Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Task 1. Do a risk management plan : list of risks involved, level of the risk, the likelihood of the risks of occurring, management plan,

Task

1. Do a risk management plan: list of risks involved, level of the risk, the likelihood of the risks of occurring, management plan, who is responsible for what, the implications/consequences to the system/business. Can be done in a table.

2. Discuss in detail the recommendations/controls that should be put in place for the project to be successful. Can be discussed in terms of system, data, people, etc. Should not be too brief.

Background:

Executive Summary

The purpose of the project is to provide with state of the art solution for the replacement of existing system within budgetary constraints that has been subject to many disorders over the past few years. The incidence management systems existing system has become outmoded which has undermined the response time of the department. For this purpose, MQ IT Solutions has proposed a new system that can help resolve the existing issues of the current system. The proposed project will be able to effectively curtail the response time of incidence management system, address the need of an online system that makes the stored information readily available, and help secure from the threat of cyber-attacks. In this regard a SAAS based cloud computing solution has been proposed that can effectively cater the needs of the client. The new system provides ease of accessing information from various locations and has connectivity with social media platforms which can accept the informa

1.0 SECTION 1

1.1 Current System:

The system that is in place in the organisation has been subject to multiple disorders at various times. This has jeopardised the entire operations of the organisation. Over the past few years, the system has failed to deliver on time due to technological shortcomings. Presently, the system is run by an obsolete single and centralised server, which stores all the data that comes from various operations. It has reportedly been noticed that in the recent past, the system had undergone many technical faults and could not fetch the data of the past at the time of the need. This resulted in keeping a halt to the entire operations of the Incidence Management System. Moreover, the information that was contained in the server could not be operated from any other location even if was provided legal access. At one instance, the department wanted to get access to the information contained in the server and the system stopped responding. The management team has provided evidence of the data theft also. When an analysis of the systems technical procedures was conducted it appeared that the system has faced cyber-attacks many a time. At this point in time, given the functionality of the current system, it appears that this system has become outmoded and is beyond repair. Moreover, for receiving the information through telephone for running incident management system has become very slow as there have emerged new software applications that can provide data at a faster rate and through multiple sources that can enhance the response time to a great extent. Hence, there is need of installation of an entirely new system that is fully compatible with the needs of today and can be operated from any other department if the legal access has been authorised. The storage of data in a single system without an effective source of backup must be done away with and new features catering this need along with cybersecurity must be installed with cost-effective and time-saving measures so that the overall utility of the organisation can be enhanced and its departments can be integrated together without any dismal performance.

1.2 New System

Keeping in view the current system that is installed in the organisation, it is of utmost importance that the new system fully caters bridging gaps and filling the existing loopholes that emanate due to the outmoded technological system in place. The proposed modern technological system for overhauling the performance of information management system, it is pertinent to have cloud computing system keeps the data online and help in fetching at the time of need, a system that is compatible with the support o even most wired as well as wireless and mobile devices. It must have the facility of providing push alters to the users and is fully functional with open source. In order to increase the responsiveness of incident management system in terms of time an integration with social media applications such as Facebook, Twitter are highly necessary. By keeping these features, it is proposed that an effective solution can be constructed for the given problem and in the available budget.

1.2 New System Features:

1.2.1 Cloud-Based System

According to Chang, Kuo and Ramachandran (2016), cloud computing provides a paradigm that can be instrumental in addressing the problems faced by the old system in terms of system data loss and constraints of access from various locations. Moreover, since the system has to cater the needs of the incident management system, it allows the user to get in touch with the host server at an amazingly fast speed (Chang, Kuo and Ramachandran, 2016). Kasemsap (2015) revealed that cloud computing provides a widespread accessibility to a large pool of system resources that can be configured and provide services of high quality that be employed with the least efforts of the management. This will be done with the help of internet; the users whenever and where ever will face incidence of any kind that needs a prompt response that will be shared with the host information management system and a rapid response will be provided to help mitigate its effect (Kasemsap, 2015).

With the help of internet for connectivity the new system by the means of cloud computing will be able to cater the wireless and mobile system and at the same time keep a compatibility with the wired connections as argued by Garrison, Wakefield and Kim (2015). Hashem et. al., (2015) highlighted that the cloud computing provides a system that can host a wide pool of shared resources, on one hand, the input can be collected from the wireless devices that are saved in a separate domain. This domain will have link with social media software applications such as Facebook, Twitter for getting information on the incidences taking place and help the management to quickly formulate an action plan, on the other hand, it will allow establishing a connection for wired connections that can dial up directly to the incidence management team and provide information regarding the nature of the incidence (Hashem et. al., 2015).

1.2.2 Support Push Functionality

Kasemsap (2015) stated that the web of connections that will be constructed with the help of cloud-based new system will be highly useful in collecting information from thousands of mobile sources in a single instinct of time. The information collected can help the team of the incident management system to create an alert message that is then sent to the users of mobile system, wired and wireless systems (Kasemsap, 2015). As per Botta et. al., (2016), this is one of the prominent functions of cloud computing system, a database that is online and accessible is generated and at the time of the need, the message alert is sent to the user to avoid any mishap that could possibly cause destruction of massive scale.

1.2.3 Integration with the Existing System

The current system has been working on a centralised server that has stored all the data of incident management system. Its integration with the new system can easily be made possible. But this process will have to be performed in a few stages that can take some time. First, by the installation of the cloud-based system, the existing server will have to be connected with the new online cloud system and the existing data will have to brought live on the system. This will not only increase the accessibility of data contained in the current system on the new one but also allow its retention at a later stage when the data is needed for any purpose. In the second stage, once the data has become live, it will be integrated will module of social media applications by creating a domain of connectivity with the host cloud-based system. This will create a portal that will make provide the users with an access to post their information on the incidence management system. Lastly, it will be kept on the open source so that in the future if the needs of the management changes, incremental modules can easily be added. Open access to the application programming interfaces provides the system enhanced connectivity with the user and with other parallel software applications which is need of this project. Thus, keeping it open source will increase the connectivity between the users and incident management system.

1.3 Comparison of Proposed System with Current System

In the current system, there is access of telephone-based connectivity with online backup of the information that can be helpful in retaining the data and increasing the response time of the incident management system in sending alerts to the users. Moreover, in the case of data theft, cyber-attack to the security of data or breakdown of the existing centralised server, there is no alternative that can help to make the system functional, thus putting a halt to the operations (Tao et. al., 2014). Whereas, the proposed system can keep the threat of data theft and loss at a safe distance by providing online and secure data storage through cloud-based system, the push functionality feature can send alerts to the users at a very fast rate that is need of the organisation and the open source will keep it able to connect with parallel software applications and incremental changes for the future, most importantly, the new system is quite easier to integrate with the current system.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database And Expert Systems Applications 33rd International Conference Dexa 2022 Vienna Austria August 22 24 2022 Proceedings Part 2 Lncs 13427

Authors: Christine Strauss ,Alfredo Cuzzocrea ,Gabriele Kotsis ,A Min Tjoa ,Ismail Khalil

1st Edition

3031124251, 978-3031124259

More Books

Students also viewed these Databases questions

Question

Question 40 Next

Answered: 1 week ago