Must Be In APA Format, Minimum Of One Reference Per Discussi
Must Be In APA Format Minimum Of One Reference Per Discussion Respons
Must be in APA format, Minimum of one Reference per discussion response. Must be in APA format, Minimum of one Reference per discussion response. Must be in APA format, Minimum of one Reference per discussion response, must be reliable and verifiable close 250 words per response. Due by 7 pm 28 April 2019. Explaining System Performance Requirements Refer to the readings Requirements and Developing Requirements for an IT System provided in Week 5, where the types of requirements are defined and examples are given. System performance requirements address quality (how the system must perform) and security. The areas listed are: Usability Scalability Availability Reliability Maintainability Performance Portability Interoperability Security Protection of data as it is transmitted and when it is stored User authentication Authorization of user to perform specific functions Data backup and recovery.
Paper For Above instruction
Understanding System Performance and Security Requirements in the Context of the MTC Hiring System
Introduction
System performance and security are critical components in developing effective information technology (IT) systems, especially in contexts involving sensitive data and critical functionalities such as the MTC Hiring System. As defined in the Week 5 readings, system performance requirements refer to the characteristics that determine how well a system operates to meet user needs, encompassing attributes such as usability, scalability, availability, reliability, maintainability, performance, portability, interoperability, and security (Requirements and Developing Requirements, Week 5). These parameters collectively ensure that the system performs efficiently, reliably, and securely, thereby facilitating smooth operations, user satisfaction, and data integrity.
Focus Area: Security
Among the various system performance and security areas, I have chosen to focus on "Security," a fundamental aspect that addresses protecting data both during transmission and while stored, user authentication, authorization, and data recovery processes. In the context of the MTC Hiring System, security encompasses measures to safeguard sensitive candidate and organizational data, prevent unauthorized access, and ensure data integrity and confidentiality. According to Stallings (2017), security requirements in IT systems include measures such as data encryption, authentication protocols, access controls, and secure backup procedures. These elements are vital to prevent data breaches, unauthorized modifications, and cyberattacks, which could jeopardize the integrity of the hiring process and violate privacy laws.
Importance to the MTC Hiring System
The significance of security in the MTC Hiring System cannot be overstated. As this system likely handles personally identifiable information (PII), employment records, and confidential organizational data, it is crucial to implement robust security measures. Unauthorized access could lead to data theft, legal liabilities, reputation damage, and loss of trust among applicants and stakeholders. Furthermore, data backup and recovery functionalities ensure continuity in case of system failures, cyberattacks, or data corruption incidents. Effective user authentication and authorization mechanisms will restrict access to sensitive information only to verified personnel, aligning with standards articulated by ISO/IEC 27001 (ISO, 2013). Therefore, addressing security as a core system performance requirement is essential to uphold data integrity, privacy, and operational reliability in the MTC Hiring System.
Conclusion
In summary, security requirements significantly influence the performance of the MTC Hiring System by protecting sensitive data and controlling access to system functionalities. They contribute to system resilience, user confidence, and legal compliance, which are vital for the successful deployment and operation of the hiring system. Adequate security measures ensure that the system not only functions effectively but also safeguards organizational and applicant interests against evolving cyber threats, thereby underpinning overall system integrity and trustworthiness.
References
Stallings, W. (2017). Cryptography and network security: Principles and practice (7th ed.). Pearson.
ISO. (2013). ISO/IEC 27001:2013: Information technology — Security techniques — Information security management systems — Requirements. International Organization for Standardization.
Requirements and Developing Requirements. (Week 5 lecture notes).
Kizza, J. M. (2017). Guide to computer network security. Springer.
Pfleeger, C. P., & Pfleeger, S. L. (2015). Security in computing (5th ed.). Prentice Hall.
Gritzalis, D. (2019). Data protection and privacy in information systems. International Journal of Information Management, 45, 152-160.
Chapple, M., & Seidl, D. (2019). CISSP (ISC)2 certified information systems security professional official study guide. Sybex.
Whitman, M. E., & Mattord, H. (2017). Principles of information security. Cengage Learning.
Kim, D., & Feamster, N. (2013). Improving network security with software-defined networking. IEEE Communications Magazine, 51(2), 114-119.