GU has multiple systems and applications that must communicate with each other. Changes in the operating system and platforms must be carefully considered. One system can offset multiple other systems. GU runs multiple dashboards and overlays in order to access information globally in real time. The system has no downtime per se as the servers are updating every six hours (12am, 6am, 12pm, 6pm Central Standard Time) and different backup systems are in place globally and online.
The project has been planned out and GU has signed off on the plan. GU has installed development and test environments. No significant issues have been reported. The rollout throughout the office has gone well with support level and administrative personnel. The rollout is now extending to pilot users in the nursing graduate program. A system failure is occurring due to unknown software which many of the instructors and nursing students have loaded on their computers (desktop and laptop). The failure has brought down the system and is negatively impacting the credibility of the system. What is your first course of action? What plans and measures will you put in place, and how will this impact your schedule? What could have been preventative measures to reduce these risks?
Write a 3-4 page paper describing sources of resource risk. Please give examples based on your experience and/or from your project management textbook to illustrate the sources of resource risk. Save your assignments for review and use on your BA599 Capstone project.
There is unknown software being downloaded by many of the instructors and nursing students. As a result there is a system failure that has been occurring again and again which is bringing down the system and is negatively impacting the credibility of the system?
Since users are accessing internet to downloading the software, the university is exposed to different types of security risks. It is prone to being hacked, virus attack, and other malicious programs. Information is being accessed real-time globally in real time due to which there is urgent need to protect information to ensure its confidentiality, integrity, and availability to those who need it for making business decisions. Without security an organization cannot be sure of whether its information is protected. The first step to security is installing a firewall to prevent any unauthorized access across the internet. In addition, it is also important to install an antivirus and antispyware. Thereafter action would be to disable or uninstall such software from all user machines. All users need to be educated on risks of downloading software from incredible sources. Data backup should be taken after end of every month so that in case of data loss business does not get affected.
Since GU is an information holding organization, the need for security awareness and training and education is critical in successful business operations. The objective of ...
The multiple systems and applications which must be communicated with resource risks.