StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Enterprise Information Security Architecture - Research Paper Example

Cite this document
Summary
The paper "Enterprise Information Security Architecture " highlights that in the recent past the need for Enterprise Information Security Architecture (EISA) has become a common necessity for many corporations as well as institutes of higher learning. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Enterprise Information Security Architecture
Read Text Preview

Extract of sample "Enterprise Information Security Architecture"

The witnessed continued and fast growth of IT and e variety of challenges to those business organizations that invest heavily in information and communication technologies to support their day-to-day business activities. Chief IT infrastructure components of these organizations are particularly at high risk of interrupting the IT operations leading to significant social and economic declines (Aoufi & Office, 2011). Light Walkers Ltd is in this category of risk since it relies heavily on IT in its business operation processes. The organization lacks basic standards of EISA, centralization, and methodological maturity.

Computing hardware
Light Walkers Ltd hardware computing infrastructures are medium in terms of specification. The organization is organized into different departments whereby each department is equipped with different computing hardware. The department of human resources for instance is equipped with legacy systems. The workstations are old such that they are not adaptable to the changing business needs of the organization. These systems are not only old; they are also from various computer vendors such as Dell, Compaq, Fujitsu, and HP. This variance in the hardware architecture brings about the difficulty of transforming the organization to suit the current business requirements. In this case, if the organization has to consider changing in resonance with the changing business environment, Light Walkers Ltd should think of procuring new computer systems hardware. This will bring the organization to the basic requirement of platform standardization required in the EISA framework.

The department of finance is also equipped with varying hardware platforms. The same case applies to the department of sales and marketing and the department of production. The specifications for these systems are not suitable for complying with the current volatile business trends. The RAM size for most computing hardware in this organization is 512MB with a hard disk space of 120GB and a processing speed of 2.0GHz.

The organization is also in possession of three servers for production, financial information, a web server, and a proxy server for the internet. These servers are all from HP Company and have a RAM size of 3.0 GB, hard disk space of 500GB, and processing speeds of 3.0 GHz. It is not long since those machines were procured but due to changing business needs of Light Walkers Ltd, the servers are no longer capable of supporting evolving business requirements efficiently.
Light Walkers Ltd also has external storage devices for backup purposes. The mainly used storage devices are the basic DVDs. However, there are also external hard disk drives of 250 GB used for backing up critical information of the organization such as financial information.

Network components
Light Walkers Ltd is composed of various departments and sections physically separated. They are however interlinked through a LAN network that is wired using the common copper Ethernet cables. There are various switches, network bridges, and routers. This network is maintained by the IT staff of the organization. Client-server technology is used to link the individual hosts sharing common data and information.
Software components
There is special software that is used by various departments of Light Walkers Ltd to execute their tasks such as accounting software for the finance department and human resource management system for the human resources department. These software programs from various software vendors are installed in specific machines where they are only needed for business purposes.

The operating systems running in Light Walkers Ltd computer system workstations are of varied vendors. Most of these workstations run Mac OS while some operate on Linux and others on Microsoft Windows. All the servers run on Linux operating system since the security of Linux is more advanced. All the computer systems in the organization are protected against viruses with the Kaspersky antivirus program from Kaspersky. Software programs in these computers are maintained and serviced by the IT personnel of Light Walkers Ltd.


Recommendations
I highly recommend that Light Walkers Ltd should consider purchasing new computer systems with high specifications in the market to allow the organization to cope with tremendous changes in business requirements. These systems should be bought from a reliable vendor whose machines have proved to withstand challenges normally witnessed in the computing world. Examples of such vendors include HP, Dell, or Compaq but only one of them should be chosen.

I also recommend that the organization should consider centralization of software components like the accounting software, the human resource management system, and the production management system by procuring an ERP system to put to rest various issues arising from the isolation of information systems and to cut down the costs and reinforce efficiency (Bigelow, 2002). The centralized approach of information systems has proved to be efficient in supporting the business processes of an organization (Lane, 2011).
In addition, the company should consider migrating to wireless connectivity to support free connectivity movement of personnel within the company for example when having meetings and needing to use the internet. This calls for another recommendation that the company also consider procuring laptop machines for the same reason.
Considering all these recommendations will help the organization achieve the standardization, centralization, and methodology requirements required for EISA.
Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“EISA: Capturing the Current State Relative to a Given Business Process Research Paper”, n.d.)
EISA: Capturing the Current State Relative to a Given Business Process Research Paper. Retrieved from https://studentshare.org/information-technology/1443979-eisa-hardware-components-documentation-and-diagram
(EISA: Capturing the Current State Relative to a Given Business Process Research Paper)
EISA: Capturing the Current State Relative to a Given Business Process Research Paper. https://studentshare.org/information-technology/1443979-eisa-hardware-components-documentation-and-diagram.
“EISA: Capturing the Current State Relative to a Given Business Process Research Paper”, n.d. https://studentshare.org/information-technology/1443979-eisa-hardware-components-documentation-and-diagram.
  • Cited: 0 times

CHECK THESE SAMPLES OF Enterprise Information Security Architecture

The Zachman Framework

The Zachman framework is believed to be the most comprehensive and practical of all enterprise architecture systems currently known to the public.... The Zachman framework exemplifies a successful attempt to revolutionize enterprise architecture principles and solve the centuries old problem of inefficient enterprise architecture, which hinders the development of relevant business frameworks.... Throughout of the 1980s, most enterprise modeling ideas were limited to simplified application development, with no attention given to the concept of architecture and its implications for information systems evolution (Zachman, 1993)....
6 Pages (1500 words) Essay

Virtual Private Network Architecture

VIRTUAL PRIVATE NETWORK architecture Virtual Private Network architecture Author Author Affiliation Date This paper presents an overview of the virtual cloud environment.... advantageous that cloud resources be flawlessly incorporated or combined with an organization's existing architecture without the need to deal with management, handle substantial configuration, or security concerns.... Thus, in order to deal with these challenges, there is a need to improve the cloud computing architecture to flawlessly put together virtual private networks (VPNs) (Wood, Shenoy, Gerber, Ramakrishnan, & Merwe, 2009; Rittinghouse & Ransome, 2009)....
3 Pages (750 words) Essay

Gypsy Fashion Deco Co. The Global Expansion

it has to adopt the enterprise architecture of its information technology system integrating the whole global expansion project into one working dynamic group.... dentification of Major Enterprise architecture Issues ... nalysis of the Major Enterprise architecture Issues ... Schekkerman (2005) acknowledges that enterprise architecture "is about understanding all of the different elements that go to make up the enterprise and how those elements inter-relate," facilitating factual and actual knowledge on the existence of the enterprise and everything that keeps it going....
11 Pages (2750 words) Essay

Computer Web Services (SOA, restful services)

The researcher focuses on the discussion of a massive demand for exchange of data and information across various enterprises.... This essay describes the computer web services, that form today the core technology for developing distributed web applications.... .... ... ... A Web Service that is discussed in the essay, is a powerful software tool that has massively boosted the efficiency of communication among various business organizations....
5 Pages (1250 words) Essay

Enterprise Architecture

The author of this essay entitled "Enterprise architecture" casts light on the latest architectural developments.... The author offers an architecture development methodology, based on TOGAF and comprising four steps: tailoring TOGAF to suit enterprise needs; defining the scope of work; overseeing development; and managing post-implementation aspects.... Banerjee claims that the TOGAF architecture is not the ultimate solution but merely a starting point in the development of effective enterprise solutions....
12 Pages (3000 words) Essay

Enterprise Architecture Technique

This research paper "Enterprise architecture Technique" presents a detailed analysis of the latest emerging trend in the business world known as enterprise architecture.... The enterprise architecture is a complete depiction of all of the key processes and relationships that make up an organization.... Enterprise architecture is a theoretical framework that outlines the structure of an organization.... This paper will start with a brief overview of enterprise architecture, after that we will discuss customer relationship management....
19 Pages (4750 words) Research Paper

Enterprise Information Architecture

The focus of this paper is on Enterprise architecture is a comprehensive compilation of an organization's operational frameworks, its design, functionality, interrelation, and applications.... It is evidently clear from the discussion that enterprise architecture as an art because it involves re-invention of systems, re-designing of operations and restructuring operations.... The relative maturity intricately affects my architecture and deliverables as it determines how well the objectives of the enterprise architecture are achieved....
6 Pages (1500 words) Assignment

Security Consultant in the Architecture Design Process

security architecture is an integrated security design intended to handle the requirements and potential risks associated with a particular environment or scenario.... security architecture is an integrated security design intended to handle the requirements and potential risks associated with a particular environment or scenario.... According to Gibbs (2008), the design principles in security architecture are often reported clearly, while the specifications of the in-depth security control are usually documented in independent documents....
15 Pages (3750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us