The services provided by the EITS are - · Provides personal Tools and Informatio
ID: 3856194 • Letter: T
Question
The services provided by the EITS are -
· Provides personal Tools and Information-
The University provides particular ID and username which is the sign-on name of that students, faculty, and staff which is used to access a wide range of online services at University of GA.
· Provides Central Authentication Service (CAS) -
By this service all the users can access multiple applications at a single time using their respective credentials. This reduces time and increases efficiency of other services.
· UGA Portal -
The UGA portal is a single web location (or address) which provides access to the web-based services and information most important to you It works as our personal advisor and enhances searching. As a gateway to web access, your portal is your self-managed, personalized, and customized information environment. This proved a great help for the users.
· Office of Information Security -
If we provide something we provide it under certain rules, regulation and conditions. The Office of Information Security manages security policies and awareness, administers security tools and technology, and responds to computer security incidents at The University of Georgia.
· Access Services -
Access Services is a unit within the Operations and Infrastructure Systems Group, whose function is to facilitate Campus Wide Access (CWA) to the University administrative systems developed for the VP for Finance and Administration and the VP for Student Affairs.This approach provides maximum area access of network and other resources provided by University of GA.
· Athena -
The university required a system that can handle,manage students information for the goodwill of students as well as the organization.Athena is the student information system that includes class registration, financial aid, student records and more.
· Computer Protection -
The security and safety of the devices is also necessary.All computers connected to the UGA network are required to have anti-virus software in addition to other safeguards such as anti-spyware capabilities, software firewall, and update-to-date security patches.By this it becomes almost impossible for a theft, data breach, threat to occur.
· Usage Policies -
The Office of Information Security maintains several policies related to the use of computers and information at the University of Georgia.These are basically the guidelines and rules by which one can know how to operate which system.
· Secure UGA -
This program is performed for increasing the awareness of information theft and other attacks.Secure UGA is the University of Georgia's information security awareness and training program. This program supports the University's role-based security training and accountability model in which every individual, regardless of position, has a responsibility to protect our sensitive and critical data.
Identity Federation -
This service provides the interoperability with the websites which are not a part of University of GA.Identity Federation is a single sign-on service that makes it easier for UGA students, faculty and staff to access online resources that require authentication with approved partners outside of the University. By using Identity Federation with approved partners, UGA users can use their ID's and password to authenticate to non-UGA websites.
What are Key Performance Indicators here.Please write in your own language and good grammer.
Please provide references
Explanation / Answer
The key performance indicators for the above given Computer Information Systems are as follows:
1. The Central Authorization is playing an important role in saving time and authentication as well. The user is able to operate the multiple window applications and at the same time.
2. The UGA portal is also playing a role in managing the user’s requests. It is generally helping the user of the application to manage the portal in the way where people will have the enhanced use of the software.
3. The performance of the software matters the most if any time the user is having a compromise with the performance of the system than it will be a dangerous situation for the organization to deal with the enhancement of the application usage.
4. Security of the data of user is also important and maintaining it to an extent level is important and making the full use of such security is very important .since, the security is the only feature that matters the most.
5. The policies of the usage of the system are also important in enhancing the security of the project. The policies must be maintained by the administrator for better usage of the software and to realize how can the software be used to make the software usage good and to a extent.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.