This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Automation

Systems Operation and Maintenance Practice

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Systems Operation and Maintenance Practice

Introduction

The systems that are adopted by an organization should be appropriate for that organization, and they should serve their purpose to enable the organization to achieve its objectives. The information system of an organization is an essential part of that’s institution or company as it is the heart of the organization. The information system contains all the data and information of the organization and its clients (Willcocks, 2013). The information system processes collect and stores the data and information of the company.  A sound information system enables the institution to accomplish its goals and vision through the integration of different departments and the automation of activities. It is essential to periodically evaluate and maintain the information system so that it can effectively serve its purpose in the organization.

Don't use plagiarised sources.Get your custom essay just from $11/page

Evaluation and Maintenance of the Information System

Evaluation of the information system is the process of checking the software, the hardware such as computers and servers, the network, and the human resource responsible for the information system to ensure that they all function. Evaluation of the system is essential as it ensures that every part of the system performs as expected, and in case of any fault, it is pointed out and repaired (Willcocks, 2013). Evaluation is used to identify any risks and threats that might cause a breakdown of the system, which might result in collapsing of the business. It is essential to audit the information system often so that threats can be mitigated before causing adverse harm to the system.

The evaluation of the information system is not an easy job as it involves various activities, and it should have the support of the stakeholders. In the instance of the Gail information system due to the type of work it handles and the sensitive information it stores, then it is important to regularly evaluate it (Grant et al., 2010). In this case, both a summative and formative evaluation should be carried out to compare and contrast the past performance of the system and how it will be performing in the future. The small vile city information system evaluation aims at making changes to the system and upgrades it to ensure that it offers quality services to the clients and the organization.

The Gail industry information system evaluation starts with the intangible benefits it offers to the institution. First, the system monitors the networks through the firewall management, which is usually done daily. The system backs up the data and information of the organization, which can be retrieved and used in case of a breach or lose or the primary data or information (Grant et al., 2010). The system also monitors the network, which helps minimize uptime and system performance, which enables the system to work fast without delays and effectively. The information system enables the real-time capturing of data and imaging, which enhances accountability in the institution.

From the evaluation of the Gail industries information system, it has been discovered that the system is at risk of being infected by malware and accessed by unauthorized individuals. The threat comes as a result of the long period of using the same passwords, which can be mastered and used for harmful activities by hackers and other staff. Changing passwords every 60 days for the staff and monthly for the system level is a dangerous trend as using the same password for long can create a loophole for hackers to use it to access the system. It is also essential for the institution to periodically upgrade their software and hardware to increase efficiency as the older ones are at high risk of being hacked.

From the evaluation, the information system has enhanced the delivery of quality services to the clients of Gail industry because of automation. The system has also enhanced accountability in the activities in the institution as it keeps a log of any action a staff performs using the system. The IS has enabled easy management of operations in the institution due to secure access to information automated systems. The IS, through the change in the management it has allowed the institution to save money as it provides all departments a standard software and a centralized type of leadership, which reduces the cost that the client incurs.

On the maintenance part, after the evaluation of the system, it is vital to ensure that the security of the system is maintained and the passwords are changed often to reduce the risk of unauthorized access. The institution needs to increase its network security, upgrade the operating systems of its gear, and update their firewalls periodically. The upgrade will prevent the system and the tools from being hacked or affected by malware (Gantz & Philpott, 2013). I will also ensure that the system and equipment work efficiently and fast, offering quality services to the clients.

Gail industries work together with Amazon, which provides the industry with cloud-based servers that act as storage units for the data and information of the company. The amazon web service (AWS) provides Gail industries with a platform for accessing the internet and processing their data online. The role of the AWS is defined and managed by both parties that are Gail industries and the amazon. The internal service providers that are the IT staff maintained and managed the server supporting the CCS, which is located in the industry offices. Their roles are determined and regulated by the management team of the Gail industry through limited access to the premises or the data center. The security protocols for accessing the cloud or the data center also act as management techniques.

Recommendations for Improvements

The information system of the Gail industry operates on outdated operating systems, which reduce the efficiency of the operations or services offered by the industry to its clients. The obsolete systems also reduce the quality of the services provided to the clients, which is a negative thing as it reduces customer satisfaction. To prevent customer frustrations and the risk of breakdown of the system, then it is essential to ensure that the industry upgrades its software and hardware. Due to the imminent dangers and threats that are found on the internet ranging from hackers to malware, it is recommended that the industry upgrades its security and firewalls regularly. It is also recommended that the password change be done often to prevent unauthorized access to the system.

It is also recommended that the industry invests in having a secure network and a stepped-up bandwidth to prevent cyber-attacks. Hackers use unprotected networks to gain access to a system where the inject spyware software or other malware, which might cause a breakdown of the system or data theft, which affects the organization. The stepped bandwidth also enables the industry to avert the Distributes Denial of Services Attack (Gantz & Philpott, 2013). A vast bandwidth allows the system to filter and absorb as much traffic data as possible, making it impossible for the attack to cripple the services of the industry.

Conclusion

Evaluation of the staff and systems of an organization is critical as it allows the management to pinpoint the areas where the system is affected or vulnerable and establishes strategies that deal with the problem. It is crucial to have periodic evaluation of the system as it contributes to the improvements of the system. It is essential to ensure that the roles of service providers are well defined and that they are managed to prevent misconduct or abuse of privileges. For the industry to be thriving, it should heavily invest in cybersecurity to prevent the corruption of its system, which results in loss of money and customers.

 

References

Gantz, S. D., & Philpott, D. R. (2013). FISMA and the risk management framework [recurso electrónico]: The new practice of federal cyber security. Estados Unidos: Syngress.

Grant, K., Hackney, R., & Edgar, D. (2010). Strategic information systems management. Andover: Cengage Learning.

Tavana, M. (2013). Competition, strategy, and modern enterprise information systems. Hershey, Pa: Business Science Reference.

Willcocks, L. (2013). Information Management: The Evaluation of Information Systems Investments. New York, NY: Springer.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask