Academic Master

Business and Finance

Sifers-Grayson Case

Introduction

Venture Architecture serves its usefulness through demonstrating distinctive conventions and areas inside a hierarchical system. Undertaking design is more reasonable for demonstrating business forms, business investigation, and web displaying and benefit based structures. Key highlights of Enterprise engineering incorporate; Requirements Management, Business demonstrating and investigation, recreation, System advancement, wire confining, test administration, information displaying, visual execution examination, venture administration, change administration and reconciliation.

In regards to the framework of the company, its proof of a traditional based information system at use. It is as characterized by Hardware set up such as wired cables, USB connections linking computers in the programming stations, hardware set up in the corporate offices. All these equipment and installations are quite costly to effect and are also prone to security threats as described above. It, therefore, calls for a re-engineering of the technology life cycle of Sir-Grayson. Therefore, the company needs a lifecycle management product that will enhance its operation through increasing the efficiency at which operations are carried out, boosting the level of security to information flow and access through the system and also enhance better customer handling methods.

Sifers-Grayson Case

Sifers-Grayson is a company whose primary operation focus is based on Utilities and R&D and Industrial Control Systems for Advanced Manufacturing for drones and robots. It is a group comprised of five departments these being; Finance & Accounting, Personnel, Engineering, Project Management, Sales, and support. All these departments have synchronized IT activities in an execution of their operation. Its market scope is mainly; advanced manufacturing firms, utility companies and the U.S. Department of Homeland security. An internet connection is set in place to link corporate offices, telework locations, test range, test vehicles and R&D centers.

IT framework embraced for the company’s operations is prone to security threats which may arise from; Sneaker-Net threats, Internal threat sources, malware threats, external threats and supply chain threats. Main elements that pose the risks include; emails, web, and servers which are prone to transmission of malware threats. The wireless access point may also be a loophole for sneaker threats which may hack into the network. Availability of backdoors into the enterprise framework also poses another significant problem. Use of external devices such as modems and laptops also pose malware threats and related cybercrimes.

Information Technology Infrastructure Library is has upgraded and competency with regards to Service: task, methodology, change, and plan and data security. Its functionalities try to; enhance the level of accessibility and dependability of utilization, a limit of workload, adjusting to changes, and security of data being handed-off to the framework. In this way, with the synchronization of Information Technology Infrastructure with distributed computing techniques, the association structure will have an enhanced execution in regards to that dangers and security dangers will be battled. Information Technology Infrastructure would, thusly, convey all the more effectively in the change where the organization move from a customary based data framework to cloud-based data frameworks. Distributed computing will upgrade the security of the data framework these in different courses as demonstrated underneath.

As a method for rebuilding the undertaking engineering set up, the organization should, along these lines, move into cloud-based data frameworks. Key highlights of cloud-based data frameworks incorporate; IaaS, SaaS and PaaS. On account of distributed computing framework, the central benefits it would procure to Sir-Grayson would be; Cost of activity would be diminished as there would be no compelling reason to introduce physical equipment, for example, organize links, workstations, and server farms. Copper links and the fast optic links would be disposed of subsequently cutting the cost of support and repair. Upgraded availability of data would impact no compelling reason to utilize the corporate workplaces. Server farms would be disposed of because of a capacity to store and access information from the cloud. All these future served by served by the usefulness of the highlights offered by distributed computing.

Distributed computing models improve the client to get to information helpfully paying little heed to time and area. Ascribed by better approaches to store and access information and data, the danger of malevolent programming and malware dangers would be checked after that there would be no compelling reason to utilize outer gadgets to spare data. In this way, the danger of information misfortune because of equipment disappointment would be fought.

The honesty of information and data would be upgraded in that the security to getting to data would be more discrete. Distributed computing highlights, for example, the SaaS and PaaS would enhance the respectability of information security in the accompanying courses: Availing of a UI with customized get to convention, for example, passwords, unique mark perusers would ensure that data is just open by the approved staff. Accessibility of the recommendable programming through SaaS would likewise support the part following no compelling reason to physically introduce programming on the PCs. Distributed computing is liable to specialist co-ops who are in charge of information security, honesty and support of the framework. In this manner, the administrators inside Sir-Grayson would have no stress or inconvenience in a support of the framework.

Information and data would likewise be inclined to control and modification inside the store network. As a strategy for battling this hazard, distributed computing offers customized client records and interfaces where information and data are transmitted straightforwardly from the server to the diverse inhabitants. It, along these lines, seals the accuracy and legitimacy to which information is transmitted through the framework. Accordingly, this would serve legitimacy and honesty to the regarded customers, along these lines, acquiring client loyalties. Distributed computing additionally profits interfaces where clients can communicate straightforwardly with putting requests and making remarks on the nature of administration advertised. It would, in this manner, fill in as an adequate reason for settling on client related choice in mission to enhance execution

Conclusion

Taking everything into account, the ITIL IT system with synchronization of distributed computing techniques would not just fix the present dangers and battle chances yet additionally make a progress for the organization’s future tasks. Adjusting to distribute computing would grow the system of the undertaking overall subsequently having a superior capacity to target new clients.

References

Cannon, D., Cannon, D., Wheeldon, D., Lacy, S., & Hanna, A. (2011). ITIL service strategy. TSO

Cater-Steel, A., Toleman, M., & Tan, W. G. (2006). Transforming IT service management-the ITIL impact. ACIS 2006 Proceedings, 81.

David McClure, 2011. Cloud Computing: “What are the security Implifications”. GSA. Retrieved October 6, 2011. https://www.gsa.gov/portal/content/120071

Hochstein, A., Zarnekow, R., & Brenner, W. (2005, March). ITIL as common practice reference model for IT service management: formal assessment and implications for practice. In e-Technology, e-Commerce and e-Service, 2005. EEE’05. Proceedings. The 2005 IEEE International Conference on (pp. 704-710). IEEE.

Lifar’s, 2015. What Makes Cloud Computing Different From Traditional Infrastructure Security. Retrieved August 5, https://lifars.com/2015/08/what-makes-cloud-security-

SEARCH

Top-right-side-AD-min
WHY US?

Calculate Your Order




Standard price

$310

SAVE ON YOUR FIRST ORDER!

$263.5

YOU MAY ALSO LIKE

Pop-up Message