Wobbly Wheels Distribution Company and the Accurate Financials System

Do you need this or any other assignment done for you from scratch?
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Wobbly Wheels Distribution Company and the Accurate Financials System

Project Description: The project system that will be integrated in Wobbly Wheels Distribution Company (WW) is the Internal Security system aligned with the Accurate Financials system. The proposed system guarantees the protection of the electronic data in form of orders, finances, and accounting because of prohibiting the unauthorized access to data, preventing cyber crimes, and supporting the development of the networking. All the employees working with the financial data and using the network are expected to utilize the system.

Strategic Alignment: The proposed project aligns to the business strategic objective related to providing the accurate financial audits and reports because of guaranteeing the protection of the financial data. Furthermore, the proposed project aligns to such an internal IT strategy as the management and monitoring of finances in WW.

IT Portfolio Alignment: Being aligned with the Accurate Financials system, the proposed project should be implemented prior to the other projects because of the necessity to provide the financial base for the integration of further projects. Thus, the integration of the Internal Security system is expected during the first quarter of the projects development.

IT Architecture: The system should be integrated and used with the Accurate Financials system as well as with the virtual private network (VPN) developed for WW in order to protect the firms data.

Benefits: The main benefits of implementing the new Internal Security system are (1) the allowance of the protected financial data exchange; (2) prevention of cyber crimes; (3) the support for the VPN. As a result, the Accounting Department can share the financial information easily and avoid purchasing additional systems for cyber security.

Requirements: The business/user requirements for the project include the developed networking system; the inclusion of IT strategies for the Accurate Financials system; the inclusion of the complete IT resources; the developed and the developed IT skills in employees. IT/system requirements include the focus on the interoperability concept and the implementation of the appropriate configuration of elements as well as the availability of the appropriate software. The system performance requirement includes the capacity to control changes in security standards (Mukherji & Jyotsna, 2011, p. 24).

Cost Estimation: The proposed project is medium regarding the size because of involving several departments. However, the project is rather straightforward because it does not require the integration of complex systems. Although the security systems are often complex in their character, their process of their integration can be easily divided into several simple stages.

Assessment of Project Size and Complexity
Size/Complexity Small Medium Large
Very Complex
Moderately Complex
Straightforward
X

Performance Measures: It is important to measure the number of unauthorized accesses to the system, the effectiveness of the system, and the speed of the data exchange in order to evaluate the Internal Security system (Davenport, 2013, p. 112).

Benefit to Business Measure
1. The protected financial data exchange Number of system falls during a month
2. Prevention of cyber crimes Number of successful unauthorized accesses
3. Support for the VPN Speed of the data sharing in a month

System Development: The Plan stage includes determining the areas to be protected with the system. The Design stage includes the development of the systems components. The Build stage includes the implementation of the system. The Test stage includes the initiation of a range of cyber attacks to text the system. The Launch stage includes the final implementation of the project (Lane, 2011, p.124).

References

Davenport, T. H. (2013). Process innovation: reengineering work through information technology. New York, NY: Harvard Business Press.

Lane, D. (2011). The Chief Information Officers Body of knowledge: People, process, and technology. Hoboken, NJ: John Wiley & Sons.

Mukherji, A., & Jyotsna, I. (2011). Internal capabilities, external relationships, and firm-level strategies: Their impact on reputation. Competition Forum, 9(2), 22-34.

Do you need this or any other assignment done for you from scratch?
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!