Section 2 of the Service Request Sr-Rm-022 Paper
Autor: MD White • April 15, 2016 • Coursework • 633 Words (3 Pages) • 868 Views
Section 2 of the Service Request SR-rm-022 Paper
Mitchell White
BSA/375
March 12, 2016
Joe Langton
Section 2 of the Service Request SR-rm-022
A lot of important changes and research was talk about on the safe process and design of the HR system for Riordan Manufacturing Service with our team. We had to take a look at how each department data flow could be improve and the best way to do it. The goal is to save a lot time and resources along with how department interact with each other.
Security Data Control
The information system of the company has the obligation of securing data as well as the team that develop the system. “The security is the number one responsibility of the operation group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Dennis, A., Wixom, B. H., & Roth, R. M. (2015).
The trustworthy of all data should and must be secured at all times. The information of employees records, procedures, guideline and policies is under the obligation of the company. All documents and data in the operating system should be under authorization only through using a password or some sort of encryption, which is the most effective way to achieve data security.
Application Process: By Riordan Manufacturing using COTS, they can use developed programs that will save them money in the long run along with including training for the staff for proper use. They can and will benefit from this application process by using a third party software. For any special developments or projects of software or programs they may think about using developers in the company.
Interface design: The prevention of accessing any employee computer or files and company records would be through the security of the system interface. “Interface design is the process of defining how the system will interact with external entities, customers, suppliers and other systems” ((Dennis, A., Wixom, B. H., & Roth, R. M. (2015). It calls for a high level of security to have the proficiency of exchanging information with other systems.
...