Preview

IS3110 P2T1 BIA

Satisfactory Essays
Open Document
Open Document
653 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3110 P2T1 BIA
Identify Environment

DLIS environment consists of more than 5,000 employees and 5,000 contractor. The IT environment contains assets that enable business functions like exchange, active directory, user PCs, Information Databases such as Customer databases, employees/contractors and parent company databases. These assets enable communication between the organization and clients such as the Department of Defense have a high priority as the DLA exists solely for the DoD and its subsidiaries. As the logistics are handled by the DLA, it has a major impact of the ability of the DoD to wage and win wars.
The DLIS has several main departments that make up its environment. The Human Resources department controls the hiring and training of the employees/contractors. The Financial department has the responsibility of accounts payable/receivable. They have a customer service department that deals with its clients, customers and vendors. The DLIS has an IT department that deals with all of its computing and information management. The executives and board make up its own department as they deal with the convergence of the organization. This department is made up of the organizations directors. These directors report to the Defense Logistics Agency.
Identify Stakeholders

DLA
DoD
Upper Management
CIO
IT management
IT security
IT staff
Stakeholders are the department heads and upper management that control the day to day operations of the DLIS. Some of the stakeholders are the DLA that is the parent company of the DLIS. The DoD which is the client and customer of the DLA and DLIS. The stakeholders that make up the upper management who are the department heads, directors and the CIO have very important roles related to the IT environment. The other stakeholders include but are not limited to the IT management, IT security and IT staff. These groups have important impact on the DLIS's ability to maintain its mission.
Critical business functions
Email servers
Documentation

You May Also Find These Documents Helpful

  • Powerful Essays

    CEO Dr. Michael Riordan is one key stakeholders within the company who is also the founder of the business and his eye is on how the company is running or performing. There is also the director of human resources is Yvonne McMillan, who is in charge of coordinating anything that deals with the company’s current employees. Hugh McCuley which is the Chief Operating Officer deals with policy organization. Dale Edgel which is the Chief Financial Officer handles the finances that involves income, payroll, losses, and any other finance aspect of the company. There is also Maria Trinh who is the Chief Information Officer and she handles the companies IT departments and computer systems. Every one of these important people within the company are stakeholders because anything that happens within the company, falls back on their positions/jobs and because they have a high status, they have more to lose. These stakeholders have very important parts within this business and all together they make it run smoothly.…

    • 2831 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    The stakeholders include any person, group, or organization that has direct or indirect stake in an organization because it can affect or be affected by the organization's actions, objectives, and policies. Key stakeholders in a business organization include creditors, customers, directors, employees, government (and its agencies), owners (shareholders), suppliers, unions, and the community from which the business draws its resources. Riordan’s key stakeholders are listed below:…

    • 1087 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Bus 1101 Unit 4 Business

    • 291 Words
    • 2 Pages

    The text defines stakeholders as: “Individuals and organizations who are actively involved in the organization or whose interests may be positively or negatively affected by what the organization does.” Every organization has stakeholders.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    This is a lot like hardening the OS in respect that you are making sure that software stays up to date to ensure that known exploits are being addresses. Any unnecessary applications, services, or scripts that are installed should be removed immediately once the installation process is complete. Below are some things that you can do to harden software.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Sub 2 Assessment 1

    • 2457 Words
    • 8 Pages

    In summary, the company is constantly developing early stage of development in the company of soldiers might not need a special department to manage and operate IT part of things, but as the company continues to develop, and now you need a professional to manage the department, you first need to head office as well as other segments of the computer unification, should be unified procurement and installation from the computer system to use only the hardware and software. The company requires its own server, the server can be connected to each computer company's head office and branches. The unity of all data processing and backup. The future direction of development which can facilitate future access and access to year-end, to better analyze companies.…

    • 2457 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Is3350 Unit 1

    • 2255 Words
    • 10 Pages

    This scheme of work suggests possible teaching and learning activities for each section of the specification. There are far more activities suggested than it would be possible to teach. It is intended that teachers should select activities appropriate to their candidates and the curriculum time available. The first two columns summarise the specification references, whilst the Learning Outcomes indicate what most candidates should be able to achieve after the work is completed. The Resources column indicates resources commonly available to schools, and other references that may be helpful. Higher Tier material is indicated by a bold HT only comment. The timings are only suggested*, as are the Possible Teaching and Learning activities,…

    • 2255 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Pm3110 Unit 1 Paper

    • 529 Words
    • 3 Pages

    Every Information system developed with the involvement of various groups of people, also known as stakeholders, such as system analysts, IT staff, data administrators, security administrators, tests, programmers, project managers, and network administrators. The stakeholder is someone involved in the processes or management of a project. The stakeholder can be an from any department in an organization or from outside the organization. The contribution of a stakeholder can be very according to the requirements of the project. The stakeholders are the part of risk management plan, which develop in the early stage of a project.…

    • 529 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is305 Project 1

    • 2310 Words
    • 10 Pages

    The project is divided into three major deliverables and four smaller assignments as detailed below:…

    • 2310 Words
    • 10 Pages
    Satisfactory Essays
  • Powerful Essays

    Infs2603

    • 2514 Words
    • 11 Pages

    * Stakeholders are people who can affect or are affected by the system and can make or break your business…

    • 2514 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Rwdi Research Paper

    • 4432 Words
    • 18 Pages

    Provides technical information, services and assistance directly to clients within specialty area. In providing customer service, specific procedures and operational/technical guidelines are applied. Interactions are generally at professional level usually with immediate department and peers in other groups internal to RWDI. Focus is on developing and maintaining relationships with appropriate contacts to interpret or define technical data/procedures. May be required to present ideas, results, and technical knowledge to external client.…

    • 4432 Words
    • 18 Pages
    Good Essays
  • Good Essays

    IS3110 Lab 5

    • 610 Words
    • 3 Pages

    NMAP is run most of the time on a host and port discovery, Nessus is usually installed on servers and takes it to the next level. It analyzes the ports and looks for potential security issues…

    • 610 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Stakeholders have something at risk, and therefore something to gain or lose as a result of your organization’s activity. By using their influence, stakeholders hold…

    • 1438 Words
    • 6 Pages
    Better Essays
  • Good Essays

    * Employees: They want to keep their employment, good rates of reward and also promotional opportunities.…

    • 933 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Project Part 1 Task 1

    • 1367 Words
    • 6 Pages

    The Senior Management of the Defense Logistics Information Services (DLIS) has decided to update the previous risk management plan with a developing, new risk management plan. This new risk management plan will not only minimize the amount of risk for future endeavors, but will also be in compliance with regulations such as the Federal Information Security Management Act (FISMA), Department of Defense (DOD), Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Control Objects for Information and Technology (COBIT), and Information Assurance Certification and Accreditation Process (DAICAP).…

    • 1367 Words
    • 6 Pages
    Better Essays