Critique of information system and information technology is an assignment which is based on critical analysis of Management decisions that led to the denial of service (DoS) attack on the company. In this assignment the students needs to critically analyse the management decisions and find out the main reasons that led denial of service (DoS) attack.The student need appropriate guidance from the expert writers to prepare the assignment professionally. The students must prepare this assignment with proper format to attain high grades.
The proper guideline for the preparation of critique of information system and information technology assignment is:
The student must understand the case study properly. The students need to identify all the management decisions that are taken by the company. In the executive summary section, the students must discuss the outline of the report with the major points that will lead the project. Along with this, the students must also verify the main conclusion and recommendations for the company. The students must provide the recommendation briefly in the executive summary so that the reader could understand that what the company should do differently to avoid the Denial of Service (DoS) attack. Along with this, the brief conclusion must be included in an executive summary by the students to ensure the recommendations are in favour of the company.
After this, in the introduction section, the students need to identify the main decision of the management that led to the Denial of Service (DoS) attack. The word limit for the introduction is 150 words. Therefore, it is necessary for the students to keep the introduction concise and clear. After identifying the management decision, the students need to give their assumptions regarding the causes of the Denial of Service (DoS) attack. This will help the students to recognize the main reason for the DoS attack.
Limited Tender Process in selecting IT supplier
In the body paragraph, the students must discuss the decision of management in which they organize the limited tender process for the selection of IT supplier. The limited tender attracts only few IT suppliers, and it is obvious the company will give the tender to those whose budget is low. Hence this may bring the problem for the company as the IT supplier with the low budget may not provide better services to the company. The lack of better services also led to the denial of service of attack. The students must find the other possible reasons related to limited tender for selection of IT suppliers and must discuss in this section. After this, the students need to provide the suggestions to the company that what should a company have done differently to avoid such Distributed Denial of Service (DDoS) attacks in the future. In this regard, the students can provide the list of suggestion which must be suitable for the company to accept.
Recommendation and conclusion section
This is the section in which the students need to give the recommendations to the company to avoid the Denial of service (DoS) attack. The students can provide the list of recommendations in this section. In the conclusion part, the students must summarize the statements that are provided in the report to ensure the suggestions and recommendations given to company are successful.