IT Infrastructure and System Analysis for Riordan Manufacturing

Verified

Added on  2022/11/10

|8
|1786
|114
Report
AI Summary
This report provides a comprehensive analysis of Riordan Manufacturing's IT systems, focusing on their functionalities, hardware, and software components. It examines the organization's wide area network (WAN) and its global interconnectivity, specifically highlighting the connection between the headquarters and the China facility via a satellite link. The report identifies potential risks associated with the current IT infrastructure, especially concerning the security of sensitive data stored on the network. It emphasizes the importance of implementing robust security measures, such as firewalls, access controls, and data backup systems, to protect against cyber threats and ensure business continuity. The report also discusses the significance of patent protection for Riordan's products and the role of the IT department in addressing potential infringements. Furthermore, it stresses the need for continuous system upgrades, risk management strategies, and the expertise of IT specialists to safeguard the organization's data and maintain a secure IT environment. The report concludes by underscoring the critical need for enhanced security protocols to mitigate risks and protect Riordan Manufacturing's valuable assets.
Document Page
Running head: INFORMATION SYSTEM AND TECHNOLOGY
INFORMATION SYSTEM AND TECHNOLOGY
Name of Student:
Name of University:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INFORMATION SYSTEM AND TECHNOLOGY
Table of Contents
A. Introduction.....................................................................................................................2
B. Body................................................................................................................................2
C. Conclusion.......................................................................................................................5
D. Reference.........................................................................................................................6
Document Page
2INFORMATION SYSTEM AND TECHNOLOGY
A. Introduction
Riordan Manufacturing have made an initiative of the reorganisation of the company. As
they have moved to the assistant project director in the information system position the first
and foremost assignment that was done in performing various type of research which are
related to the IT infrastructure of the organisation for the new settled office (Riordan, Hine &
Smith, 2017). This is the paper which is focused on describing all the IT systems of the
organisation along with all its functions. Beside to this there is described about the main
system of Riordan Manufacturing which use the interconnectivity globally (Aghion, Howitt
& Prantl, 2015). A failure of the particular system is also described. After this the report will
also describe the way to protect the products and all the consequences that will take place in
case of low security.
B. Body
The systems of the head quarter are connected to one another by WAN. The Connection of
WAN which is between the head quarter and the facility department of China is connected by
satellite link. Beside to this the company wishes to have a new infrastructure of IT though the
necessary amount of money is not available with them (Meldaueet al., 2016). In the present
all of the plants have different type of network connection along with all the network location
have a specific layout. As there are scarcity in case of the plans and all the practices which
are in trouble in case of the network (Harkin, Whelan & Chang, 2018). As there are saved
information in the network of the organisation, the security of the network will be helpful in
case of the success of the organisation.
Riordan is considered as a global organisation where the networks are connected with the
plant present in china where the connection of network is same to that of all the plants in US
(O'Mahony et al., 2016). There are a number of 250 employees in the plant of China, due to
Document Page
3INFORMATION SYSTEM AND TECHNOLOGY
this the formation of this huge number of members have increased the threat on security. In
this case the organisation must ensure the available security measures (Angst et al., 2016). In
the time of daily business and in case of phone calls and transfer of email in between one of
the plant to the other plant, it is the responsibility of the organisation to check whether the
information is sent successfully or not (Wagner & Wakeman, 2016). This is help to secure
the confidential data. Beside to all the plants it is necessary for the plant in China also keep
the IT department trustworthy.
In case to secure the data of the organisation the first thing to be done is to back up the
database and to keep an alternative plan (Manogaran, Thota & Kumar, 2016). Next t this all
the plant of the organisation must have dependable firewalls. If there is no firewall there is a
chance for the hacking the network and also all the unknown person can have access to the
network. The management system must be developed in case of all the employees for
understanding the amount of information of the company which can be seen. In most of the
cases after login only the employees can see most of the information, which is a good
practice (Rahim & Ikhwan, 2016). By doing this the unwanted person will not be able to see
all the information of the organisation. Again in other case if all the employees of the
organisation have the authority to see all the data it can be unsecured. The hackers will
always take the opportunity to hack the devices. If the security measures are not implemented
in a proper way it becomes difficult to manage the security.
The demand of the technology of computer along with developments of the technology
along with the design of the system, the organisations have made an update to all their
systems (Brown, 2015). It is mentioned that the upgrade of routine network is important for
the security and to make a risk management plan. With all these a strategy of security is
important for the technical architecture and the operational architecture of the network. This
will help to increase the function of the organisation.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4INFORMATION SYSTEM AND TECHNOLOGY
Due the use of the computers that are out of date declines the graph of sale which also
effect on the production of the company. In each of the location of the organisation there are
numerous number of network where the computers which are upgraded are kept in a network
which is safer, that will also benefit the organisation. By doing this the productivity will also
increase along with the reliable systems that are more reliable. By the making of department
of IT at all the locations will give a security to the location. This will help in providing a
secured data collection for the organisation.
Patents are used in the all the products of the organisation to make the products more
secured. This will prevent all the companies to make the similar products. If this happens the
IT department will come into action. There the IT department will track, investigate and will
also solve the problems. The department will implement the limited access and will also
maintain the system of the limited access. The organisation head and the employees of the
department of IT will have access to the secured area of the IT department.
The company that are having numerous plants where one of them is located in China will
be able to make a risk in respect to the security of the Riordan. The security in case of
Riordan must improve in both of the sides from inside and outside. They must upgrade the
computers, the security devices and the software. There must be specialist for the
organisation including the experts of IT who will look upon the process of security and
beside to this they will also have the ability and enough knowledge to guard the organisation.
If the changes are made the organisation will face trouble in the future. The specialists of the
IT department must have experience in terms of understanding the cybercrimes and thus
manage the crimes. It must be noted that each of the threats cannot be understood but along
with the change that is made regarding the change the problem must be solved. The main
goal of the organisation is to breech all the goals and also to understand the way to deal with
the problems.
Document Page
5INFORMATION SYSTEM AND TECHNOLOGY
C. Conclusion
Riordan is a huge organisation which uses patents for their products, beside of being such
a huge organisation they are lacking due to their issues in security. In the paper it is
mentioned to understand the process which will increase the security for the data of the
organisation by making limited access of the data. In the paper it is recommended to upgrade
the system. It gives a detailed idea regarding the separation of the IT department in securing
the data of the company and the computers of the company from getting into wrong hands.
By this change the organisation will be able to secure them in the future.
Document Page
6INFORMATION SYSTEM AND TECHNOLOGY
D. Reference
Aghion, P., Howitt, P., & Prantl, S. (2015). Patent rights, product market reforms, and
innovation. Journal of Economic Growth, 20(3), 223-262.
Angst, C. M., Block, E. S., D'arcy, J., & Kelley, K. (2017). When do IT security investments
matter? Accounting for the influence of institutional factors in the context of healthcare
data breaches. Mis Quarterly, 41(3).
Brown, C. S. (2015). Investigating and prosecuting cyber crime: Forensic dependencies and
barriers to justice. International Journal of Cyber Criminology, 9(1), 55.
Harkin, D., Whelan, C., & Chang, L. (2018). The challenges facing specialist police cyber-
crime units: an empirical analysis. Police Practice and Research, 19(6), 519-536.
Manogaran, G., Thota, C., & Kumar, M. V. (2016). MetaCloudDataStorage architecture for
big data security in cloud computing. Procedia Computer Science, 87, 128-133.
Meldau, S., Riordan, G., Van der Westhuizen, F., Elson, J. L., Smuts, I., Pepper, M. S., &
Soodyall, H. (2016). Could we offer mitochondrial donation or similar assisted
reproductive technology to South African patients with mitochondrial DNA
disease? South African Medical Journal, 106(3), 234-236.
O'Mahony, N., Murphy, T., Panduru, K., Riordan, D., & Walsh, J. (2016, June). Adaptive
process control and sensor fusion for process analytical technology. In 2016 27th Irish
Signals and Systems Conference (ISSC) (pp. 1-6). IEEE.
Rahim, R., & Ikhwan, A. (2016). Study of Three Pass Protocol on Data
Security. International Journal of Science and Research (IJSR), 5(11), 102-104.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7INFORMATION SYSTEM AND TECHNOLOGY
Riordan, R. J., Hine, M. J., & Smith, T. C. (2017). An integrated learning approach to
teaching an undergraduate information systems course. Journal of Information Systems
Education, 28(1), 59.
Wagner, S., & Wakeman, S. (2016). What do patent-based measures tell us about product
commercialization? Evidence from the pharmaceutical industry. Research Policy, 45(5),
1091-1102.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]