Order for this Paper or similar Assignment Help Service

Fill the order form in 3 easy steps - Less than 5 mins.

Posted: September 27th, 2022

Explaining System Performance Requirements

Explaining System Performance Requirements

Refer to the readings Requirements and Developing Requirements for an IT System provided in Week 5, where the types of requirements are defined and examples are given. System performance requirements address quality (how the system must perform) and security. The areas listed are:

· Usability

· Scalability

· Availability

· Reliability

· Maintainability

· Performance

· Portability

· Interoperability

· Security

· Protection of data as it is transmitted and when it is stored

· User authentication

· Authorization of user to perform specific functions

· Data backup and recovery

Group 2: For this week’s discussion, Group 2 will post an initial response with:

1. Choose one of the system performance or security areas listed above

2. Put the area you selected into the Subject/Title of your posting

3. Explain what this area means in terms of system performance. Use the definitions provided in the Week 5 Requirements reading. If you need additional clarification, you can search for other sources, but be aware that these terms are defined and used differently for other purposes; be sure you find explanations that support the definition provided in the Requirements reading.

4. Explain why it will be important to the MTC Hiring System.

Remember – the Group 2 initial posting is due by Friday midnight; it should be about two short paragraphs in length, supported by external research, and should be posted by clicking on “Start a New Thread”. These postings need to thoroughly respond to the questions and incorporate relevant research correctly. Please look at what has been posted by your classmates before choosing your examples, and then select something that has not yet been discussed, if possible. Let’s try to spread the discussion across as many examples as possible.

Then members of Groups 1, 3, and 4 should reply to at least three different postings by other classmates before Tuesday midnight. Responses to initial postings should be specific and assess whether the posting accurately and sufficiently addresses the questions asked in the discussion topic, and should incorporate relevant research correctly. Explain your assessment as to why the information is or is not correct and/or complete, providing correct information to enhance the discussion.

DYLAN

Respond to the post and include citation

Reliability is the ability of the system to create and maintain the data correctly (UMGC, n.d). The reliability of a system is how consistent and how well the system performs in various tasks. While performance is obviously its own category it slightly falls under reliability as well. When the system operates reliably the organization can worry less about how the system is operating and as long as the system is considered reliable then the performance of the systems can be considered accurate as well.

For the MTC hiring system reliability will be extremely important. When winning new contracts the company will need their system to work reliably in order to hire new employees, create designated teams as well as keep prospects in the system. Since one of MTC’s goals each year is to grow in size and contracts a reliable system will be necessary to keep hiring in working order and be effective. As already stated in MTC case the HR department is small and can not handle a heavy load of applicants and even the hiring process put in front of them, the systems reliability will also determine the companies effectiveness and performance for hiring and the companies ability to pick up newer contracts. A new system that has high reliability will inevitably help MTC reach several of their goals they look forward to reaching.

Sources:

Requirements. Learn.umgc. (n.d.). Retrieved from https://learn.umgc.edu/d2l/le/content/622997/viewContent/25150620/View

Respond to the post and include citation

Aaron

User Authentication

For the discussion, the area selected is security, and the topic chosen under the area is user authentication.

User authentication is the identity verification of users accessing a computing resource or network. User authentication limits unauthorized access in system performance, thereby providing system security (Lyastani et al., 2020). User authentication is also a strategy for character management using computer software to monitor users. It gives the users advanced individual identifications for admittance to their unified frameworks leading to framework advantages. It is important to note that user authentication is the system’s capacity to determine an individual’s profiles (Lyastani et al., 2020). It allows the users to use their unique passwords or set up passwords and share only with the individual users. The basis of the requirement is that inadequately selected and shared passwords provide leeway for security breaches. Systems currently use advanced authentications such as tokens, smart cards, facial recognition, and biometrics. If authentication is executed properly, it allows business frameworks to run smoothly without system compromises. However, it is critical to indicate that it may delay the speed of technology utilization. In worse scenarios, the systems may fail, leading to helplessness, loss of time, and clients trying to restore. The configurations could lead to further system weaknesses lowering efficiencies. Organizations can control the disadvantages by closely monitoring the upgrading trends and factoring in the security challenges before they happen.

Overall, user authentication is critical for system performance and security in various ways. First, it provides the required security to the system by allowing access to only authorized individuals. Thus, it boosts the accountability and responsibility of the users. With the increasing cases of cybercrimes, technology systems need to restrict their access only to trusted individuals to limit access by malicious people (Lyastani et al., 2020). Importantly, user authentication boosts the monitoring of human resources. It records the time of login and logs out, which is critical for cyber trail and boosting productivity. Lastly, user authentication is used for cyber auditing of the system as it shows how people accessed the system.

MTC hiring system, like other hiring processes, encompasses the steps taken to identify and recruit the most suitable candidates for job requirements. The human resource managers review the applications, interview, and test the candidates according to the set standards. Thus, the system handles large volumes of data. MTC hiring system can use legitimized user authentication to perform various tasks on the data. The first role of user authentication to the firm regarding its hiring system would be to secure classified information. The hiring system collects candidates’ personal information that could be sensitive. The company can use user authentication to secure such information from malicious individuals and leave access only to authorized individuals (Lyastani et al., 2020). Limiting access is critical as it avoids data compromise by malicious individuals who can change the data. On the same note, the hiring process can use technology to verify the identity of the candidates. The verification of the recruits’ identity through user authentication ensures no chances of impersonation and faking. In the case of recruitment, the recruits are assigned access to the company computer resources using user authentication. The recruits are identified through user authentication before they can access the company computing resources to boost accountability and responsibility. It also helps to seal loopholes for security breaches. In this way, the hiring system can use user authentication to avoid reputational hazards, security breaks, and renouncement.

Reference

Lyastani, S. G., Schilling, M., Neumayr, M., Backes, M., & Bugiel, S. (2020, May). Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication. In IEEE Symposium on Security and Privacy (pp. 268-285).

Jenny

Usability is defined as the ability for new users to quickly adapt to the software, including how easy the system is to use and how help is provided for the users (“Requirements”, n.d.). For any online system, it is an extremely important aspect for users to be able to learn and integrate any IT system into regular use. If software usability is poor, this could refrain users from using the system for their own personal use or benefit. From a company’s standpoint, poor usability could deter users away from actually utilizing it to improve their company, which will automatically result in little to no improvement with a new IT solution.

In the case of MTC, usability is an imperative aspect for the company’s new IT solution, especially considering it is an IT consulting company. Because the company is rapidly expanding, which is why a more efficient hiring system is being considered, current employees at MTC do not have the time for extensive user training, or reading through 100-page manuals. As employees have mentioned, it needs to be simple to learn and use. Poor usability would slow the hiring process down entirely, which is the opposite outcome desired of implementing a new hiring system in the first place. To ensure MTC employees are receiving the benefits they expect from the new hiring system, this new system should include something like a System Usability Scale on the new software. This tool consists of a 10 item questionnaire with five response options for respondents, and it is a reliable tool for measuring system usability (Helpant Secretary for Public Affairs, 2013). Having this scale will ensure that the new hiring system is a user-friendly IT solution that MTC could continue using, thus accomplishing the goal of having a more efficient hiring process.

References

Helpant Secretary for Public Affairs. (2013, September 6). System usability scale (SUS). Usability.gov. https://www.usability.gov/how-to-and-tools/methods/system-usability-scale.html

Requirements (n.d.) Retrieved from https://learn.umgc.edu/d2l/le/content/622997/viewContent/25150620/View

System Performance Requirements Explained

Refer to the Week 5 texts Requirements and Developing Requirements for an IT System, which outline the different types of requirements and provide examples. Quality (how the system must function) and security are addressed by system performance requirements. The following areas are mentioned:

Adaptability

Scalability

Accessibility

Reliability

Continuability

Productivity

The ability to transport

Interoperability

Safety is paramount.

· Protection of data as it is transmitted and when it is stored

· User authentication

· Authorization of user to perform specific functions

· Data backup and recovery

Group 2: For this week’s discussion, Group 2 will post an initial response with:

1. Choose one of the system performance or security areas listed above

2. Put the area you selected into the Subject/Title of your posting

3. Explain what this area means

Order | Check Discount

Tags: best dissertation writing services, best research paper writing services, college paper writing service, dissertation writing services cost, dissertation writing services near me, dissertation writing services reviews

Assignment Help For You!

Special Offer! Get 20-30% Off on Every Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the finest writers are selected to be a part of our team, with each possessing specialized knowledge in specific subjects and a background in academic writing..

Affordable Prices

We balance affordability with exceptional writing standards by offering student-friendly prices that are competitive and reasonable compared to other writing services.

100% Plagiarism-Free

We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you opt to place an order with Nursing StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We assess your order and pair it with a custom writer who possesses the specific qualifications for that subject. They then start the research/write from scratch.

Order in Progress and Delivery

You and the assigned writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also peruse testimonials from other clients. From several options, you can select your preferred writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00