Riordan Manufacturing wants to integrate its existing HR information system tools to a single integrating application. This request of service is interested in defining business requirements for completion of the HR system for obtaining the objective. Security controls that we recommend for the design for the HR systems, process design, and application architecture are the requirements for this project.
Application Architecture
Three fundamental application architectures are client-server based architecture, client based architecture, and server based architecture. Riordan Manufacturing HRIS is going to implement will be 3 tier client server architecture. This will encompass the 3 groups of computers; database server, application server, and clients. The client is responsible for the presentation login and the server is responsible for the data access logic and data storage (Dennis, Haley Wixom, Roth, 2012).
The system that we proposed, HR staff has the access and can enter information while using the web portal. The reports can easily be sorted, filtered, and generated for the layout desired. An employee’s manager can request change submissions where requests can be entered into the system for a later time.
The Term Paper on Peer To Peer Network Server Security Client
... a client / server network, large files and applications can be shared, such as database management systems or accounting software systems. The server stores all shared applications and ... network, they can simply be solved by switching over to client / based architecture for more scalability, better security, and centralized management. But as ...
All departments and training records can be imported from saved files from Excel and will now be able to be entered with the web portal. For open positions, applicant information can be accessed by recruiters. On each applicants profile their resumes will be attached and accessible through the web portal. Managers will have access to employee timesheets and files that will be integrated through the proposed system. Individual compensation decisions, salary surveys, and results of job analysis will be entered by the compensation manager. All of the complaints, grievances, and harassment complaints and so on can be entered using the web portal.
Information System Architecture
The nonfunctional requirements such as miscellaneous cosmetic features and manufacturer begins with the architecture design. The operational requirement can specify the operating environment in which the system will operate. Reliability, availability, capacity, and system speed are all focused on the performance requirements. To protect the information system from a total loss, security requirements are put in place. To protect the information system the following can be implemented; system value, virus control, authentication, encryption, and access controls. Cultural and political requirements are specific to countries in which the system used for multilingual, customization, unstated norms, and legal purposes (Dennis, Haley Wixom, Roth, 2012).
Conclusion
Choosing a 3 tier client server architecture will allow more security and flexibility to the system. Confidential information will be only available to personnel that require the information is available because of the proposed HRIS. Utilizing Secure Socket Layer protocol to secure the data between the server and client will be available with the web portal interface. Changing their password every two months will reduce vulnerabilities from brute force attacks and phishing. The information system is an integral portion of Riordan Manufacturing’s operations. Choosing the security controls, process design, and application architecture will improve the efficiency of the integrated HRIS Riordan Manufacturing will increase profits overall.
The Essay on Systems Gathering Requirements Document
During the systems planning phase a feasibility analysis was performed in determining if purchasing a software program would meet the demands of operations (need), technical (practicality), and economic (financial) factors of the project. Given the fact that over time, collateral analysts spend a tremendous amount of time manually calculating borrowing base ineligibles from cumbersome agings, ...
References
Track-It solutions. (2007).
Retrieved from http://www.hris-software.net Dennis, A., Haley Wixom, B., & Roth, R. (2012).
System Analysis and Design (5th ed.).
Retrieved from https://ecampus.phoenix.edu. Security Innovation. (2015).
Retrieved from https://www.securityinnovation.com/company/about-us/ Criterion HCM. (n.d.).
Retrieved from http://criterionhcm.com/