MMT2 IT strategic solution task 1 - Task Write a proposal...

This preview shows page 1 - 3 out of 5 pages.

We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Principles of Information Systems
The document you are viewing contains questions related to this textbook.
Chapter 3 / Exercise 1
Principles of Information Systems
Reynolds/Stair
Expert Verified
Task: Write a proposal to the CTO of A Energy Company in which you do the following: A. Perform a SWOT analysis of the existing IT infrastructure by doing the following: 1. Evaluate the existing strengths of the current IT infrastructure. 2. Evaluate the existing weaknesses of the current IT infrastructure. 3. Analyze opportunities for updating technology within the current IT infrastructure. 4. Analyze threats that could result from continued use of the current IT infrastructure. Answer: To assist in identifying the strength, weakness, opportunities, and threats for A Energy Company, a SWOT analysis will be performed. A SWOT analysis is a structured method of planning that identifies the strengths, weaknesses, opportunities and threats for the company that is being analyzed. It will provide the company most optimal suggestion for the expansion of the IT infrastructure in the north and south region of the United States. In the following evaluation of the existing strengths and weakness of the current IT infrastructure and followed by an analysis of opportunities and threats within current IT infrastructure will be discussed. Strength Firstly, functional efficiency enables employees to integrate technology into their design, development, and production of component parts. Secondly, each site is backed up more frequently at an offsite location to minimize data losses in case there is any disaster happens. Thirdly, the company maintains multiple routes for information and intrinsic network traffic, so that the flow of information is smooth and network traffic is at minimum. Fourthly, strong supply-chain management helps build competitive advances in the efficiency in energy. Fifthly, for secure connection, Virtual Private Network (VPN) is used and for further security, WPA encryption and MAC address filtering for security has been adopted. Sixthly, to provide storage and serve programs, there is a series of servers located in separate cabinet with restricted access. Moreover, Database servers have higher security as it is accessible only from SSL connection and it is also SQL searchable. To access database server, electronic key card system is integrated which is a part of tracking system so that any information can be tracked if unauthorized access is happened. Seventhly, the email server has large storage capacity to mail storage and to maintain communication record. Eighthly, the existing IT infrastructure ensures six sigma standards for production if any discrepancy happens, then it sends alerts to the machine for immediate correction. It ensures highest quality of the production. Weaknesses There are some weaknesses found in the existing IT infrastructure. Firstly, the limited number of staff, 30 members to expand business to new region is very difficult. To facilitate expansion, skilled manpower must be recruited. Secondly, current IT infrastructure provides numerous redundancies to maintain usability in the event of a crisis but increases cost significantly due to redundancy.
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Principles of Information Systems
The document you are viewing contains questions related to this textbook.
Chapter 3 / Exercise 1
Principles of Information Systems
Reynolds/Stair
Expert Verified
Opportunities

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture