Sr-Rm-022, Part 2

Submitted by: Submitted by

Views: 721

Words: 753

Pages: 4

Category: Science and Technology

Date Submitted: 10/28/2012 09:11 AM

Report This Essay

Riordan Manufacturing HRIS

David Harborth

BSA/375

October 22, 2012

Mark Fairbanks

University of Phoenix

Riordan Manufacturing HRIS

Now that we have analyzed the old HRIS and looked into what the new HRIS needs to be it is time to start discussing the design of the new HRIS. We need to look into the application architecture and the design process. The security controls that need to be included in the HRIS need to be listed. A system analysis needs to be completed to describe the data, processes, interfaces, and network in the system architecture.

Application Architecture

The application architecture is defined by the technical environment requirements and the business requirements. The business requirements are the main drivers of both the technical environment requirements and application architecture (Alan Dennis, 2012). To discover the business requirements the wants and needs, strong business analysis is required, understanding what the business actually does, the overall process and how that business functional area defines success (JESSICA, 2012). The technical environment requirements state what kind of software and hardware need to be in place for the HRIS to function, like needing Windows 7, a Google Chrome browser, and 2 GB of ram.

Application Architecture

Application Architecture

Technical Environment Requirements

Technical Environment Requirements

Business Requirements

Business Requirements

Security Controls

Security Controls need to be put in place to protect the information system from disruption and or data loss. This can happen on purpose by a hacker or by nature, flooding or fire. When developing the new HRIS for Riordan Manufacturing the developers must meet the security requirements to prevent any problems (Alan Dennis, 2012).

There are four catagories of Security Controls;

* Preventative controls exist to prevent the threat from coming in contact with the weakness.

* Detective controls...