feedback will be taken based on the findings and feedback so that future IT can mitigate the risk and the issues which are identified can be fixed (Zheng, et al., 2019). A cyber security risk assessment requires an organization to determine its key business objectives and identify the information technology.
References
Coulson, T., Mason, M., & Nestler, V. (2018). Cyber capability planning and the need for an expanded cybersecurity workforce. Communications of the IIMA, 16(2), 2.
de Bruijn, H., & Janssen, M. (2017). Building cybersecurity awareness: The need for evidence-based framing strategies. Government Information Quarterly, 34(1), 1-7.
Furfaro, A., Argento, L., Parise, A., & Piccolo, A. (2017). Using virtual environments for the assessment of cybersecurity issues in IoT scenarios. Simulation Modelling Practice and Theory, 73, 43-54.
Furnell, S. (2021). The cybersecurity workforce and skills. Computers & Security, 100, 102080.https://reader.elsevier.com/reader/sd/pii/S0167404820303539?token=F9F91C1ED2B65C785CBC31DCC63AF98DF2E10ED82C338DA4DF91873A4FE7CB7FFDFA96E69E8C1A99508706D5D4D7E413&originRegion=eu-west-1&originCreation=20220311063533
Jin, G., Tu, M., Kim, T. H., Heffron, J., & White, J. (2018). Evaluation of game-based learning in cybersecurity education for high school students. Journal of Education and Learning (EduLearn), 12(1), 150-158.https://www.researchgate.net/profile/Ge-Jin-2/publication/324228918_Evaluation_of_Game-Based_Learning_in_Cybersecurity_Education_for_High_School_Students/links/5b7c5a594585151fd124f87a/Evaluation-of-Game-Based-Learning-in-Cybersecurity-Education-for-High-School-Students.pdf
Mouheb, D., Abbas, S., &Mearabti, M. (2019). Cybersecurity curriculum design: A survey. In Transactions on Edutainment XV (pp. 93-107). Springer, Berlin, Heidelberg.https://sci-hub.hkvisa.net/10.1007/978-3-662-59351-6_9
Nagarajan, A., Allbeck, J. M., Sood, A., & Janssen, T. L. (2012, May). Exploring game design for cybersecurity training. In 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER) (pp. 256-262). IEEE.
Rahman, N., Sairi, I., Zizi, N., & Khalid, F. (2020). The importance of cybersecurity education in school. International Journal of Information and Education Technology, 10(5), 378-382.http://www.ijiet.org/vol10/1393-JR419.pdf
Rebahi, Y., Hohberg, S., Shi, L., Parreira, B. M., Kourtis, A., Comi, P., & Ramos, A. (2015, December). Virtual security appliances: the next generation security. In 2015 International Conference on Communications, Management and Telecommunications (ComManTel) (pp. 103-110). IEEE.
Zheng, K., Albert, L. A., Luedtke, J. R., & Towle, E. (2019). A budgeted maximum multiple coverage model for cybersecurity planning and management. IISE Transactions, 51(12), 1303-1317.
BSBMKG609 Develop a Marketing Plan
Task 1
Business Name: Red rooster
Prepared by:
Student ID:
Date:12th March 20222
The marketing plan of the red rooster
Main address: https://en.wikipedia.org/wiki/Chatswood,_New_South_Wales Australia
ABN:[ABN] ABN51008754096
ACN:[ACN] ACN 008 754 096
[Red Rooster] Marketing Plan Prepared: 12th march 2022]
Table of Contents
Marketing Plan Summary p.
The Business
The Future
TheMarket
The Finances
The Business………………………………………………………………………………………………………………. p.
Business overview
S.W.O.T. analysis
S.W.O.T.activity sheet
Products/services
Sales/marketing personnel
The Future………………………………………………………………………………………………………………… p.
Vision statement
Mission statement
Goals/objectives
TheMarket………………………………………………………………………………………………………………… p.
Unique selling position
Your customers/clients
Your comp etitors
Marketresearch
Markettar gets
Environmental/industry analysis
Marketing strategy
Advertising & sales
The Finances………………………………………………………………………………………………………………. p.
Price
Expected sales
Marketing budget
Monitoring/measurement activities
Supporting documentation……………………………………………………………………………………………. p.
Glossary…………………………………………………………………………………………………………………….. p.
Marketing Plan Summary
For the Red rooster company, the marketing plan has been developed. It is a document that lays out the efforts of marketing for the business in an upcoming time, it is generally a year. The marketing plan of the Red rooster outlines the various marketing strategies, advertising activities, promotional activities which are planned for the particular period. In the marketing plan, the SWOT analysis of the Red rooster is done in which some of the weaknesses and strengths of the red rooster are identified. Strategies are set for one year. Product and services have been developed to increase the sales of the Red rooster and the budget has been allocated for the particular task.
The roles and responsibilities are also analyzed in the marketing plan. Key customers and competitors are identified. Various strategies have also been developed to compete with the competitors. The Red rooster will do print media advertising and online advertising. The Sales strategy which will be used by the red rooster is the SPIN selling technique. The target market of the company is also analyzed. And to whom the services will be provided the most has been also analyzed. To the customers of Australia, the company is providing its services. The target market of the red rooster is divided into three segments. This segment is individual sit-down, individual takeaway, and groups (Bui, 2020).
The Business
Business Name: Red rooster
Business structure: Company
ABN: ABN51008754096
ACN: ACN 008 754 096
Business Location: Australia
Date established: 1972
Business owner(s): Founded by Peter Kailis. The current Owner is Marcus Samuelsson
Relevant owner experience: Organisation was established in 1972 and various facilities are provided by the origination in the more than 250+ restaurants in Australia
Products/services: All over Australia, the company provides one of the best quality of food.
The Future
Vision statement:
The vision of Red rooster is to expand business in Asia as well till 2025 and to the individuals provides the heady food services. The slogan of the red rooster is “you can’t get more iconic than RED rooster”
Goals/objectives:
The short-term goals of the red rooster are to increase the revenue by June 2022 to 10%.
And the long-term, goal of the red rooster is to expand its business in most of Australia and its nearby countries (Bui, 2020).
The Market Target market:
To the customers of Australia, the company is providing its services. The target market of the red rooster is divided into three segments. This segment is individual sit-down, individual takeaway, and groups.
Marketing strategy:
With the help of the integrated marketing mix, the organization wants to enter the market. By creating the marketing strategy, it will help to create customer awareness regarding the red rooster value. It represents the target market and works towards maintaining and developing the referrals and customers’ loyalty (Ferreira, et al., 2021).
The Finances
There is a need for $ 300k. this budget will cover the renovation, lease, equipment, and suppliers for the first 6 months. From the loan, these types of expenses will be covered. 50% loan and 50% of savings.
Per week we are expecting a loss of 500-1000 per month 0-3 months.
At the 0-3 months we are expecting the breakeven point.
Per week we are expecting a profit of up to 250 to 1000 per week.
Per week we are expecting around $ 1000 of profit per year 1 to 2 year.
All the funds will be obtained from the stakeholders and some amount of the fund will be sought from the other sources. The owners of the red rooster invested 200k (Dangnga, et al., 2018).
The Business Business overview
The current business owner of the red rooster is Marcus Samuelsson. It is located in Australia and it has been operating for the last 15 years.
S.W.O.T. analysis
Strengths |
Weaknesses |
1) In the organization new technologies or advanced technologies are used.
2) In Australia the red roosters cover 350+ restaurants.
3) To the customers the good quality of the food is provided.
4) The location at which business is established is the high traffic location.
|
1) Some branches of the red roosters are having a high rental cost.
2) The organization isn’t able to follow all the rules and laws of the organization.
3) Marketing of the organization is not enough (Ritonga, et al., 2018). |
Opportunities |
Threats |
1) Building the loyalty of the customers
2) Build awareness of the brand
3) To become the trendsetter
5) Change the market
6) Scope of expanding the business in other countries.
7) By adopting the new technologies new methods are also coming (Goncharova, et al., 2019). |
1) The business is having the threat of cash flows.
2) Employees are not good enough.
3) Unreliable suppliers.
4) Changing demand of the customers
5) Changes in the laws and regulations |
S.W.O.T. activity sheet
S.W.O.T weakness/ threat |
Activity to address weakness/threat |
Activity completion date |
1) Some branches of the red roosters is having a high rental cost |
To address the threat there is a need to increase the red rooster’s own location and place. |
6 months |
2) The organization isn’t able to follow all the rules and laws of the organization.
|
To address this threat the red rooster will make sure that all the employees must follow all the rules and laws |
1 month |
3) Marketing of the organization is not enough |
To address the threat, the activity which is planned is that there is a need to develop new marketing strategies. |
2 month |
4) Employees are not good enough.
|
To address this, threat their activity which is planned is that training will be provided to the current employees. it will help to increase their skills and knowledge.
|
1 month |
5) Changing demand of the customers |
The address this threat I activity which will be done is regular customers feedback forms will be filled. It will help to know their taste and their preferences (Figueira, et al., 2021).
|
1 month |
Products/services
Product/Service |
Description |
Price |
Training will be provided to the employees
|
Training will be provided to the employees to increase their skills and knowledge. it will help to increase employee satisfaction. |
$ 1000 |
New marketing strategies will be developed |
New marketing strategies will be developed to increase the organization’s revenue and sales. New Marketing strategies will help to attract new customers. |
$ 1000 |
New places will be found to reduce the rest |
To minimize the rent charges, the red rooster will find the cheaper locations and find their place (Buhaerah, et al., 2018). |
$ 1000 |
Market position:
In the market, the services fit in the hospitality industry. The services are in the high end. This compares to the competitors in the quality and the varies as well. In Australia, the value of the company is nice so products like chicken wings and chicken roast are liked by the customers.
Unique selling position:
In the market, the product will succeed because of its quality and based on its nutritional value. Red rooster provides food which is having good nutrition as compared to its competitors.
Anticipated demand:
The anticipated quality of the customers which they purchase likely is 5 kg chicken roost. The individual customers buy the services every month whereas customers in groups visit the restaurants every 2 months.
Pricing strategy:
The red roosters use the cots pricing strategy as this strategy provides more profit to the organization as compared to other pricing strategies.
Value to customer:
The customers view our products as the good quality and good nutrition of food/ our customers also like the taste of the dishes as it is different from the red rooster’s competitors.
Growth potential:
In the future anticipated percentage growth of the product and services is a 10% increase in sales.
Sales/marketing personnel
Job Title |
Name |
Responsibilities |
Marketing/ Sales Manager |
Mr.Oliver Green |
· Business activities are supervised and coordinated by the marketing manager.
· Product and services are evaluated.
· To create the marketing plan.
· To study the political and economic environment (Han, et al., 2020).
· To launch new services and products in the market.
|
Marketing/ Sales executives |
Mr. peter smith |
· For the organization research and develop the new marketing and sales strategies.
· New campaigns and training programs are developed and implemented by the marketing executive. |
Marketing/ Sales officer |
Mr.Chandler trump |
· To generate the leads.
· To make sure that sales goals are met.
· To prepare monthly and weekly reports timely.
· Determine the pricing schedule for promotion and negotiating.
· To provide training for the sales employees.
· Developing in-depth knowledge about the product and services of the company. |
The Future
Vision statement
The vision for Red rooster is to expand business in Asia as well till 2025 and to the individuals provides the heady food services. The slogan of the red rooster is “you can’t get more iconic than a RED rooster. The company is planning to open the newer branches in the newer market. In the three years to increase its profit by 8%.
Mission statement
The vision of the red rooster can be achieved by the improvement its customer’s services and developing new marketing strategies.
Goals/objectives
- The short-term goals of the red rooster are to increase the revenue by June 2022 to 10%.
- Long term goals of the red rooster are to expand its business in most of Australia and its nearby countries.
- To the customer offer good and high quality of food.
- At a reasonable price offer the good quality of food.
- Within the year to open the new branches of the Red rooster.
Some of the activities which will be undertaken to achieve the set objectives are-
- A simple and delicious menu will be offered to the customers.
- Recopies will be offered to the customers as per the Australian culture.
- Make each customer feel important as they are the only customers to the organisation (Rahmat, et al., 2019).
The Market
Unique selling position
In the market, the product will succeed because of its quality and based on its nutritional value. Red rooster provides food which is having good nutrition as compared to its competitors. The Red rooster is having advantages as compared to competitors in that it is having a unique demographic location. T organization is also having a unique menu it offers a wide range of recipes as per Australian culture.
Your customers/clients
Customer demographics
Our target customers are teenagers & youngsters as they love to eat healthy foods and they are more focused on their fitness. They are located and Australia only (Rahman, et al., 2021).
Key customers
Our key customers are the customers who are going to the gym and who are more focused on their health and fitness. to them we can target our product and services by adding health ierrecopies to the menu and then we can deliver the product as per their orders at their homes as well.
Customer management
We can maintain a good relationship with the customers by drawing regular interactions with the customer. We can also conduct loyalty programs for the customers and ask them to fill out the customer satisfaction form. To keep the customer coming back we can provide some attractive discounts (Ryu, et al., 2019).
Your competitors
To rate against the competitors some of the steps will be followed-
- Competitors will be identified.
- Information will be gathered about the competitors.
- Competitors’ strengths and weaknesses will be analyzed.
- Direct communication will be done with the.
- Competitive advantages will be identified.
Businesses can improve on what their competitors offer by doing innovation in their products or services (Benzaghta, et al., 2021).
Competitor details
Competitor |
Established date |
Size |
Market share (%) |
Value to customers |
Strengths |
Weaknesses |
Mac Donald |
April 15, 1955 |
USD 2107.6 crores |
21.2% |
Good quality, good taste, and highly trained staff |
The organization provides food which is mostly liked by the children’s and they also provide the toys to attract the customers.
They provide both veg and nonveg food. |
Unstable timings |
KFC |
September 24, 1952 |
USD 27.9 billion |
2.82% |
Good quality of dishes |
for the individual, the company provides budget-friendly offers (Faier, et al., 2018). |
The company provides only non-veg food. |
Market research
We have gathered the additional data and a questionnaire was conducted. It helped to analyze the market. We have also analyzed the findings (Morgan, et al., 2019).
Market targets
In the coming year, there is need to increase the sales upt0 10%. The annual gross profit will be $ 500 million.
Environmental/industry analysis
The market pictures which have been performed at the result was quite impressive and positive as well. The area is experiencing the growth of population and in the area, there are also some long-term employees. The reason economy is also stable and there is no seasonal variation.
The market size is very wide. In the market, the recent trend which has emerged is an online order and food delivery. We will market the change by developing the new marketing strategy. the external factors which can affect our environment (Kim, H. et al., 2020).
Marketing strategy
The overall marketing strategy is to provide a good quality of food to customers at a reasonable price. To achieve this objective, market research will be conducted and customer feedback will be taken (Chari, et al., 2019).
Marketing activity/milestone |
Person responsible |
Date of expected completion |
Cost ($) |
Success indicator |
Online advertising |
Marketing manager |
2 months |
$ 2000 |
Increase in the sales by 5%.
|
Customers satisfaction form |
Marketing manager |
2 months
|
$ 500 |
To increase the customer’s rate |
Advertising & sales
Advertising and promotional strategy
Planned promotion
/advertising type |
Promotional strategy |
Expected business improvement |
Cost ($) |
Target date |
Print media advertising |
This promotion is used as this is one of the most liked activities by the customers. New recipes will be printed every week and it will also attract its customers. |
It will increase the customer’s satisfaction and sales will also increase. |
$ 1000 |
4 months |
Online advertising |
This promotion strategy is used as most of the customers are online. |
It will increase the sales of the Red rooster. |
$ 300 |
4 months |
Social media strategy
There is a need to do some brand awareness. It will help more and more customers to know about the red rooster services. Blogs will be used to market the red rooster recipes. Timely interaction will be done with the customers (Merzlyakova, et al., 2019).
Sales strategy
The SPIN selling technique was used.
Sales and distribution channels
Channel type |
Products/services |
Percentage of sales (%) |
Distribution strategy |
Shopfront |
Drink offer and fast food |
70% |
We have decided to use shopfront channel pipe as it will help to increase the red rooster sales. |
Direct mail |
Home delivery |
80% |
We have decided to use this type of channel as customers can utilize their time and they will pick and place your orders easily online. |
The Finances
There is a need for $ 300k. this budget will cover the renovation, lease, equipment, and suppliers for the first 6 months. From the loan, these types of expenses will be covered. 50% loan and 50% of savings.
- Per week we are expecting a loss of 500-1000 per month 0-3 months.
- At the 0-3 months we are expecting the breakeven point.
- Per week we are expecting a profit of up to 250 to 1000 per week.
- Per week we are expecting around $ 1000 of profit per year 1 to 2 year.
- All the funds will be obtained from the stakeholders and some amount of the fund will be sought from the other sources. The owners of the red rooster invested 200k (Dimitrescu, et al., 2018).
Price
For the product, the price is determined by analyzing the customer’s prices. $ 300k was the price that was determined and this price takes into all the cost of accounts. In the costing, the profit margin is also allocated.
Expected sales
They expect sales are $ 500 k. in the recent 3 years we hope to achieve the set figures and there are no seasonal influences.
Marketing budget [YEAR]
Item |
Jan |
Feb |
Mar |
Apr |
May |
Jun |
Jul |
Aug |
Sep |
Oct |
Nov |
Dec |
Marketing/promotion |
|
|
|
|
|
|
|
|
|
|
|
|
Marketing agency |
1000 |
1000 |
1000 |
1000 |
1000 |
1000 |
1000 |
1000 |
1000 |
1000 |
1000 |
1000 |
Radio advertising |
|
|
|
|
|
|
|
|
|
|
|
|
Television advertising |
|
|
|
|
|
|
|
|
|
|
|
|
Print advertising |
2000 |
2000 |
2000 |
2000 |
2000 |
2000 |
2000 |
2000 |
2000 |
2000 |
2000 |
2000 |
Online advertising |
300 |
300 |
300 |
300 |
300 |
300 |
300 |
300 |
300 |
300 |
300 |
300 |
Social media |
|
|
|
|
|
|
|
|
|
|
|
|
Web search optimisation |
|
|
|
|
|
|
|
|
|
|
|
|
Mailouts |
|
|
|
|
|
|
|
|
|
|
|
|
Giveaways |
300 |
300 |
300 |
300 |
300 |
300 |
300 |
300 |
300 |
300 |
300 |
300 |
Events |
|
|
|
|
|
|
|
|
|
|
|
|
Branding & artwork |
|
|
|
|
|
|
|
|
|
|
|
|
Merchandising |
|
|
|
|
|
|
|
|
|
|
|
|
Publications |
|
|
|
|
|
|
|
|
|
|
|
|
Catalogues |
|
|
|
|
|
|
|
|
|
|
|
|
More… |
|
|
|
|
|
|
|
|
|
|
|
|
Marketing/ promotion total |
$3600 |
$3600 |
$3600 |
$3600 |
$3600 |
$3600 |
$3600 |
$3600 |
$3600 |
$3600 |
$3600 |
$3600 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Other |
|
|
|
|
|
|
|
|
|
|
|
|
Research |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
Travel |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
Postage |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
Administration |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
Incidentals |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
100 |
More… |
|
|
|
|
|
|
|
|
|
|
|
|
Other total |
$0.00 |
$0.00 |
$0.00 |
$0.00 |
$0.00 |
$0.00 |
$0.00 |
$0.00 |
$0.00 |
$0.00 |
$0.00 |
$0.00 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Total |
$0.00 |
$0.00 |
$0.00 |
$0.00 |
$0.00 |
$0.00 |
$0.00 |
$0.00 |
$0.00 |
$0.00 |
$0.00 |
$0.00 |
Monitoring/measurement activities
Marketing activity |
Date of review |
Monitoring methods |
Review outcomes |
Print advertising, online advertising,
|
6 months |
website data was used.
|
The result was positive and there has been increase in the sales of the company. |
Online advertising
|
6 months |
distribution channels were used to monitor the impact (Tarman, et al., 2019). |
The result was positive and there has been increasing in the sales of the company. |
Supporting documentation
I have attached all the supporting documents with this marketing plan. The attached documents include the following-
· Start-up costing
· Cash flows
· Profit and loss statements
· Balance sheet
Glossary
Australian Business Number (ABN) – a single identifying number used when dealing with other businesses and the Tax Office.
Australian Company Number (ACN) – the number allocated by the Australian Securities and Investments Commission (ASIC) when you register a company under Corporations Law.
Blog –is a shortened word for Weblog (see Weblog).
Channel – a way of delivering something to its destination, whether it is a message to be communicated or a physical product to be delivered.
Contract – a legally enforceable agreement made between two or more parties. A contract may be a verbal contract or a written contract (or may be partly verbal and partly written).
Demographics – the characteristics of a segment of the population, e.g. customers.
Domain name – a name that identifies an organization’s address on the internet, either a website address (the domain name follows the ‘www’) or an email address (the domain name follows the ‘@’ symbol in the email address).
Goods and Services Tax (GST) – a broad-based tax of 10 percent on the sale of most goods and services in Australia.
High-end – usually refers to expensive or high quality products/services.
Market position– referstothepositionanorganization,productorservicehasinthemarket,usually in relation to its competition.
Milestone – a goal or objective with a target date.
Mission statement – is a statement outlining how an organization intends on achieving its vision.
Social media – a group of technology including Blogs, online networks (e.g. Twitter, Facebook, MySpace, LinkedIn) and online collaboration tools often used to expand your network/market reach or collaborate on a large scale.
Unique selling position–a characteristic of a business or a product/service that set sit apart from the competition.
Vision statement – an inspiring statement that expresses an organisation’s main ambitions/goals.
Weblog – (also known as a Blog) an individual’s or organisation’s online website displaying a reverse- chronological list of entries (known as posts). Posts typically include thoughts, observations, promotions, links, images or videos. A Weblog is publically available and allows readers to comment on posts.
Reference
Benzaghta, M. A., Elwalda, A., Mousa, M. M., Erkan, I., & Rahman, M. (2021). SWOT analysis applications: An integrative literature review. Journal of Global Business Insights, 6(1), 55-73.
Bui, T. T. N. (2020). Inbound Marketing Plan for Small & Medium-Sized Businesses.
Olivas, A. (2021). Creating a Marketing Plan for a Local Small Business.
Dangnga, M. S., Arman, M., &Buhaerah, M. (2018, July). Marketing Strategy Development Model of Increasing Sales Volume of Dangke Cracker: Enrekang Regency Food Specialty. In 2018 3rd International Conference on Education, Sports, Arts and Management Engineering (ICESAME 2018) (pp. 8-11). Atlantis Press.
Dimitrescu, A., Babis, C., Alecusan, A., Chivu, O., &Faier, A. (2018). Management of a marketing plan. Fiability& Durability, 1, 279-285.
Ferreira, D. C., Marques, R. C., Nunes, A. M., &Figueira, J. R. (2021). Customers satisfaction in pediatric inpatient services: A multiple criteria satisfaction analysis. Socio-Economic Planning Sciences, 78, 101036.
Goncharova, N. A., Solosichenko, T. Z., &Merzlyakova, N. V. (2019). Brand platform as an element of a company marketing strategy. International Journal of Supply Chain Management, 8(4), 815.
Han, D., Bae, Y. H., Kim, T. Y., Jung, J., Lee, C., & Kim, H. S. (2020). Classification of Environmental Industry and Technology Competitiveness Evaluation. Journal of Wetlands Research, 22(4), 245-256.
Morgan, N. A., Whitler, K. A., Feng, H., & Chari, S. (2019). Research in marketing strategy. Journal of the Academy of Marketing Science, 47(1), 4-29.
Ritonga, H. M., Setiawan, N., El Fikri, M., Pramono, C., Ritonga, M., Hakim, T., &Nasution, M. D. T. P. (2018). Rural Tourism Marketing Strategy AndSwot Analysis: A Case Study Of Bandar PasirMandoge Sub-District In North Sumatera. International Journal of Civil Engineering and Technology, 9(9), 1617-1631.
Ryu, M. H., Cho, Y., & Lee, D. (2019). Should small-scale online retailers diversify distribution channels into offline channels? Focused on the clothing and fashion industry. Journal of Retailing and Consumer Services, 47, 74-77.
Tarman, H. A., Soleh, S. M., Ari, A., &Rahmat, T. A. (2019). Leveraging brand equity by applying brand communication and forming city branding based on unique selling proposition (a case of crafts city). J. Bus. Adm. Stud, 5(5), 74-83.