Explain why it will be important to the MTC Hiring System.
What responsibilities do companies have to protect your data? How should they protect it? What are the consequences for the company if they don’t protect customer data?
Last week we discussed requirements for IT systems. Among the most significant requirements are those that define the security of the system and the data it houses. Security requirements need to be defined at the beginning of the project; they must be tested as the system is developed and deployed; and they must be continuously tested to ensure the security of the system is maintained throughout its useful life. This week you will learn about information systems security, and you will develop security requirements as part of your Stage 3 Assignment due this week. You will also learn about enterprise systems—what they are and how they are used by businesses to achieve a strategic advantage. This week you will complete the third section of your report, the Stage 3 Assignment, in which you will apply what you learned in earlier weeks about how IT can improve business processes and how to write requirements for an IT solution.
By the end of Week 6, you will be able to: (All readings will be posted in the attahcmnets)
identify the high-level concepts surrounding information security
identify the benefits of enterprise systems and their importance in helping to achieve business objectives
- identify current process problems and how a technology solution can improve them
- develop requirements for an IT solution
- Explaining System Performance Requirements (This part is not required but posted as a reference for the responses)
- Refer to the readings Requirements and Developing Requirements for an IT System provided in Week 5, where the types of requirements are defined and examples are given. System performance requirements address quality (how the system must perform) and security. The areas listed are:
Usability
Scalability
Availability
Reliability
Maintainability
Performance
Portability
- Interoperability
- Security
- Protection of data as it is transmitted and when it is stored
- User authentication
- Authorization of user to perform specific functions
- Data backup and recovery
- Group 2: For this week’s discussion, Group 2 will post an initial response with:
- Choose one of the system performance or security areas listed above
- Put the area you selected into the Subject/Title of your posting
Explain what this area means in terms of system performance. Use the definitions provided in the Week 5 Requirements reading. If you need additional clarification, you can search for other sources, but be aware that these terms are defined and used differently for other purposes; be sure you find explanations that support the definition provided in the Requirements reading.
- Explain why it will be important to the MTC Hiring System.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.