Saturday, May 16, 2020

Adopting Virtualization to Handle Configuration Problems...

One big recommendation to handle the configuration problem of Aircarft Solutions’s firewall and hardware architecture would be to adopt virtualization. â€Å"Virtualization is the single most effective way to reduce IT expenses while boosting efficiency and agility.† Virtualization is the method of forming a virtual computer system instead of obtaining physical IT hardware. Because of the rapid changes and developments in the IT world, it is suggested that AS should gradually adopt the virtualization of its systems. The advantages of virtualization are diverse. By adopting virtualization, AS will be able to separate its physical layer from the virtual machines. This will make sure that the damage and threats by malicious attacks are minimal.†¦show more content†¦Impact on Business Processes Impact will be clearly seen one AS implements the virtualization and IT related hardware costs will be reduced and AS will be able to focus on the business needs. When we reduce the hardware cost it means that it directly will affect the price of maintenance like cooling, actual physical storage and powering the devices. There can be advance upfront cost due to Aircraft solution might incur for the implementation. The cost for that would be roughly about $80,000 for new hardware. This though would be a short term cost but would have many long term advantages as it will help the company withstand the pressures of a market that is hyper competitive. Recommended Solution – Policy It is crucial to reexamine the security policy of Aircraft Solutions in order to safeguard the protection of IT systems. In today’s world where technology is changing every day and malicious attempts are being developed and improvised rapidly, it is unreasonable to have a long gap between policy revisions. Therefore it is recommended that IT administrators and managers update the policies twice a year. The policy will need to certify the following issues:- †¢ Hardware – documentation of all IP addresses †¢ Vulnerability – DOS, hacking, open ports, scope of access, data loss and network scans †¢ Traffic – Confirm that all incoming and outgoing traffic isShow MoreRelatedManaging Information Technology (7th Edition)239873 Words   |  960 PagesSystems 189 Application Areas 187 189 Critical Concepts 191 Batch Processing versus Online Processing 191 Functional Information Systems Vertical Integration of Systems Distributed Systems 192 Client/Server Systems Virtualization 192 192 193 194 Service-Oriented Architecture and Web Services 194 Transaction Processing Systems Payroll System 196 196 Order Entry System 196 Enterprise Resource Planning Systems 198 An Example ERP System:

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.