Preview

Hobbit Aviation Case Study

Better Essays
Open Document
Open Document
1884 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hobbit Aviation Case Study
In this part, I will define what are the goals of the management systems of information, because as a consultant for this new company, I have to help them to develop a secure information system for managers.

The management information system is also called IT management or performance management. The definition is a management discipline that combines all the knowledge and techniques but also tools in order to ensure data management and security. It is more generally, the organization and the protection of the information system.

In order to be efficient, the information system has to be organized, controlled and hosted. This represents an optimization of the company performance. It is in constant evolution, due to the emerging professions in this sector.
To meet the needs of the company, it is
…show more content…
All information should be checked and secured. I must therefore determine the type of information that will be exchanged with which actors and what connections, with what type of material, with what security system.
I will try to respond to the all the needs of the company in details but I can already say that this company needs new information system that is available to provide security for its data, but also provide speed exchange of information between the different entities of the company.

Needs of Hobbit Aviation

In this case, the business sector is very specific, because products have high added value. Security is essential for the sustainability of the company, especially when we know that the competitors such ash China want to enter the aviation market and that country has a very active espionage and "hack" activity.
Therefore, the company needs powerful tools but all simple tools that employees can use it quickly, efficiently, and securely.

I identified 4 main needs for the company Hobbit Aviation: security, training, materials and maintenance.

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    CMGT 445 Week 2 IA

    • 814 Words
    • 3 Pages

    Most successful businesses have at least one, if not more information systems in use. These information systems could be used for anything from tracking personnel to tracking supplies. These information systems present potential problems to the information technology staff. Information systems can be complex and difficult to manage or rather simple to use and maintain. One thing is for sure, all information systems pose their own unique set of issues for those managing them.…

    • 814 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    As we progress forward, a few specific requirements such as software and data, information and hardware must be obtained in order to identify the type of system needed. The collected information is vital when determining the type of classifications and what is needed to insure the items or information is being secured. When it comes to threat identification, are level of threats is categorize…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Evaluate the internal and external factors that influence the activities and organization of an information security program List and describe the typical job titles and functions performed…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Information technology is known as "the study, design, development, application, implementation, support or management of computer-based information systems. There are many systems that an organization uses on a daily basis from Management Information Systems (MIS), to Transaction Processing Systems (TPS), to Decision Support Systems (DSS). In today’s society those systems are the vital parts of an organization’s survival. IT systems are the backbone of an organization’s operations and without them organizations fall short of providing services. They drive all of the daily tasks, store files and data, provides solutions to problems, and give competitive advantages.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Aircraft Solution

    • 1151 Words
    • 5 Pages

    The following report is a security assessment on Aircraft Solutions
and the primary objective in this assessment is to identify the existence of vulnerabilities present 
within the global context of Aircraft Solutions’ operations. An evaluation of the associated 
threats will be deduced, accompanied by the exposed weaknesses. This will be followed by an
analysis of the degree of risk present. Finally, there will be a focus on the consideration of the
 consequences resulting from revealing of potential threats.

 Assessment 
Hardware and policy will be the main focus of this investigation. It will be narrowed down more 
to hardware issues.…

    • 1151 Words
    • 5 Pages
    Better Essays
  • Better Essays

    The purpose of this paper is to evaluate the computer security for Aircraft Solutions. When discussing computer security, the three main areas aspects of any computer-related system are confidentiality, integrity, and availability. Confidentiality determines the security or privacy of the system. Integrity refers to only the authorized users making changes to parts of the computer system. Availability means if someone has a requirement to get onto the computer they are not impeded in that facet. The main challenge in constructing any secure system is determining…

    • 870 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    This work contains INF 220 Week 5 Assignment Final Paper Information Systems as a Whole…

    • 496 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I have selected the Information Systems Manager. His role is to sit with the other members of the committee and help bring their needs in line with the overall business strategy. The objective of this project is to develop an integrated system to improve day-to-day operations of Spa Works as well as to offer better reporting in the accounting and human resources. As a result, the IS manager of Spa Works has been chosen to serve on the committee to ensure the strategic IS planning is aligned with the company’s overall strategy. IS manager will advise on the hardware and software (software upgrades) that must be purchased to ensure smooth functionality of the system applications. The IS manager will also approve an effective and efficient system design so that everyone across the organization is able to use it with no trouble. IS manager will enable proper security and recovery software and will develop strategies for training individuals if required. Spa Works’ IS manager will also ensure that a set of adequate IT policies are in place and the new system complies with those…

    • 1060 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Companies from all over the world have benefited from technological improvements within information systems and software applications. Most major companies use systems and software that help support their work flow, communication, accountability and almost every aspect of the work place. Although there a many departments that utilize many different types of information systems and software applications, we will only review a few. The systems and applications we will discuss and that are used by management, finance and the main work force are viewed below.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Best Essays

    White Paper

    • 1119 Words
    • 5 Pages

    Information security basically refers to the methods and processes which are mainly designed for the safety of electronic, print or any other confidential information. It is designed to prevent the private and confidential information from unauthorized access, disclosure, misuse, destruction, disruption or modification. The terms computer security, information assurance and information security are used interchangeably. All these fields are linked with each other and share the basic targets of protecting the confidential information. These days several vulnerabilities are faced by IT companies and security organizations in Washington DC. They are mainly linked with the erosion of long duration of competitiveness and rational property loss. There are enormous risks associated with these types of security industries and business men. For this purpose, our company has introduced effective solutions to guarantee the security of information system (Pagani, 2005).…

    • 1119 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    Currently their information system (IS) is not fully centralized and this is causing a lot of problem in their expansion and cross-company processes. A significant requirement for the information technology is required because their organization is expanding globally and is facing an increased service volume.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Mis in Restaurant

    • 4079 Words
    • 17 Pages

    The appropriate development and management of information technology tools is of great help to executives and management. This assists them in performing tasks related to the processing of information. MIS and business systems are especially useful in the collation of business data and the production of reports to be use as tools for decision making. IT system gives a comprehensive picture so that available data can be accessed, evaluated and utilized. It is designed to…

    • 4079 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Management and organizations facing constantly changing problems, diverse managerial styles, and ever present information needs offer a challenging context for developing computer based information systems. MIS uses computer technology to provide information and decision support to managers, helping them becomes more effective. Developments in the young computer industry are changing corporate management style. A management information system (MIS) is a system that provides information needed to manage organizations effectively. Management information systems are regarded to be a subset of the overall internal controls procedures in a business, which cover the application of people, documents, technologies, and procedures used by management accountants to solve business problems such as costing a product, service or a business-wide strategy. Management information systems are distinct from regular information systems in that they are used to analyze other information systems applied in operational activities in the organization. Academically, the term is commonly used to refer to the group of information management methods tied to the automation or support of human decision making, e.g. Decision Support Systems, Expert systems, and Executive information systems…

    • 612 Words
    • 3 Pages
    Good Essays