15 Aug Explain why it will be important to the MTC Hiring System.
What responsibilities do companies have to protect your data? How should they protect it? What are the consequences for the company if they don’t protect customer data?
Last week we discussed requirements for IT systems. Among the most significant requirements are those that define the security of the system and the data it houses. Security requirements need to be defined at the beginning of the project; they must be tested as the system is developed and deployed; and they must be continuously tested to ensure the security of the system is maintained throughout its useful life. This week you will learn about information systems security, and you will develop security requirements as part of your Stage 3 Assignment due this week. You will also learn about enterprise systems—what they are and how they are used by businesses to achieve a strategic advantage. This week you will complete the third section of your report, the Stage 3 Assignment, in which you will apply what you learned in earlier weeks about how IT can improve business processes and how to write requirements for an IT solution.
By the end of Week 6, you will be able to: (All readings will be posted in the attahcmnets)
identify the high-level concepts surrounding information security
identify the benefits of enterprise systems and their importance in helping to achieve business objectives
- identify current process problems and how a technology solution can improve them
- develop requirements for an IT solution
- Explaining System Performance Requirements (This part is not required but posted as a reference for the responses)
- Refer to the readings Requirements and Developing Requirements for an IT System provided in Week 5, where the types of requirements are defined and examples are given. System performance requirements address quality (how the system must perform) and security. The areas listed are:
Usability
Scalability
Availability
Reliability
Maintainability
Performance
Portability
- Interoperability
- Security
- Protection of data as it is transmitted and when it is stored
- User authentication
- Authorization of user to perform specific functions
- Data backup and recovery
- Group 2: For this week’s discussion, Group 2 will post an initial response with:
- Choose one of the system performance or security areas listed above
- Put the area you selected into the Subject/Title of your posting
Explain what this area means in terms of system performance. Use the definitions provided in the Week 5 Requirements reading. If you need additional clarification, you can search for other sources, but be aware that these terms are defined and used differently for other purposes; be sure you find explanations that support the definition provided in the Requirements reading.
- Explain why it will be important to the MTC Hiring System.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.