logo image

Business Continuity and Security Risks Essay

Executive Summary

The mission to establish a workable solution that addresses the many risks with new product software for sufficient operation is critical to success. Therefore, a review of the many possible risks assessments is warranted to preclude a suitable directive to empower the organization.

The focus of the analysis is within the business continuity and security issues that need to be addressed by system service provider – to evaluate the supplier’s capability in countering such technological issues. The formulation of strategies applied to the structured of an applied system will provide the needed key aspects to render the desired results. Thus, the proposed recommendation is outlined to indicate the very best technological or procedural solution for mitigating for each identified risk.

Introduction

In the pursuit to establishing a productive online system for the submission of personal tax returns for a large European country is within the identified business continuity successes in maintaining any security risks. The expectation is for the system to collect and process returns for 50% of the population within the first three years of operation and that this will represent taxes worth ~€93bn (£65bn, $132bn). Thus, the enclosed review analysis presents the system as being built and maintained by a private sector company with established expertise. The core assessment providing the understanding of having expertise is within competing processes just as any running of large-scale systems and the management of data centers.

The identified users of the system will be Government employees (who will have access to all data relevant to their job) and citizens (who will only have access to their personal data) using passwords generated by the Government but modifiable by the citizen. Therefore, the operational system will be run from a primary data centre located in a suburb on the outskirts of the capital city. The designed strategy presents the secondary back-up data centre is located in a nearby town approximately 25km from the capital.

Under review of the business continuity and security issues addressed by the supplier of the system, is to presenting the independently assessment to the supplier’s level of preparedness. Thus, the access to the system will be via a secure Government network (for Government employees) and via the Internet (for citizens) correlates to the maximum uses of high activity. The citizens can download tax return software from the Government’s web-site to complete their returns off-line for proper processes.

This is very important to providing a needed vantage point of identifying the specific role is to identify the ten key risks to which the system will be exposed. The difference from risk management is the potential to rending security breaches that leads to negative exposure in the targeted market that harms the organization (Kotter, 1996).

The role of business continuity management is to ensure the ongoing operation processing to offer the best technological or procedural solution for mitigating each risk. The review of some identifying risks are technology malfunctions, lack of staffing, training issues, costs management, IT repairs, data quality, regulations, adaptation to new systems, downtown,  and insufficient matching with other databases. Thus, the review of the required justification for prioritizing the individual risks for outlining risk identifiers provides a more proficient outcome. The prioritization offers the risks for sufficiently applying the needed technological solutions for effectively managing the risks.

Part 1: Identification of Risks

Risk # 1

The issue of managing technology malfunctions creates sufficient unwanted risks that propels to a cost management problem. Thus, the need to identity such a risk that correlates to inability to compute daily imputations can stop the operation processes (Best, 2006). The technology malfunction can as well affect other departments that are just for support to the mainframe operation of processes; therefore, any shutdown of technology ability can create massive losses.

Risk # 2

The lack of staffing creates means to not meeting the operations practice for the desired outcome that relates to the development of control of processes. The manageability of staff is constant challenges due to already staff employee’s possible sick days, PTO, and trainable issues that create obstacles. The level of staffing can additionally impact the outsourcing both domestically and internationally to demonstrate a high quality output (Kotter, 1996).

Risk # 3

The area of training issues limits the ability to manage the new system in a highly productive business model objectives, therefore, the required education of the new processes are essential. If not, the core identified benefits are limited to reaching a substantial to solidify the operations core business strategies that strengthen the overall mainframe.

Risk # 4

The costs management is the constant method to identify any overages or short comings that can cease any current or future technology advancement. With the client’s proposed online system database, the failure to implement a proper planning and controlling of cost management can limit goals of the information systems – to empower management.

Risk # 5

The IT repairs create a more complexities systematic outcome that can interfere with the daily operations of the new system. The original IT initiative can render directive to follow, however, when the IT repairs occurs the constant redirect resources reduces productivity. Thus, the massive IT assessment restricts sufficiency that is refrains for progression.

Risk # 6

The data quality is imperative when the desired objective is to presenting accurate data impressions for internal use and consumer use. If not managed correctly, the organization will not establish a proper business processes to implement the desired planning strategic management in order to meet the stakeholder’s expectations.

Risk # 7

The rule of proper regulations is important to making sure the government tailored database system is utilizes appropriately. If not, the issue of hefty fines and restriction can be imposed that causes a decrease of productivity and potential revenue.

Risk # 8

The limitation of adaptation is for sufficiently rendering an appropriate means to the new systems for rendering a longtime downtime. The organization cannot reach goals to position new opportunities that deem necessary for securing a strong hold in the desired market segmentation.

Risk # 9

Of all the prior risk, the most significant one is the issue of downtime. It causes massive restrictions of accomplishing the desired productivity levels. In addition, the cease of work flow activities to rendering the required output harpers the ability to improve the organization.

Risk # 10

The insufficient matching with other databases relates to mirror the objective of accurate cross references of data. If not done properly, the organization will not be able to relay to internal sources or external sources/customers the correct information. Thus causing massive delays that relates to not managing cost containment.

Part 2: Procedural solutions for each risk

Procedures # 1

The means to render a more coesheive method to steering the formation of technology components are performing at par. In doing so, the ability to render a desired outcome is measured if the technology malfunction is not a constant daily hindrance.

Procedures # 2

The implementation of new control processes automatically required accurately staffing levels to facilitate the objectives accordingly. The lack of staffing will prevent the ability to effectively manages the domestically and international operation processing of the new online system.

Procedures # 3

The focus on the available training sessions that incorporates the new protocols provides a means to ensure proper handling is conducted of the system database.  The training incentive is to assure that new and sustaining staff can operate current functions of the online system as well as future updates.

Procedures # 4

The measure to conduct weekly cost assessment that matches the current weekly outlined identifies of possible shortcomings in each department, R&D, IT, and Processing’s to implement proper cost-savings protocols. The issue of sufficient phases of planning and controlling provides the needed safety net to assist the organization’s initiatives.

Procedures # 5

The means to render a more direct method to steering the formation of technology components are performing at par. In doing so, the ability to render a desired outcome is measured if the technology malfunction is not a constant daily hindrance.

Procedures # 6

The IT management goal is to instill a roadmap to bypass such possible repairs that limits the progression of the organization. The strategic measures are centered on the operation management efforts of the new database configurations – to mirror a workaround adaptation too effectively implement a new strategy before repairs are needed (Samson, 2008).

Procedures # 7

The reoccurring measure to implement a review of all government regulations of privacy, sharing information of consumers, and the proper framework to verify all protocols are updated. Therefore, a separate department of regulations and compliance is warranted to ensure that any new updates are implemented within the current database interface.

Procedures # 8

The role of the project team is imperative to the proficient of the enterprise resources planning concept to provide the organizations obtainment of the end goal. Such a method provides the stand in work project teams that are not tied up to the main servers, in which, these special project teams come in and assist in any downtime to adjust adaptation protocols (PMBOK, 2004).

Procedures # 9

The understanding of fundamentals in time management is critical to supporting the company’s operational organization goals when a new database system is implemented. The method to address the issue of downtime is to redirect the workflow so not all internal employees are performing the same thing. In addition, the processes are to issue a redirection of servers that not all employees are using the same ones for a more easy flow of technology being used.

Procedures # 10

In achieving the company’s planning objectives relates to quality management protocols that review, update, and implement new practices to ensure sufficient matching up of all databases. The role of the project leader is critical to assure the database matching codes are in compliance and accurately related to other departments for a more sufficient operation. In doing so, the organization can reach the desired action and performance.

 Conclusion

The organizational behavior from a change management perspective presents an in-depth conceptual, daily technical adaptation, cost-effective economical and strategic decision making capabilities (Best, 2006). Therefore, the fundamental risks of all identifies with the new delivery of an online system is cost management. This will cover training to quality management to insure the proper protocols are implemented to render a well-functional organization structure. The platform of the business internal operational process is detrimental to moving through phrases of forming and adjourning company’s objectives (Wild, Wild, and Han, 2006).

The government employee users indicates the core area of focus to ensure that proper procedural work-around and solutions are implemented to facilitate the style approach in a functional organizational environment (Mantel, Meredith, Shafer, and Sutton, 2008). The organizational behavior concepts, additionally, plays a pivotal role to achieving the desired results in the pursuit to render an appropriate business assessment. Thus, the operational goals are able to sufficiently implement the strategic code of technical adaptation to facilitate business initiatives (Cooper and Grey, 2005).

References

 Best, Kathryn (2006). Design Management: Managing Design Strategy, Process and      Implementation (Ava Academia).  AVA Publishing; First Edition

Cooper, Dale and Raymond, G., (2005) Managing Risk in Large Projects and Complex Procurements

Kotter, John (1996) Leading Change. Harvard Business School Press           

Need essay sample on "Business Continuity and Security Risks"? We will write a custom essay sample specifically for you for only $ 13.90/page

Mantel, Samuel J. Jr. & Meredith, Jack R. & Shafer, Scott M. & Sutton, Margaret M. (2008)     Project Management in Practice, John Wiley & Sons, Inc. Publishing

PMBOK Guide (2004) A Guide to the Project Management Body of Knowledge. Third Edition.         PMI Global Standard

Samson, Danny (2008). Operations Management. Retrieved November 8, 2008 from             http://www.cambridge.org/us/catalogue/catalogue.asp?isbn=9780521700771&ss=toc

Wild, John J., Wild, Kenneth L., Han, Jerry C.Y., (2006). International Business, The Challenges          of Globalization

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy