SlideShare a Scribd company logo
-Running head: RIORDAN MANUFACTURING SR-22 -2 Part         1




                      Riordan Manufacturing SR-22 2 Part

                               Reinaldo Burgos

                                   BSA375

                              December 09, 2012

                                Ilka Kawashita
RIORDAN MANUFACTURING SR 22- 2 Part                                                                 2




                        Riordan Manufacturing Service Request 22 2 Part

       After theprevious meeting we discussed many important subjects that required additional

research to present the safe way to process the transitions of new changes. Alsowe had reviewed

different data flow that will work in the best of improve the proper handling between Riordan

Manufacturing and the plants related to ensure the best relation between each department. It will

improve the communication in Riordan and save money and time after the final implementation.

                                        Security Controls


   Security should be a high level of concern in any project. "Security is primarily the

responsibility of the operations group, which consist of the staff responsible for installing and

operating security controls such as firewalls, intrusion detection systems, and routine backup and

recovery operations" (Dennis, Wixom, & Roth, 2009). However, system developers also have a

responsibility when it comes to security; especially within the information systems.


   Data: All data must be kept secure and confidential. Any company data including company

policies and procedures, as well as, employee data containing employment information will be

held responsible under Riordan Manufacturing. Any forms of data that belong to the company

are proprietary; therefore, data encryption and passwords will be utilized to allow authorization

to access the data. If any form of data were to be intercepted into the wrong hands, this can be

detrimental to the organization. “Lawsuits alone would easily exceed $10 million and the cost of

staff to find and reenter paper records would be enormous and certainly would take more than a

few weeks" (Dennis, Wixom, & Roth, 2009).
RIORDAN MANUFACTURING SR 22- 2 Part                                                                 3




       Processes:Some processes, such as the application process would benefit from using

third-party software. This will allow Riordan Manufacturing to have the security guarantee from

the third-party vendor. Using COTS will allow Riordan Manufacturing to save time because

programs are already developed and can get some training and services included in them, and it

will be a long term investment that will also save money. For any additional program or software

that need to cover special projects can be consider an in-house development.


       Interfaces: "Interface design is the process of defining how the system will interact with

external entities e.g., customers, suppliers, other systems" (Dennis, Wixom, & Roth, 2009).

System interfaces are also capable of exchanging information with other systems andtherefore

require a high level of security. This security can be achieved by incorporating password

requirements to unlock confidential and private documents, such as employee files and company

tax records. This would help prevent internal security threats of employees attempting to access

another employee's computer.


       Network:One recommendation is to incorporate a company-widedatabase, accessible

only via a virtual local area network (VLAN), which allows employees to view and update some

basic level information that would be subject to verification by a payroll clerk or supervisor.

Such access will required security protection thru the use of username and password. To obtain

more detailed informationit will required an authorized payroll clerk or supervisor. At the same

time, to obtain that information is important to provide three-factor authentication method: such

as username with password and a fingerprint scan to obtain those highly confidential records. In

addition, the third-party organizations that administer Riordan employee’s benefits such as their
RIORDAN MANUFACTURING SR 22- 2 Part                                                               4




health benefits and workers compensation should be audited on a yearly basis for accuracy and

competitiveness. It will ensure the utilization of the most accurate processes within

theorganization.


                                 Physical Data Flow Diagrams


       While designing the application logic of the information system, the implementation

decisions describing how the system will work. Physical data flow diagrams show these

implementation details, including “data stores that refer to files and database tables, programs or

human actions that perform processes, and the physical transfer media for the data flows”

(Dennis, Wixom, & Roth, 2009). Maintaining a clear and proper implementation it will provide

the service expected with the simple and clear results.(TIBCO Software Inc., 2001)
RIORDAN MANUFACTURING SR 22- 2 Part                                                                  5




       After this process there will be a new meeting next week to discuss any additional

information about the process and implementation of final changes. Riordan is seeking to resolve

those issues in the short time as possible and we will ensure to satisfy all the needs in the safe

and secure process.
RIORDAN MANUFACTURING SR 22- 2 Part                                                             6




                                          References

Apollo Group, Inc. (2012). Virtual Organization Portal: Riordan Manufacturing. Retrieved from


       https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/index.asp


Dennis, A., Wixom, B. H., & Ruth, R. M. (2012).Systems Analysis and Design (5th ed.).


       Retrieved from the University of Phoenix eBook Collection database.


Khosrowpour, M. (1999). Managing information technology resources in organizations in the


       next millennium. Idea Group Inc (IGI).

Riordan Manufacturing. (2012). Retrived July 28, 2012, from


       https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/index.asp


TIBCO Software Inc. (2001). Business process. (pp. 10-15). Palo Alto, CA: Global
       Headquarters. Retrieved from http://www.tibco.com/multimedia/business-process-
       design_tcm8-2399.pdf

More Related Content

What's hot

Smart factory Solution from InTouch Systems Pvt. Ltd.
Smart factory Solution from InTouch Systems Pvt. Ltd.Smart factory Solution from InTouch Systems Pvt. Ltd.
Smart factory Solution from InTouch Systems Pvt. Ltd.Sanjay Singh
 
Sushant edp
Sushant edpSushant edp
Sushant edpzalak007
 
Computerised Accounting System
Computerised Accounting SystemComputerised Accounting System
Computerised Accounting System
engineer sood
 
James hall ch 1
James hall ch 1James hall ch 1
James hall ch 1
David Julian
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)Rikesh Chaurasia
 
Ais Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleAis Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production Cycle
Sharing Slides Training
 
Management Information System-Process Control system
Management Information System-Process Control systemManagement Information System-Process Control system
Management Information System-Process Control system
Aloshy cheriyan
 
Erp (Enterprise Resource Planning)
Erp (Enterprise Resource Planning)Erp (Enterprise Resource Planning)
Erp (Enterprise Resource Planning)
Vibhor Agarwal
 
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
ryfomoluq
 
'Electronic Batch Process recording system
'Electronic Batch Process recording system'Electronic Batch Process recording system
'Electronic Batch Process recording systemanusa
 
James hall ch 7
James hall ch 7James hall ch 7
James hall ch 7
David Julian
 
Introduction to computerised accounting
Introduction to computerised  accountingIntroduction to computerised  accounting
Introduction to computerised accounting
Itisha Sharma
 
Computerised accounting plus_one_chap_12_15_2
Computerised  accounting plus_one_chap_12_15_2Computerised  accounting plus_one_chap_12_15_2
Computerised accounting plus_one_chap_12_15_2
Prasad Melattur
 
LUBRILYS - LUBRICATION MANAGEMENT SOFTWARE
LUBRILYS - LUBRICATION MANAGEMENT SOFTWARELUBRILYS - LUBRICATION MANAGEMENT SOFTWARE
LUBRILYS - LUBRICATION MANAGEMENT SOFTWARE
Enluse B.V.
 
INTRODUCTION TO COMPUTER BASED ACCOUNTING
INTRODUCTION TO COMPUTER BASED ACCOUNTINGINTRODUCTION TO COMPUTER BASED ACCOUNTING
INTRODUCTION TO COMPUTER BASED ACCOUNTING
ayanthimadhumali
 
Equipment manager for ems
Equipment manager for emsEquipment manager for ems
Equipment manager for emsDynamic Systems
 
Accounting system and control
Accounting system and controlAccounting system and control
Accounting system and control
Raziya Hameed
 
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...
Lecture 23  expenditure cycle part ii -fixed assets accounting information sy...Lecture 23  expenditure cycle part ii -fixed assets accounting information sy...
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...
Habib Ullah Qamar
 
Accounting information system
Accounting information systemAccounting information system
Accounting information system
Vivek K. Singh
 

What's hot (20)

Smart factory Solution from InTouch Systems Pvt. Ltd.
Smart factory Solution from InTouch Systems Pvt. Ltd.Smart factory Solution from InTouch Systems Pvt. Ltd.
Smart factory Solution from InTouch Systems Pvt. Ltd.
 
Sushant edp
Sushant edpSushant edp
Sushant edp
 
Computerised Accounting System
Computerised Accounting SystemComputerised Accounting System
Computerised Accounting System
 
James hall ch 1
James hall ch 1James hall ch 1
James hall ch 1
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
 
Ais Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleAis Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production Cycle
 
Management Information System-Process Control system
Management Information System-Process Control systemManagement Information System-Process Control system
Management Information System-Process Control system
 
Erp (Enterprise Resource Planning)
Erp (Enterprise Resource Planning)Erp (Enterprise Resource Planning)
Erp (Enterprise Resource Planning)
 
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
 
'Electronic Batch Process recording system
'Electronic Batch Process recording system'Electronic Batch Process recording system
'Electronic Batch Process recording system
 
James hall ch 7
James hall ch 7James hall ch 7
James hall ch 7
 
Introduction to computerised accounting
Introduction to computerised  accountingIntroduction to computerised  accounting
Introduction to computerised accounting
 
Computerised accounting plus_one_chap_12_15_2
Computerised  accounting plus_one_chap_12_15_2Computerised  accounting plus_one_chap_12_15_2
Computerised accounting plus_one_chap_12_15_2
 
LUBRILYS - LUBRICATION MANAGEMENT SOFTWARE
LUBRILYS - LUBRICATION MANAGEMENT SOFTWARELUBRILYS - LUBRICATION MANAGEMENT SOFTWARE
LUBRILYS - LUBRICATION MANAGEMENT SOFTWARE
 
INTRODUCTION TO COMPUTER BASED ACCOUNTING
INTRODUCTION TO COMPUTER BASED ACCOUNTINGINTRODUCTION TO COMPUTER BASED ACCOUNTING
INTRODUCTION TO COMPUTER BASED ACCOUNTING
 
Equipment manager for ems
Equipment manager for emsEquipment manager for ems
Equipment manager for ems
 
Ch07
Ch07Ch07
Ch07
 
Accounting system and control
Accounting system and controlAccounting system and control
Accounting system and control
 
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...
Lecture 23  expenditure cycle part ii -fixed assets accounting information sy...Lecture 23  expenditure cycle part ii -fixed assets accounting information sy...
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...
 
Accounting information system
Accounting information systemAccounting information system
Accounting information system
 

Similar to Rioldan manufacturing service_request_22_part2(1)

The Proposed Business Process Changes For The System In Riordan .docx
The Proposed Business Process Changes For The System In Riordan .docxThe Proposed Business Process Changes For The System In Riordan .docx
The Proposed Business Process Changes For The System In Riordan .docx
ssusera34210
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
Eryk Budi Pratama
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET Journal
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
Sujata Raskar
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service provider
paulharry03
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
Tiffany Graham
 
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps  - SharePoint Fest DCUnderstanding Federal IT Compliance in Three Steps  - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
Adam Levithan
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSridhar Karnam
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
IJRES Journal
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET Journal
 
Blockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT DevicesBlockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT Devices
IRJET Journal
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET Journal
 
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSISCASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
IRJET Journal
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
IRJET Journal
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
IRJET Journal
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
IRJET Journal
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the Cloud
Lockheed Martin
 

Similar to Rioldan manufacturing service_request_22_part2(1) (20)

The Proposed Business Process Changes For The System In Riordan .docx
The Proposed Business Process Changes For The System In Riordan .docxThe Proposed Business Process Changes For The System In Riordan .docx
The Proposed Business Process Changes For The System In Riordan .docx
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service provider
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps  - SharePoint Fest DCUnderstanding Federal IT Compliance in Three Steps  - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
Blockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT DevicesBlockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT Devices
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSISCASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the Cloud
 

Recently uploaded

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Rioldan manufacturing service_request_22_part2(1)

  • 1. -Running head: RIORDAN MANUFACTURING SR-22 -2 Part 1 Riordan Manufacturing SR-22 2 Part Reinaldo Burgos BSA375 December 09, 2012 Ilka Kawashita
  • 2. RIORDAN MANUFACTURING SR 22- 2 Part 2 Riordan Manufacturing Service Request 22 2 Part After theprevious meeting we discussed many important subjects that required additional research to present the safe way to process the transitions of new changes. Alsowe had reviewed different data flow that will work in the best of improve the proper handling between Riordan Manufacturing and the plants related to ensure the best relation between each department. It will improve the communication in Riordan and save money and time after the final implementation. Security Controls Security should be a high level of concern in any project. "Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations" (Dennis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security; especially within the information systems. Data: All data must be kept secure and confidential. Any company data including company policies and procedures, as well as, employee data containing employment information will be held responsible under Riordan Manufacturing. Any forms of data that belong to the company are proprietary; therefore, data encryption and passwords will be utilized to allow authorization to access the data. If any form of data were to be intercepted into the wrong hands, this can be detrimental to the organization. “Lawsuits alone would easily exceed $10 million and the cost of staff to find and reenter paper records would be enormous and certainly would take more than a few weeks" (Dennis, Wixom, & Roth, 2009).
  • 3. RIORDAN MANUFACTURING SR 22- 2 Part 3 Processes:Some processes, such as the application process would benefit from using third-party software. This will allow Riordan Manufacturing to have the security guarantee from the third-party vendor. Using COTS will allow Riordan Manufacturing to save time because programs are already developed and can get some training and services included in them, and it will be a long term investment that will also save money. For any additional program or software that need to cover special projects can be consider an in-house development. Interfaces: "Interface design is the process of defining how the system will interact with external entities e.g., customers, suppliers, other systems" (Dennis, Wixom, & Roth, 2009). System interfaces are also capable of exchanging information with other systems andtherefore require a high level of security. This security can be achieved by incorporating password requirements to unlock confidential and private documents, such as employee files and company tax records. This would help prevent internal security threats of employees attempting to access another employee's computer. Network:One recommendation is to incorporate a company-widedatabase, accessible only via a virtual local area network (VLAN), which allows employees to view and update some basic level information that would be subject to verification by a payroll clerk or supervisor. Such access will required security protection thru the use of username and password. To obtain more detailed informationit will required an authorized payroll clerk or supervisor. At the same time, to obtain that information is important to provide three-factor authentication method: such as username with password and a fingerprint scan to obtain those highly confidential records. In addition, the third-party organizations that administer Riordan employee’s benefits such as their
  • 4. RIORDAN MANUFACTURING SR 22- 2 Part 4 health benefits and workers compensation should be audited on a yearly basis for accuracy and competitiveness. It will ensure the utilization of the most accurate processes within theorganization. Physical Data Flow Diagrams While designing the application logic of the information system, the implementation decisions describing how the system will work. Physical data flow diagrams show these implementation details, including “data stores that refer to files and database tables, programs or human actions that perform processes, and the physical transfer media for the data flows” (Dennis, Wixom, & Roth, 2009). Maintaining a clear and proper implementation it will provide the service expected with the simple and clear results.(TIBCO Software Inc., 2001)
  • 5. RIORDAN MANUFACTURING SR 22- 2 Part 5 After this process there will be a new meeting next week to discuss any additional information about the process and implementation of final changes. Riordan is seeking to resolve those issues in the short time as possible and we will ensure to satisfy all the needs in the safe and secure process.
  • 6. RIORDAN MANUFACTURING SR 22- 2 Part 6 References Apollo Group, Inc. (2012). Virtual Organization Portal: Riordan Manufacturing. Retrieved from https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/index.asp Dennis, A., Wixom, B. H., & Ruth, R. M. (2012).Systems Analysis and Design (5th ed.). Retrieved from the University of Phoenix eBook Collection database. Khosrowpour, M. (1999). Managing information technology resources in organizations in the next millennium. Idea Group Inc (IGI). Riordan Manufacturing. (2012). Retrived July 28, 2012, from https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/index.asp TIBCO Software Inc. (2001). Business process. (pp. 10-15). Palo Alto, CA: Global Headquarters. Retrieved from http://www.tibco.com/multimedia/business-process- design_tcm8-2399.pdf