In: Computer Science
What differences and similarities would be present in account
life cycle management for a company with 50 employees versus a
company with 5,000 employees?
SUBJECT: Security Architecture & Design
In approximately 300 words, Follow APA guidelines.
Security Architecture and Design is mainly used for companies for designing their hardware architecture i.e number of computers that are required for the company after this processing company needs to finalize the next thing that is which operating system needs to be installed i.e server and client operating system and after this the companies need to verify that how secure their system design is.
Coming to the first point let it be any company with 50 or 5000 employees first they need to finalize the hardware that they are going to use that is separate hardware for client machine and server machines after this operating system type whether Linux or windows.And next design will be the applications that they want to run into their computers.
While designing a company account lifecycle management with 50 or 5000 employees the major task is deploying basic needs let me explain here by taking the example using windows operating system both client and server the main reason for using it is we can create a domain and under which all the accounts can be managed and company with 50 employees it will be less expensive in terms of company with 5000 employees here the operating system cost is increased as the number of employees increases.And coming to the part of hardware a company with 50 employees is having an advantage over a company with 5000 employees because here in the hardware we need to purchase separate hardware devices like northbridge and southbridge pipelining and Ram and ROM.
By using the domain we provide a secure design that is there are very few chances of data lost as each machine is connected to server and data will be saved in the cloud and employees can work from anywhere and using the virtualization will reduce the cost of maintenance in terms of hardware is concerned.while coming to the point of security we can disable usage of CD/DVD drives and pen drives from data stealing and as all system are in the domain we have close look at activities done by employers.