Wednesday, December 11, 2019

Microsoft Office free essay sample

The organizations structure alps to determine the division of tasks, the roles and responsibilities of individuals within the organization, and the reporting lines of staff through their managers. When the organizational structure matches with the tasks and the purpose of the organization, they are said to have achieved a strategic fit where the organization is operating at high levels of efficiency and effectiveness. Information technology systems support organizations by linking the individuals within them to facilitate (1 ) communication, (2) decision-making, and (3) coordination.Information technology Systems are designed by valuating the culture of the organization and understanding the flow of tasks between individuals and between functional areas. Within the IT system design, it is important to consider what the various stakeholders within the organization need of the system, including how they want to interact with the system and how their work is supported by the system. In todays complex and interconnected world where global commerce is supported by globally distributed work, IT systems and knowledge workers are increasingly expected to be able to coordinate activities across organizations. The inner most firewall blocks access into the intranet while allowing internal users to access the information on the servers. 3. What recommendations do you have for the future e-commerce server and deployment in regards to physical location and back-end security for privacy data and credit card data? I would place the e-commerce server in the DMZ with the private and credit card data stored inside the internal network. The commerce server will have access to the private data and will pass it in an encrypted form to and from whatever it needs to go. The e-commerce server will be physically secured in the server room, possibly with an added locked server cabinet. 4. What recommendations do you have to secure the server farm from unauthorized access? I would lock the servers into their own room with keycard or fingerprint access only. Set up and perform audits on each individual server. 5. If the organization implemented wireless LAN (WLAN) technology, what would you recommend regarding the use of VPNs or encryption within the internal network when accessing the server farm? I recommend regarding the use of VPNs or encryption within the internal network when accessing the server farm that IPsec is a good option because all servers are contained in one physical location. 6. Submit your Microsoft Power Point or Visio block diagram with this Lab #8 – assessment worksheet and your answers. 7. Submit your Microsoft Word functional overview document along with your block diagram.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.