Monday, June 10, 2019
Florida Department of Management Services Case Study
Florida Department of Management Services - Case Study ExampleFor this to be achieved, connections of virtual point-to-point must be done. These connections make use of encryptions and dedicate connection easy. This brings about a similarity in the manner in which admission fee to information on the extended network and the way there is access on the private network. This way, employees are able to access information from the department of management intranet while they are far from the office. This starts with entering the employees identification credentials. That way, new(prenominal) internet users who are not employees cannot be able to access it (Cordin, 2006). The IP security on the other hand acts as a filter for vocation going through the administrator of the network. It ensures access to only those authenticated. The IP security authenticates and encrypts every communication session IP packet. It includes mutual authentication establishment protocols amongst agents whil e starting the session as well as cryptographic keys negotiation in the course of the session. It therefore protects the flow of entropy between security gates pair, host pair or network to host. An IP security protects the IP network against application traffic. The IP security therefore, is a security mechanism (Peterovic, 2009). The transition the Florida department of management system was to be carried out in two phases shadowing and on-the-job transition. During shadowing, the new service provider worked under the former provider and observed the daily operations. During this period, the new provider read the relevant material in order to get familiar with the factual work. On job transition, on the other hand, allowed the new provider to participate in the process. This, however, made the process unnecessarily long and costly. During this transition, the IP infrastructure was developed. afterwards this, DMS started adding applications. One of the most widely used applicati ons was the system of Client /server employment. The former system was used to barge in information to be used to store data of 125,000 employees. This system had proven to be more secure and offered reliable services. It was however, very slow. This configuration catered for 6000 users all over the state (Afuah, 2012). SNA control processors controlled the users. During transition, they were transformed into router networks. The router networks were stationed in deferent parts and centralized to a central router. This increased the speed and access of information about employees. Furthermore, this made payment of salaries easier. This however, comes along with many challenges. In the transition, issues of security of the data were not addressed. The employees could easily access all the information that needed not to be in their custody. Furthermore, the new structure opened up room for other internet users to access the information that could otherwise be considered confidential. This therefore, compromised the security (Afuah, 2012). One of the services offered on the DMS website include provision for jobs and vacancies posting (Afuah, 2009). eon this can be viewed as a good service, it comes along with several challenges. To begin with, it allows for frauds since it is hard to distinguish between genuine employers and those who want to take good of Job seekers by stilling from them. Furthermore, the online job posting could lead to very many responses many of which are from unqualified people. This makes
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.