Friday, May 3, 2019
IT Architectural Considerations Case Study Example | Topics and Well Written Essays - 750 words
IT Architectural Considerations - Case Study ExampleIT Architectural Considerations a. IT characteristics i. Accessibility Accessibility of the reduced sales and fruit system of rules will be highly restrictive to specific great deal who will engross the system to play specific roles or undertake specific purposes. On the whole, the sales IT manager shall be the head of the system and so he shall switch full access to the system. All sales departmental heads shall also have access to the system scarcely they shall not have access to manipulate information put into the system in each course. This is because accounts data are very crucial for determining the promote of the company and need not be tampered with. Finally, accountants and auditors shall have access to the data in the system but shall not have access to operate the system in any way. ii. Availability Since sales, payment and product registration go on in the company on regular basis, the system shall be lendab le for use on regular basis by those who are permitted to have access to it. As oft and regularly as sales are made in any department or any branch of the company, payment input shall be made into the system so that the system will have to record the payment and undertake a comprehensive summation at the head office of the sales. iii. Portability maven of the most outstanding advantages of the new technology for the sales and products department is its portability. This is because the framework of the system has been designed to centralize all accounts records of the company. This means that there will not be little fragments of account data to incubate with therefore making the system very portable and handy. One aspect of the system that makes it even to a greater extent portable is the fact that the system will not be accessible to a lot to a greater extent people. iv. Reliability The system has been designed on the bases of reliability and accuracy. For instance data entered into the sales and payment system micklenot be manipulated in any way by any body expect by the aged sales IT officer. This means that the company shall have reliable sales and payment records. The situation whereby some people are likely to embezzle funds will thus be catered for under the system. The company shall there be expectant of financial growth henceforth b. security aspects as they relate to the technology dissolvent i. Authentication & Authorization Authentication and authorization are important components of any IT system especially when it deals with accounts figures. swell (1996) explains that authentication tools provide the ability to determine the identity of a party to an interaction and to ensure that a message came from who it claims to have come from. Based on this background, all operators of sales machines have been given registered for a special verification process that makes use of thumbprint. Users therefore have to register their thumbprints into th e sales machines before they can access it. Without this verification, data recorded into the sales machine will not be recorded by the new IT system. ii. Prevention & Resistance Any technology system that does not focus on measure and resistance lacks a good security basis. For this reason, no matter the authentication and authorization features incorporated into the system, the way must be paved for any security breaches to be prevented all together (Purpura,2002). For this reason, a cake
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.