Swot evaluation good model

Category: Science,
Topics: Gain access,
Published: 26.03.2020 | Words: 3087 | Views: 619
Download now

Swot Evaluation

The following SWOT was performed on AEnergys current facilities, to determine if it will be able to deal with the load of the new structures. A SWOT analysis is a planning and brainstorming application that helps people evaluate an idea or task for a organization or produce a business prepare (Harmon, 2015). The meaning of SWOT is Strengths, Weak points, Opportunities, and Threats. The current system was analyzed making use of the SWOT, as well as the following examination and ideas were made as a result SWOT.

Need help writing essays?
Free Essays
For only $5.90/page

Advantages:

  • Protection
  • Functional
  • Redundant Weaknesses:
  • Internet connection provider
  • Space
  • Finances restraints
  • Opportunities:

  • Technology Upgrades
  • New Markets
  • Network Construction Threats:
  • Outside the house Threats
  • Computer software Configuration
  • Wireless Infrastructure
  • Inner Threats
  • A1. Talents

    The first strength is protection. They system uses several different forms of security to protect the knowledge that is dealt with. It uses SSL authentication, VPN tunneling, and WPA encryption, to protect the information and limit the gain access to of outsiders. It also has an intrusion discovering service to help prevent any unauthorized outside gain access to (Kumar Venugopalan, 2017). The physical protection of the computers is also addressed, because there are just four employees who have usage of the cabinets that home the web servers. Protecting the servers and the information within just them are the IT groups main goal.

    The 2nd strength is functionality. The system was installation so that employees could access anything distributed, such as papers, applications, and each other. This access exists despite the workers being in various locations or perhaps not at the job at all.

    The third durability is redundancy. The two sites have the same network configurations intended for support of every other throughout a crisis. They are all backed up daily, onsite and offsite to aid maintain little data loss. There is also UPS to assist during thunder or wind storms or any electrical power interruptions (Winston, 2017).

    Weak points

    The first weak spot is the Internet connection provider. The Internet get is only as strong as this one provider can provide. This will likely affect the capacity to expand, because the use of the world wide web will increase and the provider might not be able to take care of the load from adding the extra sites. Also, using a single provider may well not offer a way to continue support during any kind of downtime.

    The second weakness is space. The amount of space for the expansion in the infrastructure can be not adequate. The infrastructure as it is currently setup will only accommodate the latest amount of employees, adding any additional persons may make the machine run gradual. The addition of the modern offices to the present setup, will not be enough pertaining to the expansion of the company, which will delay the expansion alone.

    The 3rd weakness is budget restraints. The uncertainties underlying THIS investment decisions and the incapability of discounted cash flow (DCF) analyses to incorporate the impact of flexibility push executives to rely on gut instinct the moment finalizing THIS investment decisions (Bardhan, Bagchi, Sougstad, 2004). The addition of new locations will certainly add to the amount of use to the present systems, that can lessen their particular performance, and may lead to loss of data. With the need for additional gear to handle the expansion, any kind of budget restraints may wait the purchase of the equipment, which in turn could hold off the growth and result in loss of start up business.

    Opportunities

    The initial opportunity is a technology upgrade. AEnergy is determined to make a substantial investment in technology updates, to determine if this is the route to adopt for the expansion. Using the outcomes of this r and d into a technology upgrade, may assist in making the other decisions to get the enlargement easier.

    The second option is entering a new market. AEnergys method different, and so the amount of competitors they may have is nominal, which permits them to opportunity into fresh markets with ease. This helps the IT growth, because they know all their current setup is successful, every they have to perform is duplicate it inside the new offices. With the appropriate investments in new equipment and technology, getting into the new market segments should go away without any problems.

    The final opportunity is network setup. The current network configurations are mirror images of each various other, are copied daily and possess had little data loss. The addition of new sites, enable the chance to look at distinct network constructions to see if mirroring the current installation will be enough, or if the expansion will require another setup for it to hit your objectives.

    Threats

    The 1st threat is from exterior sources. Web breaches continue at an worrying pace with new vulnerability warnings a nearly daily occurrence (Trautman Ormerod, 2018). One of the most serious risks to any technology infrastructure comes from cyber disorders and cyber-terrorist. These problems could are derived from accessing the network systematically or simply by accessing the buildings literally. This development would make the infrastructure more vulnerable, since adding to the network, would give more places for the attackers to use.

    The 2nd threat can be software configuration. Software setup becomes a essential threat, since depending on how it is designed, the opponent could use weak spots inside the software to attack the infrastructure.

    The third menace is wifi configuration. The wireless setup is another essential threat, because the attacker might use the Wi-Fi connection or Bluetooth features to access the infrastructure. Wireless devices and networks will be vulnerable to further security risks because of their occurrence in the cellular environment (Barnes OFarrell, 2002). These wireless access details could be accustomed to access important data and may cause a great insurmountable volume of damage and revenue reduction.

    The very last threat is usually from inner sources. This might be one of the most essential threats to arrange for in order to to broaden an organization. As technology continually evolve and become increasingly widespread in the modern office, the insider presents a considerable threat to employers. Actually employers increasingly face disgruntled employees who have are all too eager to download their companies sensitive, confidential, and proprietary information prior to terminating the employment marriage (Reid, 2018). This expansion will result in a need for new employees, who have at any time can become a protection threat unknowingly or knowingly to the companys infrastructure. This also will lead to a loss of income for the corporation and improve the amount needed for technology, against such issues.

    Strengths in the infrastructure used to improve existing service or product

    One strength of facilities that can be used to boost existing products, would be the protection. This feasible because of the diverse layers of security present to access the information within the firm. This will enhance the existing service or product, because the clients or clients would be at ease that their information will probably be protected via outside burglars. Security is definitely taken extremely seriously by the It group, they make this a top top priority to assure the information contained inside their, stays within their systems, and is only seen by types who will be authorized to access it.

    Another strength of the system that could increase the existing product or service is the redundancy of program. This is a way to improve the existing product or service, because with the daily backups staying performed, you will discover less likely to get an interruption in the assistance. The redundancy of the product is so that when there is any interruption, the data can be readily available to get the system backup and jogging with little or no data loss. This will likely lead to better production and happier clients, since they know that the support will be renewed within a smart amount of time.

    Options that can be pursued using the existing IT system

    One opportunity we may follow with the existing IT system is raising the companys product line by simply introducing a fresh product. The company has dedicated funds for research and development, thus introducing a brand new product prior to expansion is complete, will help to meet the needs and needs of current and future consumers.

    One other opportunity we may follow with the existing IT infrastructure is to boost the companys product sales. An increase in revenue, along with introducing a fresh product, may help increase the companys revenues. A rise in revenues, will assist alleviate a few of the stress the fact that expansion has established.

    Deficiencies

    The current THAT infrastructure features several disadvantages and potential threats. That may need to be tackled before the growth takes place. A significant weakness is definitely the internal threat of dissatisfied employees. Staff are the biggest threat to the present infrastructure, because their get could wide open the system up to an attack from the outside. Likewise, they can download happy information in the companys program and sell that to the top bidder, which in turn would be bad for the success of the organization.

    The threat of an outside strike is also or worry with the current IT system. An harm from the outside can come from virtually any source, and may cause damage to the business. An outside strike could use the wireless network, the wired network, or perhaps physical use of attack the system. This is why the IT group takes reliability so severe.

    One more issue is a company employing one INTERNET SERVICE PROVIDER, although the two separate complexes have their own account, adding two fresh buildings to the same ISP, may make the service offered unavailable to the four structures. The use of a single ISP may result in one of any of the office buildings being shutdown, due to the lack of ability of the ISP to handle force. Not having assistance could lead to a loss of income.

    Deficiency With Greatest Impact

    Though all of the weak points can be detrimental to the success of the organization, the insufficiency with the best impact is a external options. The amount of feasible damage that an external resource can carry out, will be bad for all parts with the company, if they gain access to the system whether internally or externally. The capacity for them to gain access, could cost the company a lot of money. Not just from the details they might get, but the amount that would need to be spent to enhance up the system security and any parts of the facilities that would have to be replaced form possible damage. External resources have one aim in mind when they access additional peoples systems and that’s to trigger damage, that’s why they might have the best impact.

    Study Strategies

    When considering researching technology, several concepts come to mind. We could search the net, we could check the latest technology magazines, or perhaps we could check out a store to check the items personally. Whichever we all decide to do, we would need to learn what we anticipate from the tools we would order, how much it will be, how long it could take to get there, and it we could install it ourselves or if we would have to hire installers. I personally love to go and find out the equipment personally. This gives me a chance to see how functions, and it will meet my needs or not. I almost did not remember about recommendations, I bought gear because my friend has suggested it, some turn out great, and some never. Thats the possibility you consider when looking to acquire new things anyway.

    Current Technology Examples

    A current technology that the company can use to aid combat exterior sources, through hiring White-colored Hat online hackers to test our bodies. The purpose of these types of tests is to identify faults in the system so that they can end up being sealed to avoid external episodes (Max, 2018). These testing will be performed on a quarterly basis, in this way we can mitigate any likely threats ahead of they happen.

    One more current technology that the business can use to assist combat exterior sources, is by managing the networks. Online hackers find weaknesses in the companys network, especially those that are poorly managed. Within our IT department, a unit must be assigned to monitor the computer network intended for the company, and check for any kind of possible breaches. Another thing that this group will probably be responsible for is training all the employees, so they are more mindful when controlling company data.

    Staying Informed

    Technology is an ever changing globe, so purchasing the best way to stay abreast of these changes, is just as crucial as picking the right technology. There are many ways for me to keep up thus far, they consist of web multimedia, print media, social media, training, and face-to-face encounters. Internet media comes with blogs, pod-casts, and message boards. Starting with a simple Google search, you may look for technical blogs, pod-casts, or community forums about the latest technologies readily available for use.

    Print press includes literature and journals. According to a Bing search, the Top 10 Tech Magazines are: Popular Science, COMPUTER CHIP, American Science tecnistions, Science Information, Computer Electrical power User, Discover Magazine, Popular Mechanics, PERSONAL COMPUTER World, ” cable “, and Technology Review. In order to find top technology books, making a stop in the local bookstore is a good place to start. Social media includes: Twitter, Facebook, and some other social media wall plug.

    Another way of staying informed is by attending training sessions. With regards to training sessions, they can be handled in numerous different ways. You will discover on-site training, where the seller sends an individual out to keep the training school. Another sort of training is web-based, in which the training category is provided over the Internet or maybe a corporate intranet. The last way I can retain informed regarding technology can be face-to-face. I can search for technological conferences or user teams that satisfy and discuss technology. Whichever choice I actually make, keeping up-to-date upon technology is very important to keep the IT department on top of new things.

    Emerging Technology Examples

    Since had been an energy firm, utilizing emerging technology to achieve a competitive edge is key to our upcoming as a company. One rising technology that could assists with this is referred to as Na-TECC. The purpose of this technology is to take sodium and solar high temperature and come to be electricity. The brand new process brings about improved effectiveness and less heat leaking out. The technology could be employed for distributed strength applications (Becker, 2018). Seeing that, we previously offer one of a kind methods of providing energy, this kind of emerging technology would set us even more ahead of the opponents.

    So that with appearing technology to hold a competitive edge, we might need to check out future Electrical power Plants. Produce the plant life more effective, we would use SCCO2 instead of vapor to electricity the turbines and create electricity. Products could be made from top-notch supplies, yet significantly smaller, which would reduce production costs (Becker, 2018). Another advantage to using this technology, is that the crops can be placed anywhere, including the wasteland, because it doesnt take as much to keep all of them cool. These kinds of emerging technology will help us to keep each of our competitive advantage by being well prepared for the future.

    Advice

    To ensure the company to settle competitive, the IT office must protect their information and keep that from falling into the wrong hands. My recommendation to help accomplish this is really as follows: initial, the software being used, has to be inspected to make sure there are no prone spots, following we must guarantee the network can be protected. This can be accomplished by utilizing a Network fire wall, Intrusion Diagnosis System, Intrusion Prevention Program, and Been able Security Services. The next phase is protecting each of our endpoint gadgets. These include servers, databases, personal pc computers, and mobile devices. These need to be guarded just like the network, by using Firewalls, Intrusion Recognition and Reduction, Content Filtering, and Anti-Malware. Protecting the companys data is vital to the success, therefore we have to ensure that we take just about every measure to shield it.

    The nesting step to protecting the companys information is adding strong secureness management techniques into employ. These include Weeknesses Management, Plot Management, and Penetration Testing, these can ensure that the IT section check for the possible attempts of attaining access to the machine from the outside. The next measure in the process may be the provide a secure way for approved users to access the data they need from anywhere. These include Encryption, use of Electronic Private Network, and Data Loss Prevention, which will provide the companys users with safe strategies to access the network. The last step with this process is always to manage reliability and produce its success as solid as possible. This can be made possible by using the following: Record Management, Protection Incident and Event Managing, and Training. If we since an IT department utilize this process, we are able to prevent the gain access to of all outdoors sources, apart from those who are approved.

    Justification

    To warrant this advice, I investigated the amount of revenue lost annually by diverse forms of cyber attacks. According to U. S. Reports, hackers expense companies between $375 and $575 billion annually. We dont get most cybercriminals and we dont catch one of the most successful types, said Wayne Lewis, a CSIS mature fellow(). This lost money eliminated the companies via creating two hundred, 000 jobs. If this kind of doesnt warrant us applying this solution, My spouse and i dont really know what will. All of us hold a competitive benefits over the competitors previously, but if these people were able to get their hands on how we make some of the products, after that there will go the advantage.