Tuesday, May 14, 2019
Information Security Essay Example | Topics and Well Written Essays - 3000 words
Information Security - Essay ExampleHowever the use of estimator feignings has certain disadvantages or limitations as well since it cannot be used for optimization (Introduction to Computer Simulation, n.d.). It is a nib that is gener all in ally cost effective for any composition and assists in exploration of rude(a) brasss before edifice them in real (Heidari, n.d., p.5). The mystify memorise has been undertaken on a case study and its evaluation considering an organization and its internal process improvement that is trying to involve the computer simulation measures thereby trying to judge the risks and the security factors associated with the new scheme improvement. Objectives of the Study Considering the case study and the organizations incorporation of new system of internal process improvement through computer simulation, the following objectives have been decided for the study To identify the resource used in the design process which is currently held on the inte rnal meshwork and that may be affected by the change from an internal-only ne 2rk to a mix of internal and immaterial networks. To discuss the risks of the integrity of the chosen resource, if this resource was to be provisioned from outside the corporate network. To identify a technology, or process, that would help to protect the integrity of your resource as it moves from the internal to the external network and back again. interior(a) Process amelioration and the Design Process As the case study reflects, the Internal Process Improvement team of the organization concerned has plans to make certain changes in their processes of development that includes the incorporation of computer simulation programs. This has primarily arisen from a penalty that the high society suffered from in the recent times owing to missing a delivery that was necessary before flights. In order to improve the current status of working, the team has considered utilize computer simulation of larger pa rts of engine that is used in their project completion. In the present times, the company makes use of CAD or Computer Aided Design that produce the drawings of the engine containing all the wiring and electrical features (Rouse, 2011). However the usefulness of the computer simulations have been determined and realized thereby the system being attracted for incorporation in the organization. With the computer simulation trying to be considered, there are two possible ways to use the system- either by purchasing the compute resources, or by contract them from outside the corporate organization. Thus bringing the compute resources from the external sources might affect the current system of working that is based on the internal sources and might also increase the risks of security that are the major(ip) concerns of this study. It can be understood that with the advancements of technology and their uses in the organizations, the internal operations of the organizations are affected curiously considering the case where the organization plans to incorporate computer simulation techniques that has an up-front cost for the company and it is not possible for the company to avoid these expenses. Although there are positive effects of such external resources and technologies being used in the organizations, however, there are certain factors that might affect the internal operations negatively as well. In this case, the risks of secu
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment