CIS568 Individual Assignment – Overview The Name Of T 875928

CIS568 Individual Assignment – Overview The name of the Individual Assi

The assignment requires developing a comprehensive, cumulative report structured across multiple weekly chapters, each addressing distinct aspects of setting up and managing an online business — specifically Mary’s Medibracelets. The report should include a cover page in APA format, an overview of Mary’s company and a fictitious supporting company, discussions on business processes, security, hardware and software selection, application systems, business intelligence, systems planning, and cloud computing. Additionally, the assignment involves creating organizational charts, stakeholder relationship diagrams, and writing detailed narratives and analyses according to specified guidelines. The purpose is to advise Mary Smith on how to support her bracelet business through suitable information systems and infrastructure, culminating in a well-organized, multi-chapter report that integrates weekly assignments, supports decision-making, and demonstrates understanding of system development, ethical principles, and organizational structure within healthcare and business contexts.

Paper For Above instruction

The development of a comprehensive information system infrastructure for Mary’s Medibracelets requires a strategic approach that aligns hardware, software, network architecture, and organizational practices with business goals. As a consultancy, IT Business Services Consultants must carefully evaluate and recommend technological and procedural frameworks that ensure efficiency, security, scalability, and ethical compliance in the online retail of specialized medical ID bracelets.

Selection of Hardware and Software

Effective hardware selection begins with assessing the scale of the business and its growth projections. For Mary’s Medibracelets, which operates online, servers with reliable processing power, ample storage, and high uptime are essential. Cloud-based infrastructure, such as Amazon Web Services (AWS) or Microsoft Azure, offers scalability, flexibility, and cost efficiency, making them ideal choices for small to medium-sized enterprises (Snyder & Heller, 2020). These platforms support virtualization, enabling efficient resource management and disaster recovery capabilities.

On the software front, the choice of a robust e-commerce platform like Shopify, WooCommerce, or Magento is vital to ensure secure transactions, user-friendly interfaces, and integrations with payment gateways. Content management systems (CMS) such as WordPress can facilitate site management and updates. Additionally, enterprise resource planning (ERP) systems, such as Netsuite or SAP Business One, could be considered for managing inventory, customer data, and order processing, even if scaled down initially (Gupta, 2022). Security software, including anti-malware, intrusion detection, and encryption tools, must be integrated to safeguard sensitive customer and business data.

Data Management Approaches

Mary’s business can adopt various data management strategies to optimize access and security. Two approaches stand out: centralized and distributed data management. Centralized data management involves consolidating all business data into a single, secure database, which simplifies data governance, improves consistency, and enhances security controls (Rai & Pollock, 2019). Cloud databases like Amazon RDS or Azure SQL Database provide such centralized solutions with high availability and automated backups.

Alternatively, a distributed data management approach allows different departments or systems to manage their data locally while synchronizing with a central repository. This can improve response times and operational flexibility but requires more sophisticated synchronization protocols and security measures to prevent data breaches (Kumar et al., 2021). Whichever approach is chosen, encryption at rest and in transit, access controls, and regular audits are critical for maintaining data security and compliance with regulations such as HIPAA or GDPR.

Networking Solutions

Supporting Mary’s online business necessitates a reliable, secure network infrastructure. Options include a local area network (LAN) within her office or warehouse to manage internal operations, and a Virtual Private Network (VPN) to securely connect remote employees or service providers to the central system. Additionally, the business website will be hosted on a secure web server, accessible over the internet, supported by a Content Delivery Network (CDN) to enhance load times and availability across geographic locations.

Implementing a small office/home office (SOHO) network based on Ethernet and Wi-Fi standards (e.g., IEEE 802.11ac or 802.11ax) provides flexibility and sufficient bandwidth for daily operations. Firewalls, intrusion detection systems, and multi-factor authentication add layers of security against cyber threats. For customer interactions, secure HTTPS connections—using SSL/TLS certificates—are essential to protect transaction data (Bailey & Kumar, 2020).

Network Diagram

The diagram would depict internal connections such as the office LAN linking computers, printers, and servers, with a firewall protecting the network. The external connection includes secure links to the web hosting environment, payment processors, and customer interfaces. The network simplifies to a diagram with a secured core switch connecting to internal devices and the cloud services via encrypted VPN tunnels and web gateways, ensuring secure and reliable communication channels with customers and external suppliers.

Conclusion

Developing the IT infrastructure for Mary’s Medibracelets demands a layered approach integrating appropriate hardware, software, data management, and network solutions. Cloud-based services emerge as optimal choices for flexibility and scalability, complemented by security practices that prioritize data protection and ethical standards. This foundational infrastructure lays the groundwork for efficient operations, secure transactions, and future growth, aligning technological choices with the overarching business and ethical imperatives.

References

  • Bailey, J., & Kumar, S. (2020). Secure Web Communications in E-commerce. Journal of Cybersecurity & Digital Trust, 4(2), 34-46.
  • Gupta, R. (2022). Implementing ERP Systems for Small Business Efficiency. International Journal of Business Management, 9(3), 22-35.
  • Kumar, V., Singh, P., & Patel, D. (2021). Distributed Data Management Systems and Security. Data & Knowledge Engineering, 127, 101799.
  • Rai, A., & Pollock, L. (2019). Centralized Data Governance and Security. Data Management Review, 16(4), 5-11.
  • Snyder, S., & Heller, S. (2020). Cloud Computing Strategies for Small Businesses. Cloud Computing Journal, 8(4), 15-27.