SlideShare a Scribd company logo
1 of 6
-Running head: RIORDAN MANUFACTURING SR-22 -2 Part         1




                      Riordan Manufacturing SR-22 2 Part

                               Reinaldo Burgos

                                   BSA375

                              December 09, 2012

                                Ilka Kawashita
RIORDAN MANUFACTURING SR 22- 2 Part                                                                 2




                        Riordan Manufacturing Service Request 22 2 Part

       After theprevious meeting we discussed many important subjects that required additional

research to present the safe way to process the transitions of new changes. Alsowe had reviewed

different data flow that will work in the best of improve the proper handling between Riordan

Manufacturing and the plants related to ensure the best relation between each department. It will

improve the communication in Riordan and save money and time after the final implementation.

                                        Security Controls


   Security should be a high level of concern in any project. "Security is primarily the

responsibility of the operations group, which consist of the staff responsible for installing and

operating security controls such as firewalls, intrusion detection systems, and routine backup and

recovery operations" (Dennis, Wixom, & Roth, 2009). However, system developers also have a

responsibility when it comes to security; especially within the information systems.


   Data: All data must be kept secure and confidential. Any company data including company

policies and procedures, as well as, employee data containing employment information will be

held responsible under Riordan Manufacturing. Any forms of data that belong to the company

are proprietary; therefore, data encryption and passwords will be utilized to allow authorization

to access the data. If any form of data were to be intercepted into the wrong hands, this can be

detrimental to the organization. “Lawsuits alone would easily exceed $10 million and the cost of

staff to find and reenter paper records would be enormous and certainly would take more than a

few weeks" (Dennis, Wixom, & Roth, 2009).
RIORDAN MANUFACTURING SR 22- 2 Part                                                                 3




       Processes:Some processes, such as the application process would benefit from using

third-party software. This will allow Riordan Manufacturing to have the security guarantee from

the third-party vendor. Using COTS will allow Riordan Manufacturing to save time because

programs are already developed and can get some training and services included in them, and it

will be a long term investment that will also save money. For any additional program or software

that need to cover special projects can be consider an in-house development.


       Interfaces: "Interface design is the process of defining how the system will interact with

external entities e.g., customers, suppliers, other systems" (Dennis, Wixom, & Roth, 2009).

System interfaces are also capable of exchanging information with other systems andtherefore

require a high level of security. This security can be achieved by incorporating password

requirements to unlock confidential and private documents, such as employee files and company

tax records. This would help prevent internal security threats of employees attempting to access

another employee's computer.


       Network:One recommendation is to incorporate a company-widedatabase, accessible

only via a virtual local area network (VLAN), which allows employees to view and update some

basic level information that would be subject to verification by a payroll clerk or supervisor.

Such access will required security protection thru the use of username and password. To obtain

more detailed informationit will required an authorized payroll clerk or supervisor. At the same

time, to obtain that information is important to provide three-factor authentication method: such

as username with password and a fingerprint scan to obtain those highly confidential records. In

addition, the third-party organizations that administer Riordan employee’s benefits such as their
RIORDAN MANUFACTURING SR 22- 2 Part                                                               4




health benefits and workers compensation should be audited on a yearly basis for accuracy and

competitiveness. It will ensure the utilization of the most accurate processes within

theorganization.


                                 Physical Data Flow Diagrams


       While designing the application logic of the information system, the implementation

decisions describing how the system will work. Physical data flow diagrams show these

implementation details, including “data stores that refer to files and database tables, programs or

human actions that perform processes, and the physical transfer media for the data flows”

(Dennis, Wixom, & Roth, 2009). Maintaining a clear and proper implementation it will provide

the service expected with the simple and clear results.(TIBCO Software Inc., 2001)
RIORDAN MANUFACTURING SR 22- 2 Part                                                                  5




       After this process there will be a new meeting next week to discuss any additional

information about the process and implementation of final changes. Riordan is seeking to resolve

those issues in the short time as possible and we will ensure to satisfy all the needs in the safe

and secure process.
RIORDAN MANUFACTURING SR 22- 2 Part                                                             6




                                          References

Apollo Group, Inc. (2012). Virtual Organization Portal: Riordan Manufacturing. Retrieved from


       https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/index.asp


Dennis, A., Wixom, B. H., & Ruth, R. M. (2012).Systems Analysis and Design (5th ed.).


       Retrieved from the University of Phoenix eBook Collection database.


Khosrowpour, M. (1999). Managing information technology resources in organizations in the


       next millennium. Idea Group Inc (IGI).

Riordan Manufacturing. (2012). Retrived July 28, 2012, from


       https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/index.asp


TIBCO Software Inc. (2001). Business process. (pp. 10-15). Palo Alto, CA: Global
       Headquarters. Retrieved from http://www.tibco.com/multimedia/business-process-
       design_tcm8-2399.pdf

More Related Content

What's hot

Smart factory Solution from InTouch Systems Pvt. Ltd.
Smart factory Solution from InTouch Systems Pvt. Ltd.Smart factory Solution from InTouch Systems Pvt. Ltd.
Smart factory Solution from InTouch Systems Pvt. Ltd.Sanjay Singh
 
Sushant edp
Sushant edpSushant edp
Sushant edpzalak007
 
Computerised Accounting System
Computerised Accounting SystemComputerised Accounting System
Computerised Accounting Systemengineer sood
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)Rikesh Chaurasia
 
Ais Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleAis Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleSharing Slides Training
 
Management Information System-Process Control system
Management Information System-Process Control systemManagement Information System-Process Control system
Management Information System-Process Control systemAloshy cheriyan
 
Erp (Enterprise Resource Planning)
Erp (Enterprise Resource Planning)Erp (Enterprise Resource Planning)
Erp (Enterprise Resource Planning)Vibhor Agarwal
 
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...ryfomoluq
 
'Electronic Batch Process recording system
'Electronic Batch Process recording system'Electronic Batch Process recording system
'Electronic Batch Process recording systemanusa
 
Introduction to computerised accounting
Introduction to computerised  accountingIntroduction to computerised  accounting
Introduction to computerised accountingItisha Sharma
 
Computerised accounting plus_one_chap_12_15_2
Computerised  accounting plus_one_chap_12_15_2Computerised  accounting plus_one_chap_12_15_2
Computerised accounting plus_one_chap_12_15_2Prasad Melattur
 
LUBRILYS - LUBRICATION MANAGEMENT SOFTWARE
LUBRILYS - LUBRICATION MANAGEMENT SOFTWARELUBRILYS - LUBRICATION MANAGEMENT SOFTWARE
LUBRILYS - LUBRICATION MANAGEMENT SOFTWAREEnluse B.V.
 
INTRODUCTION TO COMPUTER BASED ACCOUNTING
INTRODUCTION TO COMPUTER BASED ACCOUNTINGINTRODUCTION TO COMPUTER BASED ACCOUNTING
INTRODUCTION TO COMPUTER BASED ACCOUNTINGayanthimadhumali
 
Equipment manager for ems
Equipment manager for emsEquipment manager for ems
Equipment manager for emsDynamic Systems
 
Accounting system and control
Accounting system and controlAccounting system and control
Accounting system and controlRaziya Hameed
 
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...
Lecture 23  expenditure cycle part ii -fixed assets accounting information sy...Lecture 23  expenditure cycle part ii -fixed assets accounting information sy...
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...Habib Ullah Qamar
 
Accounting information system
Accounting information systemAccounting information system
Accounting information systemVivek K. Singh
 

What's hot (20)

Smart factory Solution from InTouch Systems Pvt. Ltd.
Smart factory Solution from InTouch Systems Pvt. Ltd.Smart factory Solution from InTouch Systems Pvt. Ltd.
Smart factory Solution from InTouch Systems Pvt. Ltd.
 
Sushant edp
Sushant edpSushant edp
Sushant edp
 
Computerised Accounting System
Computerised Accounting SystemComputerised Accounting System
Computerised Accounting System
 
James hall ch 1
James hall ch 1James hall ch 1
James hall ch 1
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
 
Ais Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleAis Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production Cycle
 
Management Information System-Process Control system
Management Information System-Process Control systemManagement Information System-Process Control system
Management Information System-Process Control system
 
Erp (Enterprise Resource Planning)
Erp (Enterprise Resource Planning)Erp (Enterprise Resource Planning)
Erp (Enterprise Resource Planning)
 
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
 
'Electronic Batch Process recording system
'Electronic Batch Process recording system'Electronic Batch Process recording system
'Electronic Batch Process recording system
 
James hall ch 7
James hall ch 7James hall ch 7
James hall ch 7
 
Introduction to computerised accounting
Introduction to computerised  accountingIntroduction to computerised  accounting
Introduction to computerised accounting
 
Computerised accounting plus_one_chap_12_15_2
Computerised  accounting plus_one_chap_12_15_2Computerised  accounting plus_one_chap_12_15_2
Computerised accounting plus_one_chap_12_15_2
 
LUBRILYS - LUBRICATION MANAGEMENT SOFTWARE
LUBRILYS - LUBRICATION MANAGEMENT SOFTWARELUBRILYS - LUBRICATION MANAGEMENT SOFTWARE
LUBRILYS - LUBRICATION MANAGEMENT SOFTWARE
 
INTRODUCTION TO COMPUTER BASED ACCOUNTING
INTRODUCTION TO COMPUTER BASED ACCOUNTINGINTRODUCTION TO COMPUTER BASED ACCOUNTING
INTRODUCTION TO COMPUTER BASED ACCOUNTING
 
Equipment manager for ems
Equipment manager for emsEquipment manager for ems
Equipment manager for ems
 
Ch07
Ch07Ch07
Ch07
 
Accounting system and control
Accounting system and controlAccounting system and control
Accounting system and control
 
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...
Lecture 23  expenditure cycle part ii -fixed assets accounting information sy...Lecture 23  expenditure cycle part ii -fixed assets accounting information sy...
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...
 
Accounting information system
Accounting information systemAccounting information system
Accounting information system
 

Similar to Rioldan manufacturing service_request_22_part2(1)

The Proposed Business Process Changes For The System In Riordan .docx
The Proposed Business Process Changes For The System In Riordan .docxThe Proposed Business Process Changes For The System In Riordan .docx
The Proposed Business Process Changes For The System In Riordan .docxssusera34210
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET Journal
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices FrameworkSujata Raskar
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service providerpaulharry03
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedTiffany Graham
 
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps  - SharePoint Fest DCUnderstanding Federal IT Compliance in Three Steps  - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DCAdam Levithan
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSridhar Karnam
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresIJRES Journal
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...IRJET Journal
 
Blockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT DevicesBlockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT DevicesIRJET Journal
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET Journal
 
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSISCASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSISIRJET Journal
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmIRJET Journal
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudIRJET Journal
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET Journal
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageIRJET Journal
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudLockheed Martin
 

Similar to Rioldan manufacturing service_request_22_part2(1) (20)

The Proposed Business Process Changes For The System In Riordan .docx
The Proposed Business Process Changes For The System In Riordan .docxThe Proposed Business Process Changes For The System In Riordan .docx
The Proposed Business Process Changes For The System In Riordan .docx
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service provider
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps  - SharePoint Fest DCUnderstanding Federal IT Compliance in Three Steps  - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
Blockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT DevicesBlockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT Devices
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSISCASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the Cloud
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 

Recently uploaded

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...SOFTTECHHUB
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 

Recently uploaded (20)

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 

Rioldan manufacturing service_request_22_part2(1)

  • 1. -Running head: RIORDAN MANUFACTURING SR-22 -2 Part 1 Riordan Manufacturing SR-22 2 Part Reinaldo Burgos BSA375 December 09, 2012 Ilka Kawashita
  • 2. RIORDAN MANUFACTURING SR 22- 2 Part 2 Riordan Manufacturing Service Request 22 2 Part After theprevious meeting we discussed many important subjects that required additional research to present the safe way to process the transitions of new changes. Alsowe had reviewed different data flow that will work in the best of improve the proper handling between Riordan Manufacturing and the plants related to ensure the best relation between each department. It will improve the communication in Riordan and save money and time after the final implementation. Security Controls Security should be a high level of concern in any project. "Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations" (Dennis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security; especially within the information systems. Data: All data must be kept secure and confidential. Any company data including company policies and procedures, as well as, employee data containing employment information will be held responsible under Riordan Manufacturing. Any forms of data that belong to the company are proprietary; therefore, data encryption and passwords will be utilized to allow authorization to access the data. If any form of data were to be intercepted into the wrong hands, this can be detrimental to the organization. “Lawsuits alone would easily exceed $10 million and the cost of staff to find and reenter paper records would be enormous and certainly would take more than a few weeks" (Dennis, Wixom, & Roth, 2009).
  • 3. RIORDAN MANUFACTURING SR 22- 2 Part 3 Processes:Some processes, such as the application process would benefit from using third-party software. This will allow Riordan Manufacturing to have the security guarantee from the third-party vendor. Using COTS will allow Riordan Manufacturing to save time because programs are already developed and can get some training and services included in them, and it will be a long term investment that will also save money. For any additional program or software that need to cover special projects can be consider an in-house development. Interfaces: "Interface design is the process of defining how the system will interact with external entities e.g., customers, suppliers, other systems" (Dennis, Wixom, & Roth, 2009). System interfaces are also capable of exchanging information with other systems andtherefore require a high level of security. This security can be achieved by incorporating password requirements to unlock confidential and private documents, such as employee files and company tax records. This would help prevent internal security threats of employees attempting to access another employee's computer. Network:One recommendation is to incorporate a company-widedatabase, accessible only via a virtual local area network (VLAN), which allows employees to view and update some basic level information that would be subject to verification by a payroll clerk or supervisor. Such access will required security protection thru the use of username and password. To obtain more detailed informationit will required an authorized payroll clerk or supervisor. At the same time, to obtain that information is important to provide three-factor authentication method: such as username with password and a fingerprint scan to obtain those highly confidential records. In addition, the third-party organizations that administer Riordan employee’s benefits such as their
  • 4. RIORDAN MANUFACTURING SR 22- 2 Part 4 health benefits and workers compensation should be audited on a yearly basis for accuracy and competitiveness. It will ensure the utilization of the most accurate processes within theorganization. Physical Data Flow Diagrams While designing the application logic of the information system, the implementation decisions describing how the system will work. Physical data flow diagrams show these implementation details, including “data stores that refer to files and database tables, programs or human actions that perform processes, and the physical transfer media for the data flows” (Dennis, Wixom, & Roth, 2009). Maintaining a clear and proper implementation it will provide the service expected with the simple and clear results.(TIBCO Software Inc., 2001)
  • 5. RIORDAN MANUFACTURING SR 22- 2 Part 5 After this process there will be a new meeting next week to discuss any additional information about the process and implementation of final changes. Riordan is seeking to resolve those issues in the short time as possible and we will ensure to satisfy all the needs in the safe and secure process.
  • 6. RIORDAN MANUFACTURING SR 22- 2 Part 6 References Apollo Group, Inc. (2012). Virtual Organization Portal: Riordan Manufacturing. Retrieved from https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/index.asp Dennis, A., Wixom, B. H., & Ruth, R. M. (2012).Systems Analysis and Design (5th ed.). Retrieved from the University of Phoenix eBook Collection database. Khosrowpour, M. (1999). Managing information technology resources in organizations in the next millennium. Idea Group Inc (IGI). Riordan Manufacturing. (2012). Retrived July 28, 2012, from https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/index.asp TIBCO Software Inc. (2001). Business process. (pp. 10-15). Palo Alto, CA: Global Headquarters. Retrieved from http://www.tibco.com/multimedia/business-process- design_tcm8-2399.pdf