IT management help on: Technologies & Information security systems

IT management help on: Technologies & Information security systems

IntroductionSample Assignment

The Information technologies are used to examine the entire industry. Moreover, quiet accurate definition related to this aspect is, utilizing computer software and computers in managing information. Within a corporate sense, this is moving towards using technologies to protect, store, process, retrieved and transmit all important information of the company. This uses a particular information system towards handling data protection and storage. The Information system at another context relates to type, method, and protocol to deal with the organization’s information. Important areas IT are been analysed, such as aspects like Web services, consumers to consumer’s e-business, knowledge management and risk analysis, and information security systems.

Q.1.)  Business IntelligenceGet Sample AssignmentIt is very clear that Business Intelligence considers to the application which is utilized by the companies and business to capture, analyse, report and organize the data without disturbing the operational method. It is also known as decision support technique which assists organization to create efficient decision makings (Technology Evaluation Centers, 2008). Few of its benefits comprise analytic tool and implementation of data mining to search patterns which could assist in trend analysis and estimating, informed activities of business, increased reporting tools with the help of network alliance and accessibility of base of duplicate data for queries of information which does not impact the smooth of the production data. This intelligence could be applied at every stage of the businesses comprising technology, process and management.

 The companies utilize it for the competitive advantage because of the following reasons:

Track existing and promising competitors,

Analyze markets,

Develop profitable innovative products,

Determine possible candidates for merger or acquisition

Control technological developments, and maintain a wide variety of, economic, political, legislative and social trends with considerable impact on the future of the Company. Buy Assignments Online

Video Conferencing

Q.2.) Some of the essential features which should be added while designing a new videoconferencing system for a large multinational could be as under:

Þ    File sharing abilities: The file sharing abilities would be referred to as one of the most essential option. With the help of this option, file could be dragged & dropped from one place to another. The minimum size in order to share a particular file would be up to 2GB (Good, 2007).

Þ    Tool to share videos: The newly designed video conferencing system should be helpful in order to share a video. The videos could be shared with the help of a Tivo like control function.

Þ    VoIP audio: The other essential feature which should be there in the videoconferencing system would be the high quality VoIP audios system (Good, 2007).

Þ    Other features: The other features added to this newly designed system would refer to co browsing of the internet, video & audio recording, laser pointer, and integration of the toolbar & monitoring of the network (Good, 2007).

The other features which would be nice to have but not be regarded as essential could be as follows:

Þ    VSee technology should be tried as it refers to a technology which would help in order to perform video as well as online collaborations within a stipulated budget.

Þ    The computer must be installed with Windows XP, 2K or 98.

Þ    Broad services

Þ    Firefox browser

Þ    USB

Þ    Analog Video camera

Q.3.)  Models used in Decision Support systems architectures.

It has been examined that there are two models utilized in DSS architectures such as Data warehousing and Data Marting.

Data Marting Model

 In fact, model of Data Marting operates particularly with a range of knowledge employees. It concentrates on the requirement for the information and how that information can be simply retrieved by the knowledge employees (Mallach, 2000). It is considered as a system of production which mixes in the model, the knowledge employee’s business interpretation.

Data Warehousing Model

The model of data warehouse intervene among sources of production data and end user desktops that we generally think as the large and single system for maintaining the approximation of EDM. Batch process populates the warehouse with off –peak extraction from sources of production data. At last, hybrid model utilizes both marting and warehousing model to address and limit the disadvantages of models.

Q.4.) Information System and its components

In simple words, information system is considered as a type, protocol and method in transacting with the information of the Company. Generally, data is interpreted and analysed related on the explanation of signs and symbols and it becomes as an information. The analysis offers an illogical or logical meaning through data association to what it relates. Technology helps in improving efficiency of the business processes in a rapidly changing environment (Martin, Wainwright, Daniel, W et al, 1991). Public also plays a very important role in the information technology and its application.  In general, there are various components of organizational components such as Increased Turbulence and growth of the complexity.

Q.5.) Primary threats to information systems security

In general there are some primary threats to the information system security such as theft of confidential and proprietary information. This is considered as ultimate threat to the organizations and result in loss of dollars because of the security breach. Generally, sensitive information like revenue model, confidential information and other trade secrets would damage a company (Mallach, 2000). Second are errors throughout the users of the organization like irregularity in sabotage and security protocols through legitimate users. Internal threat is considered as legitimate effect for concerns between businesses. Access to the valuable information concerning a trade secret of the company could simply be shared and viewed by legitimate user with accessing to data.Buy Sample Assignment Q.6.) Consumer-to-consumer e businesses

It has been examined that C2C e business is commerce among consumers and private individuals. This kind of e-commerce is featured by the development of online auctions and electronic marketplaces specifically in vertical organizations where business or firm may bid for and what they need from multiple suppliers (Schneider, 2009). It has the highest possibility for developing of new markets. This kind of e-commerce prevails in three forms:

Auctions made at portal like eBay that permits online actual-time bidding on components sold in Web.

Peer –Peer system like Napster model and other money exchange and file exchange model.

Classified advertisements at portal websites like Excite Classifieds where sellers and buyers may negotiate for the price.

At last, it can be said that popular sites like Napster and eBay generates a great volume of sales every day.

 Q.7.) Web services and their importance to e businesses

In simple words, web service can be considered as an interface which explains a group of operations which are accessible through network by standardized messaging.  It is very clear that Web service can be considered as the software system searched by the URI whose bindings and public interfaces are described and defined using XML. Generally, web service can be explained as implementing a formal and standard XML notion, known its description of the service. It contains all the required details necessary to coordinate with services comprising transport protocols, message formats and location (Schneider, 2009). With the development of the e –business, services are provided by the vendors have also developed. For example: Some e-business recently offers web services like verification of credit card, car rental, packaging, delivering agencies and information services. Web service allows the organization to connect its applications with suppliers, customers and partners with the help of Internet and in the similar way that web pages are connected together. With the help of web service, business may use and view the information of the partners.

Q.8.) Knowledge management system

It is very clear that Knowledge management can be considered as management of the organization information in such a way which permits business of the company to make best utilization of available information and make innovative and new knowledge. There are broad varieties of technologies which make up a typical knowledge system such as Groupware, Intranet and software for Knowledge management (Pen, 2012).  It has been viewed that system of knowledge management depends upon centralizing all of the information of the Company in a single point to ensure that data stored shall not be wasted. It offers an inventory and audit service and restricts the availability of particular files and executes timely back up to safeguard any losses of data. By optimizing sources of document, the organization gains from accurate and efficient data which shall assist on knowledge management, productivity and decision making of the Company. The most ordinary kinds of files are simply accessible like office, MP4, PDF, text and others. Some characteristics comprise drop, drag, search engine and control version.

 Q.9.)  Risk analysis to information systems security

It is very clear that risk analysis can be defined as a process of finding out risks and making a plan to transact with them. Risks cannot prevail on their own and they are considered as combination of two such as vulnerabilities and threats. Threats comprise manipulation of the information in relation to input and processing whereas vulnerabilities comprise poor network design and website (Savarese, 2006). There are three ways to tackle the systems security risks such as

First way is to understand the risks of the business and how they have occurred.

Second way is to understand the possible costs to the businesses

Third way is to identify effective and suitable policies

  • Reducing the probability of threats occurring
  • Detect or safeguard the threat
  • Enable adequate recovery action in against to risks.

Q.10.) Technological safeguards’ and ‘human safeguards

Technological safeguard utilizes plan of information system security with the help of vanguard application to reduce the threats, penetration and possibility of hackers on systems which could result because of cyber or theft crimes. For e.g. Fix it Microsoft tool render the attacks of the SMB.

On the other side, human safeguard can be considered as a human aspect indulged in safeguarding information security by adherence in operating procedures. For e.g. standards on password sharing and safe keeping must be adhered at all the times. Company protocols associated to its system of IT (Yegulap, 2009) should be reserved in mind in order to safeguard any kind of compromise on the systems. In fact, no paper procedure on production floor and clean computer policy on the IT room might be done to take advantage and safeguard any sabotage.

  If you want IT management Assignment Help study samples to help you write professional custom essay’s and essay writing help.

Receive assured help from our talented and expert writers! Did you buy assignment and assignment writing services from our experts in a very affordable price.

To get more information, please contact us or visit www.myassignmenthelp.Com

                download-button                chat-new (1)