MKTwain - CMGTCB-554 - Competency 3 Reflection

docx

School

University of Phoenix *

*We aren’t endorsed by this school

Course

554

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by PrivateOtterPerson4789

Report
Mark Twain CMGTCB/554 – Competency 3 – Reflection The exponential growth in technology and how we use it in our daily lives has resulted in using multiple devices for both our personal use and business use. Many have said that the modern-day smart phone allows each of us to walk around with a highly capable and powerful computer in our pocket. This may be true, however, because of the powerful computer in our pockets, we are also more likely to use it for means of work while we’re on the go. With this on-the-go computer, a new era and type of risk has resulted, and organizations must be prepared to mitigate these additional risks. Many organizations have embraced the Bring Your Own Device (BYOD) idea in their environment so that employees can work with devices that are easier for them to navigate because of their familiarity with it. It also takes the financial burden off the employer to purchase so many devices for their employees, and from an IT perspective, it shifts the management of these various devices to the employee and not the IT department. However, one must consider the broader scope of this idea. By allowing employees to utilize their own devices for mobile computing, an organization no longer has control over the security of the devices being used by employees to access and work on the organization’s network or with the data of the organization. This opens the door to allowing unsecure connections to the environment of the organization and increasing the risk of network intrusion. When considering mobile computing for an organizational environment, whether it is utilizing BYOD or deploying mobile devices to employees, consideration must be made on how this will impact the network. Can the network support all of these mobile devices in addition to the static devices in the environment? Is the existing Wi-Fi hardware up to par to handle the wireless load of these additional devices? Will network speeds be affected by introducing these new devices into the environment? When considering E-commerce, how will this be handled in times of the day when the E-commerce surge happens? Will the network be able to handle this traffic, or will it bottleneck at this surge? How about when utilizing social networking, will this also strain the availability of network resources or speeds, will this heighten the risk of network intrusion? Before implementing any of these ideas, an IT manager must assess the network to see where the strain may be when running these additional services. By adding cloud resources, such AWS, the environment may be ready to handle a surge in load, then if more resources are needed, they can be deployed easier if they’re cloud based rather than physical resources. Implementing a hybrid infrastructure where the nuts and bolts are physical hardware, and the data storage, network operations and processing are cloud-based, will aid in reducing the impact on the network. Metrics can be used prior to the implementation of a hybrid infrastructure so that one knows where the attention needs to be applied. Monitoring metrics can be used to watch for specific areas of the network that may need to be upgraded, migrated, or updated in security. Software metrics can be leveraged to determine if the software on the network is sufficient for what it is being used for. Utilizing the data gathered by these metrics can aid in making decisions on what network resources are needed or not, as well as where the network can be improved. If software is a concern, then the software metrics will show the data in order to make the decisions to obtain different or update the application software.
When IT managers want to present a “before and after” comparison to senior leadership, it is best to have the data show it. This can be best obtained by using monitoring metrics that show how the network environment was operating previously, and how it is currently operating once the updated network resources have been implemented. The monitoring data may show a sluggish overloaded network previously, and now an efficient hybrid network that is ready to meet the demands of an upgraded environment and renewed business model. When efficiency is the result of the cost, and the metrics data shows this, senior leadership may see it as an investment.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help