Service Request SR Rm 022 Part2

Topics: Computer security, Computer network security, Computer network Pages: 7 (765 words) Published: December 1, 2014
Riordan Manufacturing
Service Request SR-rm-022 part 2

Ty Bauer

Service Request SR-rm-022 part 2

In part one of the Riordan Manufacturing Service Request we discussed Hugh McCauley and his request to take advantage of the more sophisticated state-of-the-art information systems that are implemented in the Riordan Manufacturing department. This week we will discuss the application architecture, process design, and security controls that are recommended for the design of the Riordan Manufacturing system upgrade. Application Architecture

The application architecture is going to be used as the blueprint for the modules of the application and future proofing can be determined here. " According to "Wikipedia" (28 August 2014 ), "An applications architecture describes the structure and behavior of applications used in a business, focused on how they interact with each other and with users. It is focused on the data consumed and produced by applications rather than their internal structure" (Definition). Application architectures have three fundamentals the sever based architecture, client-server based architecture, and client based architecture.

Operational Requirements
The architecture to be used for the upgrade to the current Riordan Manufacturing information systems will be the fundamental client-server architecture. In this fundamental the client will have the responsibility of providing the local login and the server will house the data that will be accessed after a login has been provided. Process Design

The proposed system to be implemented will have the feature of logging into a web portal where employees can input data and run reports from. The current data that was housed within excel spreadsheets will now be imported into the web portal. After employee data has been imported into the new system managers will now have the ability to have employee profiles that include resumes, employee files, timesheet information, and salary etc. Riordan Manufacturing’s current human resource software integration with the client-server architecture will meet the system requirements in order to complete the project. Security Controls

The security controls for this or any project should be a high priority and should be understood by every individual involved in the project. To determine this we will use the questions "How do you use these data? That is, are you the source of the data for the organization, do you refer to the data, do you modify them, and do you destroy them? Who is not permitted to use these data? Who is responsible for establishing legitimate values for these data?" (Hoffer, Valacich, & George, 2012, p. 196). Security Requirements

Since the operations group takes responsibility of security all intrusion prevention systems, firewalls, and backup solutions the developers can focus on the security of the information systems and protecting data with permissions. A few things can be done to ensure security control one being to train and educate employees about security protocols. Another important technique is to routinely monitor computers for suspicious activity, new employees will undergo a screening process to ensure reliability. With the client-server architecture the chance of an intrusion is reduced and should ensure the security of Riordan Manufacturing data. For the client-server architecture encryption and authentication systems will be used to help provide resistance to malware and viruses.

For the network at Riordan Manufacturing a virtual local area network could be created to provide more security so only employees provided with a username and password will be able to access payroll and benefit information. Since there is confidential files to be accessed we will need a more secure way of accessing these files, our recommendation for the Riordan Manufacturing Human Resource department to access these files is to have the username and password as...

References: 1. Wikipedia. (28 August 2014 ). Retrieved from
2. Hoffer, J. A., Valacich, J. S., & George, J. F. (2012). Essentials of Systems Analysis and Design (5th ed.). : Paear sjono Edkucaatio nj Loimitked.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Service Request Sr Rm 022 Essay
  • Service Request SR rm 022 Essay
  • Essay on Individual Service Request SR Rm 022 Pa
  • Service Request SR rm 022 Essay
  • Service Request SR-rm-022, Part 1 Essay
  • Riordan Service Request Sr-Rm-022 Essay
  • Essay on Service Request SR-rm-022, Part 2
  • Service Request SR-rm-022, Part 1 Essay

Become a StudyMode Member

Sign Up - It's Free