.

Tuesday, April 23, 2019

Florida Department of Management Services Case Study

Florida Department of Management serve - Case Study ExampleFor this to be achieved, connections of virtual point-to-point must be done. These connections make use of encryptions and apply connection easy. This brings about a similarity in the manner in which retrieve to discipline on the extended ne twork and the way there is access on the private network. This way, employees are able to access information from the department of management intranet while they are far from the office. This starts with entering the employees identification credentials. That way, early(a) internet users who are not employees cannot be able to access it (Cordin, 2006). The IP security on the otherwise hand acts as a filter for traffic going through the administrator of the network. It ensures access to moreover those authenticated. The IP security authenticates and encrypts every communication session IP packet. It includes mutual authentication establishment protocols surrounded by agents while starting the session as well as cryptographic keys dialog in the course of the session. It therefore protects the flow of data between security gates play off, host pair or network to host. An IP security protects the IP network against application traffic. The IP security therefore, is a security mechanism (Peterovic, 2009). The transition the Florida department of management strategy was to be carried out in two phases shadowing and on-the-job transition. During shadowing, the new service provider worked under the former provider and observed the day-by-day operations. During this period, the new provider read the relevant material in order to get familiar with the literal work. On job transition, on the other hand, anyowed the new provider to participate in the answer. This, however, made the process unnecessarily long and costly. During this transition, the IP infrastructure was developed. After this, DMS started adding applications. One of the most widely used applicatio ns was the system of Client /server employment. The former system was used to blood line information to be used to store data of 125,000 employees. This system had proven to be more secure and offered reliable services. It was however, very slow. This configuration catered for 6000 users all over the state (Afuah, 2012). SNA control processors controlled the users. During transition, they were transformed into router networks. The router networks were stationed in deferent parts and interchangeized to a central router. This increased the speed and access of information about employees. Furthermore, this made payment of salaries easier. This however, comes along with many challenges. In the transition, issues of security of the data were not addressed. The employees could easily access all the information that needed not to be in their custody. Furthermore, the new structure opened up room for other internet users to access the information that could otherwise be considered confide ntial. This therefore, compromised the security (Afuah, 2012). One of the services offered on the DMS website include provision for jobs and vacancies posting (Afuah, 2009). composition this can be viewed as a good service, it comes along with several challenges. To begin with, it allows for frauds since it is hard to get along between genuine employers and those who want to take advantage of Job seekers by stilling from them. Furthermore, the online job posting could ternion to very many responses many of which are from unqualified people. This makes

No comments:

Post a Comment