1nbspclass in my opinion determining the right time to


1. Class in my opinion determining the right time to upgrade or replace a legacy system is one of the most difficult decisions an organization has to make in the IT environment. However, in today's IT environment, how can companies overcome challenges like legacy systems? When should they let go? Any thoughts class?

2. In an IT environment, I think there may be some unique challenges especially with technological advances and trying to ensure systems are compatible within one's organization. In my organization we try to address as many issues as possible early in the game before any changes are made in the area that we call the "Production Environment." When someone within in the organization introducing a plan to install/update/upgrade a IT system they must submit a package that take all areas into consideration, i.e., cost estimate analysis.  For the most part we coin this process as "total cost of ownership." To get approval to move forward with the project they would have to get past what we call the "Operational Readiness Review Board."  Getting past this group is no easy task because this is pretty much where the vendor/Program Manager has to address every issue the project will impact, this includes everything from, personal resources, help desk support, to training of system operators. This approach at least makes an attempt to avoid all the pitfalls we have been discussing this week as it relates to IT systems implementation, upgrades, and or, updates. Class any thoughts?

3. Class as I was reviewing this chapter I was thinking just how hard it is to make anything impenetrable today within the Cyber environment.  In fact the closest thing to this from a network perspective would be a standalone system with no network connectivity and then we would really have to focus what the purpose of the system is and the insider threat risk.  Unfortunately, with technology changing at a rapid pace, it is in my experience, many organizations have a false sense of security on these systems because they believe the industry is focused on such, just because they are running something as simple as an anti-virus program and have their host firewall turned on.  Class what you think? 

4. there are so many new technologies that are being introduced every year in the cyber environment, which has led to a lot of new security tools that are available to the IT professional to prevent or minimize security breaches.  So playing devil's advocate how does one trust someone who had bad intent in the first place.  If the hacker is so good that one wants to hire him/her, how do you protect against that.  It seems as if the organization has just increased their chances of an insider threat occurring. Class thoughts?

This is simple discussion. 50 to 100 word answers are all that is needed. Please mind your grammar.

Solution Preview :

Prepared by a verified Expert
Chemistry: 1nbspclass in my opinion determining the right time to
Reference No:- TGS01291702

Now Priced at $30 (50% Discount)

Recommended (90%)

Rated (4.3/5)