Improving a company?

Category: Company
Last Updated: 13 Apr 2020
Pages: 3 Views: 239

Improving a company's system helps aid in its success in today's market as well as in the future of the company's growth and stabilization. This new system that will enable the company to promptly accomplish these requirements without hesitation and will not interfere with the company's time management protocols or add extra unneeded expenses.

An information system that more specifically is "a network architecture in which each computer or process on the network is either a client or a server Servers are powerful computers or processes dedicated to managing disk drives (file rivers), printers (print servers), or network traffic (network servers). Clients are PC's or workstations on which users run applications. Clients rely on servers for resources, such as files, devices, and even processing power. " (Whooped, 2014) The Trusted Computing Base (ETC) is the part of a system that is responsible for enforcing system-wide information security policies.

The user can define user access to the trusted communication path, which allows secure communication between regular users and the ETC, by installing and using the ETC. The system administrator must determine how much trust can be given to a particular program. In the ring of trust model, the outer rings contain a lower level of security, and systems requiring higher levels of security are located inside the inner rings. To move from an outer ring into an inner ring, extra security mechanisms are encountered. " (Smith, 2013) the servers will be secure and have all the securities that Ordain would like and need.

Order custom essay Improving a company? with free plagiarism report

feat icon 450+ experts on 30 subjects feat icon Starting from 3 hours delivery
Get Essay Help

There will be little or no down time to create the new virtual servers and business will not be effected. Also the disaster recovery rate is much quicker in case of a crash. The information is backed up so in case of a crash the information can be derived quickly. The information gets to the end user much more quickly than having a physical server. Physical server machines get dirty and overloaded with old files and information that is no longer needed or wanted. All information passed through the organization will be encrypted to protect vital aspects of the company operations.

The virtual machine running the share point will house the encryption piece for information traffic. Utilizing a virtual server in this aspect will allow end users to generate reports by department in real time with little or no help from an information technology professional. The use of firewalls and even a virtual firewall is also recommended to protect Radian's information. "A virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines.

A virtual firewall is deployed, executed and operated from a virtual machine. Virtual firewall formats include: Stand-alone software Integrated SO kernel component. A virtual security provider's dedicated hardware platform A virtual firewall operates in a virtual area network (VAN) environment of connected virtual machines. A virtual firewall operates in two different modes: Bridge mode: Like a rotational firewall, this mode operates by diagnosing and monitoring all incoming and outgoing traffic bound for other virtual networks or machines.

Hypocrites mode: In contrast, this mode is isolated from the actual network, resides in the core hypocrites kernel and monitors the virtual host machine's incoming and outgoing traffic. " (Technophobia, Virtual Firewall, 2014) When placing all of the business information on a server along with all of the employee information the company will want it to be secure and readily available to use. When using a virtual server there is not complete control of the physical access of the database. On the other hand the information is no longer on easy identifiable physical systems.

There are multiple layers of virtual securities. The data safeguards requirements are the same as a physical server. Information that requires more safeguards is available. Information can be encrypted, role based control, and secure in many ways. Cyber-attacks are all very real threats and can be protected against also. A firewall can encrypt data at the file system that the virtual machine then uses a much managed login procedure for added protection of data against compromise. Logs are also created for looking jack on to see who, where, and when certain data was accessed.

Different levels of securities will be used for different levels of data importance. Administration roles will have more securities on them than someone at the data entry level.

Cite this Page

Improving a company?. (2017, Nov 19). Retrieved from https://phdessay.com/improving-a-company/

Don't let plagiarism ruin your grade

Run a free check or have your essay done for you

plagiarism ruin image

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Save time and let our verified experts help you.

Hire writer