Florida Department of Management Services Security Case Study

Exclusively available on Available only on IvyPanda® Made by Human No AI

Florida Department of Management Services (DMS) deals with various operations needed for the government of the state. It is in charge of human resource management, administration, retirement, and health benefits, etc. It is a powerful organization that works for more than a million consumers. DMS cooperates with numerous state agencies, educational facilities, state and local employees and retirees.

Except for that, the government received assistance from this organization. At the end of the 20th century, DMS created a large information systems network. It provided an opportunity to connect government agencies from different locations to one data center (Stallings, 2011). Taking into consideration the fact that DMS works with a large number of organizations and operates with an enormous amount of information that should not be disclosed, it requires a decent security mechanism. It is needed to protect the company from both the users who access the system with the help of the Internet and personnel.

The organization requires virtual private networks (VPN) and IP security to protect itself. The first one refers to encryption and special protocols to ensure security for the users of the public networks. Mobile employees will have an access path to enter corporate systems from different sites. The state employees will need to use their work credentials. They will refer to the VPN to enter the DMS network.

IP security will allow ensuring security across LAN, WAN, and the Internet. It allows utilizing various approaches, which is rather beneficial. Secure branch office connectivity can be used for online users. It may be more advantageous to use extranet and intranet connectivity because it presupposes protection from state employees and public network users. The organization can able to refer to SSL certificates, HTTP, and HTTPS.

The transition process that was recently utilized by the DMS is rather advantageous as it provides an opportunity to use the application for about 6000 users with no complications. From the very beginning, the system was based on the Systems Network Architecture (SNA), and its network control processors (NCPs) were connected to a communications controller with the help of T-1 and T-3 lines. It could be found on a token ring LAN that is in the data center.

Still, such type of backbone was considered to be not efficient enough and the decision to start using a router network was made. Routers were implemented at each site, connected and linked to a central-site router, the Cisco 7000 that was placed at the data center. Both the installation and startup of a new network were maintained decently with no critical issues faced. Such transition required the initial existence of the network infrastructure. DACS are connected, which provides an opportunity to make a mesh for IP traffic. As a result, each DACS can be linked to the Cisco 7000. The alteration allowed us to make a mesh for IP traffic and link each site to the Cisco 7000 easily.

To improve the maintenance of the operations conducted by DMS, I would recommend two alternatives. First of all, I believe that the organization could benefit if it designs the network infrastructure maintenance strategy. It should be used as soon as the network infrastructure is integrated. It requires the accomplishment of such activities as upgrading operating systems and applications, assessing performance, and troubleshooting main problems.

Except for that, it should be mentioned that the organization could use asynchronous transfer mode (ATM) instead of IP infrastructure. Being based on the utilization of filtering mechanisms, it provides an opportunity to “prevent unauthorized management access”, and with the help of “manual configuration of network connection policies via PVCs and PVPs provides reasonable isolation of flows between hosts or private networks” (Tarman & Witzke, 2002, p. 61).

Among the main services that can be found on the DMS, the website is HRM. It designs policies and strategies for the State Personnel System are used to store the information about 100,000 state employees, who are on the mainframe. HRM is its administrator. It ensures that the person provides services and performs functions that respond to the needs of the organization. It deals with technical assistance, the establishment of HR programs and their improvement, analysis of statistical data, etc. HRM is targeted at the creation of an efficient HR system for the public sector by the identification and implementation of the best practices in the sphere.

Agency administration should also be discussed. It provides an opportunity to communicate the most appropriate information about the agencies. As a result, the representatives of the general public can interact with the state government, and cooperating companies can get to know what services are required by the population (Florida Department of Management Services, 2016). The organization can also pay attention to 401(k). This plan focuses on retirement savings, which are relevant for DMS. Organizations that are using the services provided by DMS are likely to consider such addition to be advantageous, as the plan should improve their relations with the personnel and provide a decent guideline for sponsoring.

References

Florida Department of Management Services. (2016). . Web.

Stallings, W. (2011). Wireless communications & networks. New York, NY: Pearson Education. Web.

Tarman, T., & Witzke, E. (2002). Implementing security for ATM networks. Boston, MA: Artech House. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, July 11). Florida Department of Management Services Security. https://ivypanda.com/essays/florida-department-of-management-services-security/

Work Cited

"Florida Department of Management Services Security." IvyPanda, 11 July 2020, ivypanda.com/essays/florida-department-of-management-services-security/.

References

IvyPanda. (2020) 'Florida Department of Management Services Security'. 11 July.

References

IvyPanda. 2020. "Florida Department of Management Services Security." July 11, 2020. https://ivypanda.com/essays/florida-department-of-management-services-security/.

1. IvyPanda. "Florida Department of Management Services Security." July 11, 2020. https://ivypanda.com/essays/florida-department-of-management-services-security/.


Bibliography


IvyPanda. "Florida Department of Management Services Security." July 11, 2020. https://ivypanda.com/essays/florida-department-of-management-services-security/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1