Capstone Project Undergraduate 955 words Human Written

Process Flow Diagram and Description Information Technology

Last reviewed: ~5 min read Business › Information Technology
80% visible
Read full paper →
Paper Overview

INFORMATION TECHNOLOGY Information Technology: Process Flow Diagram and DescriptionFiles storage and access Data user, our company Data encryption and decryption User management and key management resourceful services on the platform Amazon Web Services (AWS) Cloud storage The above depicts the process flow that would take place if we buy space for storing and...

Full Paper Example 955 words · 80% shown · Sign up to read all

INFORMATION TECHNOLOGY

Information Technology: Process Flow Diagram and DescriptionFiles storage and access

Data user, our company

Data encryption and decryption

User management and key management resourceful services on the platform

Amazon Web Services (AWS)

Cloud storage

The above depicts the process flow that would take place if we buy space for storing and accessing applications and databases from third-party cloud storage, which is Amazon Web Services (AWS). Certainly, numerous benefits of cloud storage have compelled us to choose third-party storage for our data needs. The data is strongly backed up, which induces powered safeguards against online theft (Amazon Web Services, 2022). The cloud storage is reliably secured at the AWS centers. The compliance is evident with the policy and programs initiated by the government; hence, illegal business conduct is not a question. Money saving is one of the key features of AWS as managing facilities, and user convenience comes with hassle-free data handling. The business size does not matter for AWS; the firm knows data protection remains a top priority for any business; therefore, responsibility comes with their services.

The flow diagram determines the procedures of how our applications would be managed over the cloud storage. The existing cloud storage is assumed to be the external storage linked and managed by AWS. The owner and the user management become some of the key accountabilities of AWS when it agrees to provide us with a centralized data access and storage platform. Our company would have full access to the data whenever in need. The files could even be extracted, modified, and again stored in the cloud storage through AWS. While the data extraction, retrieval, and return storage are taking place, AWS would be responsible for ensuring data protection. Data theft could be a risk during the comprehensive process of data moving from one point to another. AWS guarantees encryption and backing till the entire process of our company is under conduction.

When the company wishes to access a file from AWS cloud storage, an encrypted message is sent from the company’s system to AWS. The access permission must be granted from the AWS server so that the cloud environment shares the required file (Indu et al., 2016). The potential mechanism would allow the AWS algorithm to work faster for secure delivery and sharing.

The disaster recovery plan is in-built within the AWS system. AWS narrates that it has four approaches to this kind of problem (AWS, n.d.).). They range from low-cost and low-complexity issues to high-cost and high-complexity ones (AWS, n.d.).). It also depends on the business size here since the larger the business, the more complex its issues would be. Since our company is based on 30 employees, a relatively small company, disaster management would be easier.

Due to AWS’s strong backup tactics, hosting the workload and managing server traffic would not be an issue. To remain safe, our company would track and authenticate the data recovery strategies to gain confidence that the data is in the right hands. This is encouraged by AWS itself so that on-the-spot issues and disaster recovery do not stimulate any trouble (AWS, n.d.). AWS further enforces AWS Resilience Hub for this purpose which would support our company in achieving Real-Time Transport Protocol (RTP) and Recovery Point Objective (RPO) targets (AWS, n.d.).

AWS provides services, including AWS Cloud Formation, in which infrastructure coding for constant backup is an essential feature (AWS, n.d.). It is done for the safety of our company’s data, which is not separate from the comprehensive flow diagram process mentioned above. Within the AWS system, backing occurs, especially when the company lies in the same region (AWS, n.d.). The workload configuration within the infrastructure is copied and backed up by AWS to help secure against disaster events (AWS, n.d.). Even the insider threats and compromise from the accounting system is the additional capability handling of AWS, defined within the process flow.

AWS is one of the famous third-party cloud services businesses that excel in data management. Hence, this would not be a concern for our company. It is said that AWS is an active participant in the Cloud Data Management Capabilities (CDMC) framework (Marshall & Code, 2021). It is a collaborative effort of the financial service institutions and cloud-computing companies like AWS that would help us in automated end-to-end encryption, as mentioned in the process flow diagram. The open-source framework for acceleration of cloud services and interpretation of the complexity of cloud adoption is the digital transformation that AWS would help a small business like us to assist with (Marshall & Code, 2021).

The continuous acknowledgment of AWS within the data storage and access is necessary here to make it logical that a growing company like ours would suitably grow with the kind of service AWS provides for cloud computing. The process would be smooth with 24-hour support of data access. With the lowest possible risk that might occur from the actual cloud space, then to AWS, and then to our company- an exhaustive recovery and risk management process are enabled with AWS, a feasible host solution for us. The code, design, and infrastructure of our company and the data retrieval process is the best opportunity for further development of the e-commerce business in alignment with today’s modern world needs, industry, and market demands.

191 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
4 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Process Flow Diagram And Description Information Technology" (2022, August 10) Retrieved April 22, 2026, from
https://www.paperdue.com/essay/process-flow-diagram-description-technology-capstone-project-2179293

Always verify citation format against your institution's current style guide.

80% of this paper shown 191 words remaining