Introduction
Venture Architecture serves its usefulness by demonstrating distinctive conventions and areas inside a hierarchical system. Undertaking design is more reasonable for demonstrating business forms, business investigation, web displaying, and benefit-based structures. Key highlights of enterprise engineering incorporate requirements management, business demonstration and investigation, recreation, system advancement, wire confining, test administration, information display, visual execution examination, venture administration, change administration, and reconciliation.
In regards to the framework of the company, it’s proof of a traditional-based information system in use. It is characterized by hardware setups, such as wired cables and USB connections linking computers in the programming stations and hardware setups in the corporate offices. All these equipment and installations are quite costly to affect and are also prone to security threats, as described above. It, therefore, calls for a re-engineering of the technology life cycle of Sir-Grayson. Therefore, the company needs a lifecycle management product that will enhance its operation by increasing the efficiency at which operations are carried out, boosting the level of security to information flow and access through the system, and enhancing better customer handling methods.
Sifers-Grayson Case
Sifers-Grayson is a company whose primary operation focus is based on utilities, R&D, and industrial control systems for the advanced manufacturing of drones and robots. It is a group comprised of five departments: Finance & Accounting, Personnel, Engineering, Project Management, Sales, and Support. All these departments have synchronized IT activities in the execution of their operation. Its market scope is mainly advanced manufacturing firms, utility companies and the U.S. Department of Homeland Security. An internet connection is set in place to link corporate offices, telework locations, test ranges, test vehicles and R&D centres.
IT framework embraced for the company’s operations is prone to security threats, which may arise from Sneaker-Net threats, Internal threat sources, malware threats, external threats and supply chain threats. The main elements that pose the risks include emails, the web, and servers, which are prone to transmission of malware threats. The wireless access point may also be a loophole for sneaker threats, which may hack into the network. The availability of backdoors into the enterprise framework also poses another significant problem. The use of external devices such as modems and laptops also poses malware threats and related cybercrimes.
Information Technology Infrastructure Library has upgraded its competency in service, task, methodology, change, and plan and data security. Its functionalities try to enhance the level of accessibility and dependability of utilization, limit workload, adjust to changes, and ensure the security of data being handed off to the framework. In this way, with the synchronization of Information Technology Infrastructure with distributed computing techniques, the association structure will have an enhanced execution in regard to dangers, and security dangers will be battled. Information Technology Infrastructure would, thus, convey all the more effectively the change in the organization’s move from a customary-based data framework to cloud-based data frameworks. Distributed computing will upgrade the security of the data framework in different courses, as demonstrated below.
As a method for rebuilding the undertaking engineering setup, the organization should, along these lines, move into cloud-based data frameworks. Key highlights of cloud-based data frameworks incorporate IaaS, SaaS and PaaS. On account of distributed computing framework, the central benefits it would procure to Sir-Grayson would be; Cost of activity would be diminished as there would be no compelling reason to introduce physical equipment, for example, organize links, workstations, and server farms. Copper links and the fast optic links would be disposed of, subsequently cutting the cost of support and repair. Upgraded availability of data would impact no compelling reason to utilize the corporate workplaces. Server farms would be disposed of because of their capacity to store and access information from the future, served by the usefulness of the highlights offered by distributed computing.
Distributed computing models help the client get to information helpfully, paying little heed to time and area. Ascribed by better approaches to storing and accessing information and data, the dangers of malevolent programming and malware would be checked. After that, there would be no compelling reason to utilize outer gadgets to spare data. In this way, the danger of information misfortune because of equipment disappointment would be fought.
The honesty of information and data would be upgraded in that the security of getting to data would be more discrete. Distributed computing highlights, for example, the SaaS and PaaS, would enhance the respectability of information security in the accompanying courses: Availing of a UI with customized get-to convention, for example, passwords, unique mark perusers would ensure that data is just open by the approved staff. Accessibility of the recommendable programming through SaaS would likewise support the part following no compelling reason to physically introduce programming on the PCs. Distributed computing is liable to specialist co-ops who are in charge of information security, honesty, and framework support. In this manner, the administrators inside Sir-Grayson would have no stress or inconvenience in support of the framework.
Information and data would likewise be controlled and modified inside the store network. As a strategy for battling this hazard, distributed computing offers customized client records and interfaces where information and data are transmitted straightforwardly from the server to the diverse inhabitants. It, along these lines, seals the accuracy and legitimacy to which information is transmitted through the framework. Accordingly, this would serve legitimacy and honesty to the regarded customers, along these lines, acquiring client loyalties. Distributed computing additionally creates interfaces where clients can communicate straightforwardly by making requests and making remarks on the nature of the administration advertised. It would, in this manner, fill in as an adequate reason for settling on a related choice in mission to enhance execution.
Conclusion
Taking everything into account, the ITIL IT system, with synchronization of distributed computing techniques, would not just fix the present dangers and battle chances but additionally make progress for the organization’s future tasks. Adjusting to distribute computing would grow the system of the undertaking overall, subsequently giving it a superior capacity to target new clients.
References
Cannon, D., Cannon, D., Wheeldon, D., Lacy, S., & Hanna, A. (2011). ITIL service strategy. TSO
Cater-Steel, A., Toleman, M., & Tan, W. G. (2006). Transforming IT service management-the ITIL impact. ACIS 2006 Proceedings, 81.
David McClure, 2011. Cloud Computing: “What are the security Implications?”. GSA. Retrieved October 6, 2011. https://www.gsa.gov/portal/content/120071
Hochstein, A., Zarnekow, R., & Brenner, W. (2005, March). ITIL as common practice reference model for IT service management: formal assessment and implications for practice. In e-Technology, e-Commerce and e-Service, 2005. EEE’05. Proceedings. The 2005 IEEE International Conference on (pp. 704-710). IEEE.
Lifar’s, 2015. What Makes Cloud Computing Different From Traditional Infrastructure Security. Retrieved August 5, https://lifars.com/2015/08/what-makes-cloud-security-