Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Are IT services being delivered in line with business priorities? Are IT costs o

ID: 3665620 • Letter: A

Question

Are IT services being delivered in line with business priorities?

  Are IT costs optimized?

  Is the workforce able to use the IT systems productively and safely?

  Are adequate confidentiality, integrity and availability in place?

 

You first do a search on human factors passwords  and discover some good and trustable sources from, e.g., the FAA [4] and Human Factors International [5]. You then investigate the security breach incident and discover the call center personnel use 57 different systems and the IT manager had initiated a new policy that each month each user would be given a new 9-random-character password generated by the system unique to each of the systems. That it was only  9 characters (instead of 16 or 20) was a concession made by the former IT manager to allow easy  memorization. By policy, the reps were required to summon a manager to get any password, if they could not remember it, that is, they could not write any passwords down.  They were paid for quicker and accurate performance; but, summoning the manager often added over 5 minutes to the call. Your last discussion on the matter is with the call center s business process owner who tells you the top business priority is the customer s call experience  as the call center handles sales and service calls for top-end online merchants and they want to have every customer have noticeably better  buying experiences.

 

Within 1 to 3 pages, develop a set of recommendations for passwords that will lead the call center to have positive answers to the questions:

  Are IT services being delivered in line with business priorities?

  Are IT costs optimized?

  Is the workforce able to use the IT systems productively and safely?

  Are adequate confidentiality, integrity and availability in place?

Explanation / Answer

Set of Recommendations for Passwords`

1. At least 9 characters longx

2 .Does not contain your real name, company name,user name

3. Does not contain complete word.

4. Is significantly different from previous word.

5. Contains character from each of the following our categories.

6. Use uppercase letters with combination of small letters and numbers, special characters.

7. Create an acronym from an easy-to- remember price of information.

8. Substitute numbers, letters , symbols ,misspelling for letters.

9. Relate your password to a favourite hobby or sport.

10.Create strong password using ASCII characters.

11.Prohibition of words found in a dictionary.

12.Dont use your personal information.

13.Dont give calendar dates.

14.Dont give license plate numbers.

15.Never use same password more than one account.

16.Never write down password.

17.Never communicate your password by phone,or email.

18.Dont user proper nouns.

19.Dont use foreign words.

20.Length, width,depth in case careful.

21.Choose a modern manager.

22.Create a Passpharse instead of a Password.

23.Dont use Song lyrics.

24.Dont use Quotes.

25.Dont use Author names.

26.Dont use Players names.

27.Dont use movie names.

28.Dont use movie Hero’s ,Heroines.

29.Dont street names.

30.Dont use Surnames of your name.

31.Dont use the same password twice.

32.Dont give email as password.

33.Dont save password in web browser.

34.Dont use Remember me as password.

35.Does not Rely on Obvious Substitution

36.Use uncommon patterns.

Are IT Costs Optimized

Strategic IT Optimization initiatives requires upfront investment and are conducted with the context of the business and IT Strategy.

While long term perspective cost cutting is important. Short term reductions are achievable through the identification of quick wins that are less disruptive to the business.

Are IT services being delivered in line with business priorities?

The development of innovative and flexible services delivery policy that support the implementation of government policy and its implementation.

The design and development service delivery systems that are convenient and accessible and meet the diverse needs of community.

The provision of payments and services that match the customers circumstances.

Is the workforce able to use the IT systems productively and safely?

The above points is provid productivity and safe environment.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote