• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The Treasury department is the financial hub of the government of ST. Vincent and the Grenadines. A partial Wide Area Network is in place and this links the major government departments to the treasury so they can perform online transaction processing. T

Extracts from this document...

Introduction

TABLE OF CONTENTS

TABLE OF CONTENTS

INTRODUCTION

Overview of the firm

Current Business Issues

Statement and discussion of the problems under study

Goals and objectives of the study

METHODOLOGY

FINDINGS

RECOMMENDATIONS

BUSINESS CONTINUITY DISCLOSURE

INTRODUCTION

Overview of the firm

The Treasury department is the financial hub of the government of ST. Vincent and the Grenadines.  Its responsibilities include

  1. Ensuring that proper and adequate accounting systems are established and maintained in every Department of Government
  2. Receipts of Government Revenues.
  3. Disbursement from consolidated fund of amount duly authorized.
  4. Custody of Government Cash and Securities.
  5. Maintenance of Accounts of all appropriations and Revenue Receipts.
  6. Preparation of the Public Accounts of the State as required by Law.
  7. Investigation of losses and irregularities in financial administration
  8. Providing Treasury Services in out districts
  9. To enhance and modernize the Treasury Accounting Systems.

All financial transactions of the government are conducted through the treasury.  A partial Wide Area Network is in place and this links the major government departments to the treasury so they can perform online transaction processing.  This network is using a combination of high speed (1 Gbps) fiber optic link and low speed (32 Kbps) Frame Relay rented from Cable and Wireless, the lone telecommunication company in the country.  

Smartstream is the main application being used by the treasury.  Smartstream is a client/server system that enables companies to effectively manage financial and operational information and dynamically upgrade business processes across the entire enterprise. Smartstream application comprise of a complete set of solutions for managing your company’s back office, including general ledger, budget administration, receivables and payables, billing, asset management, procurement, and human resources.  

...read more.

Middle

FINDINGS

The single points of failure identified in the system are as follows

SPOF

Services Affected

Applications

Affected

Application

Description

Database Server

Processing of transactions

Smartstream

Financial System that process trans.

Authentication Server

Login on to Network

Processing of transactions

Smartstream

Financial System that process trans.

Frame Relay Links

Processing of transactions by ministries using it

Smartstream

Financial System that process trans.

Fiber Optic links

Financial System that process trans.

CS/DSU units

Processing of transactions

Smartstream

Financial System that process trans.

Job Servers

Printing of checks and purchase orders

Smartstream

Financial System that process trans.

Switches and routers

Processing of transactions

Smartstream

Financial System that process trans.

ISP Provider

Network access and processing activities

Smartstream

Financial System that process trans.

When the database server is down no one can perform any processing of activities since there is no redundant server to failover to.  If the authentication server is down the users cannot log on to the system therefore they cannot process transactions. The frame relay only affects the ministries that use it likewise the fiber optic link, if any of these are down then only certain users will be without access.  The ISP provider supplies the frame relay thus if the service provider is down then the users on frame relay will not have access to the system.  There are no spare for the resources therefore if any equipment goes bad there is no replacement, an order has to placed for one, if none is available locally then you might have to wait at least a day or two to get one from a neighboring Island or the USA.

The system is mainly used for the Smartstream application.

...read more.

Conclusion

  • Identification of mission critical systems
  • Backup facilities and arrangements, data recovery.
  • Alternate communication between Treasury and the various accounts units of the Ministries of Government and sub treasuries and customers.
  • Alternate physical site location
  • Customers access to receiving their wages, other allowances or any monies due to them by the Government of St. Vincent and the Grenadines.

 This plan is reviewed on a regular basis to modify it for any changes our operations or changes in laws and government regulations.  The plan is also periodically tested to ensure that it will operate and operates successfully in the event of a disaster.

It is virtually impossible to plan for every possible disaster however we are confident that the major threats faced by the department have been addressed in the plan.  However there is a possibility that due to our dependence on other third parties that we could be adversely affected after a disaster.  

The plan is subject to change and changes will be reflected in an updated notice to all our customers.  This notice will be posted on the governments’ website www.svg.sv.  You may obtain a written copy of this disclosure by sending a written request to the Accountant General, Treasury Department, Kingstown, St. Vincent.

Page  of

...read more.

This student written piece of work is one of many that can be found in our University Degree Information Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Information Systems essays

  1. In this coursework we will be designing a component based model for a business ...

    even within a specific framework data cannot be freely expressed between the departments or the different hierarchy of employees. The data has to remain static at where it is, and access the data through federation, due to the fact that centralisation of data will not possible.

  2. The purpose of this paper is to provide an analysis of Cisco Systems primary ...

    Low-Cost Strategy A low cost strategy could offer a company a competitive edge within the network equipment industry with notoriously expensive products. Low costs are possible due to the development of new technologies. In particular Juniper Networks has focused on offering lower cost products as an alternative to Cisco's high priced products.

  1. Security System for Ad-hoc Wireless Networks

    One aspect is that access to the global network can not always be established, either because of lack of coverage or because of high cost of communications. Therefore, transactions and control mechanisms in such networks must be as independent from outside resources as possible.

  2. Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the ...

    It is also a flexible methodology, being able to accommodate changes in user requirements throughout. The end result quality may not be as good as that in SSADM. This is because the scope and purpose of the project is not always initially clear.

  1. Website Design. This is a Texans Credit Union online website. It has recently ...

    a1 IF any information is missing on Wire Transfer Request form then immediately notify customer via the web page. 2. a1. IF customer enters invalid account information then immediately notify customer via web page. 3. a1. IF customer lacks the necessary funds then reject request 4.

  2. This research is about Management of network operating system at Natural Forest Resources management ...

    TABLE OF CONTENTS ABSTRACT i TABLE OF CONTENTS ii ACKNOWLEDGEMENT iv DECLARATION v COPYRIGHT vi DEDICATION vii LIST OF TABLES: viii LIST OF FIGURES: ix ABBREVIATIONS AND ACRONYMS x CHAPTER ONE 1 1.0 INTRODUCTION 1 1.1 Background of NAFRAC 1 1.1.1 Vision 1 1.1.2 Mission 1 1.2 Background of the

  1. Types of IT Security Threats

    One of the ways which I myself find most interesting is a Man in the Middle Attack, or a MITM. Essentially, what an MITM attack does is make its victims think that they are communicating directly with each other, when in reality, they are doing so through the "middle" PC.

  2. Analyze Human Resource System for Riordan Manufacturing

    Some key factors of this project will be, the integrations of new software installation, new hardware and training will be needed at all branch locations, including the following departments at these locations: Human Resources, Payroll Clerk, Recruiters, Managers, Compensation Manager, Employee Relations and Training and Development Specialists.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work