CREDIT TO Educationleaves https://www.youtube.com/watch?v=S3rf9aa6Ca0
The
maintenance phase is the stage in the project or software development lifecycle
that follows the implementation phase. During this period, the focus shifts
from creating and deploying the product to ensuring its ongoing functionality,
stability, and adaptability. Maintenance involves activities aimed at
preserving and enhancing the product over time, addressing issues, and
accommodating changes in user requirements or the technology landscape.
In this phase, the spotlight may not be as bright, but the significance is undeniable. Think of maintenance as the custodian of your digital masterpiece, the curator of its functionality, and the vigilant guardian against the inevitable winds of change. It's where the magic continues, the wrinkles are smoothed, and the gears keep turning smoothly.
After receiving valuable feedback from 14 employees, the IT team at SHOENIVERSE understands that the Employee Information System (EIS) could benefit from improvements and maintenance. This acknowledgment reflects the commitment to addressing user concerns and actively seeking ways to refine the system. By recognizing this opportunity for enhancement, SHOENIVERSE aims to create a more efficient and user-friendly EIS, ultimately contributing to the overall satisfaction and productivity of its workforce.
The post implementation review/report can be access through this link : https://docs.google.com/document/d/1yxHq2Aawadm1vjxp1nAG-XwE2Ctzo3879bnh_kvDBsE/edit?usp=drivesdk
This is the maintenance phase of SHOENIVERSE's employee information System (EIS) that made by the IT team:
1 - Log in through Google
In order to improve our Employee Information System (EIS) to be more
accessible and efficient, we improve our system by doing maintenance in terms
of employees being able to access the system through Google. In addition, the
employees also can choose to log in via a web browser which is Google on a
desktop or through a dedicated app on their mobile device.
For instance, employees who can’t download the EIS system
application into their phone due to their phone storage being full, employees
can access the system through google by simply type “SHOEIS” and it will
automatically shown the EIS website for employee to access their account. By
login through Google, it can give benefits to the employees in terms of more
convenience for employees to access the system from any device like tablet,
laptop and computer or any devices with an internet connection. Other than
that, our company also can increase the visibility of our brand Shoeniverse by
offering both website and app-based access across multiple platforms and
devices.
2 - Strong password
To enhance worker privacy and security, we upgraded the Employee Information System (EIS) by requiring each worker to enter a password, which must include at least 12 characters such as upper and lower case letters, non-consecutive numbers, and special symbols. A strong password is crucial to securing digital systems and online accounts. Its primary function is to protect sensitive information and prevent unauthorized access.
A strong password is crucial to securing digital systems and online accounts. Its primary function is to protect sensitive information and prevent unauthorized access. These features prevent unauthorized access as they act as a barrier to unauthorized users, ensuring that only individuals with the correct credentials can access a system or account. For example, if employees use a password such as Talitha12, this password can be considered as a weak password because it is short with only 9 characters, predictable by using name and common numbers and one alphanumeric character type. If the system was hacked or accessed, a hacker attempts to gain access to Talitha's account using a simple "brute force" attack, trying different combinations of letters, numbers, and symbols. With enough time and computing power, the hacker is eventually able to guess "Talitha12" and gain access to Talitha's information.
Other than that, strong passwords help safeguard sensitive data such as names, addresses, and credit card numbers from being accessed, modified, or stolen by unauthorized parties. This is especially important for personal information, financial data, and other confidential data. As we know, the Employee Information System contains all workers' data such as personal information, financial data, and other confidential data. If the password does not require a strong and specialized one, employees might use an easy or weak password to set up their system and it gives a bad outcome to their data. Strong passwords can help employees secure their systems if a hacker tries to access their files. With a weak password, they could crack it in a matter of minutes, gaining access to the sensitive data and potentially jeopardizing employees' information such as bank accounts and addresses which leads to other damage.
3 - Automatic logout
Automatic logout is a crucial security measure that safeguards sensitive information and systems by automatically ending a user's session after a period (one minute) of inactivity. It acts also as a digital safeguard in multiple scenarios such as preventing unauthorized access means that automated logout lowers the possibility of unauthorized users accessing private data or carrying out harmful activities in the event that a user forgets to log out or leaves a session open.
Subsequently, automatic logout guarantees that a user's private or
sensitive information is not available to anyone who could come across the
device in the event that they walk away from it or forget to log out. This is
another method that helps secure sensitive data. Additionally, closing sessions
after a while of inactivity can aid in preventing assaults known as
"session hijacking," in which a hacker assumes control of a user's
session. Lastly, the process of freeing up system resources involves ending
idle sessions. This can provide optimal performance for active systems,
especially those with little resources or large traffic volumes.
For instance, the system will automatically log out of an
employee's use of the Employee Information System after a minute. The goal of
this is to lighten the load on the system because occasionally users forget to
log out or get lost. Besides that, this function also is needed in order to
prevent the system or session being overloaded with inactive sessions. This is
to ensure the optimal resource availability for active users and avoid the
system being lagged.
4 - Attendance
There are many benefits that SHOENIVERSE will achieve such as
online systems automatically recording attendance data with pinpoint accuracy,
saving time and reducing administrative burden. Besides that, it eliminates the
need for expensive paper timesheets and physical time clocks. Online systems
also streamline payroll processes, minimizing errors and saving money. Lastly,
online systems provide employees with clear records of their attendance,
promoting transparency and ensuring fair treatment in regard to payroll and
leave management.
Before the maintenance phase, employees could access attendance
wherever they were and at any time. This causes the efficiency of the system to
be less effective and efficient. Therefore, the human resource department has
suggested the presence of employees using QR code scans that will be provided
daily at the front door of the office. Therefore, employees must be present at
work before or exactly at 8: 00 AM to avoid any action from superiors. In
addition, employees can use any devices such as iPad, iPhone, android
smartphone, android tablet and others.
5- Automatic history deletion (after 3 months)
In addition, it can provide Security Enhancement for employees, especially in their system logs. Automatic deletion of system logs enhances security by preventing the accumulation of sensitive information. For instance, operating systems may automatically delete logs after a certain period to limit potential exposure. Other than that, it also can be used for authentication records. Systems may automatically delete records of user authentication after a successful login to reduce the risk of unauthorized access. For example, a server might clear authentication logs after a specified time.
Comments
Post a Comment