Friday, December 6, 2019
Information of the Business System-Free-Samples for Students
Question: Discuss about the Case Study of WholeWorldBand. Answer: Introduction WholeWorldBand (Refer to Appendix A) provides an online platform for video and music enthusiasts. Anyone who is interested in creating personalized music videos and is seeking to share the video with everyone all over the world must register with WholeWorldBand. They have planned to enhance the information system architecture for their business (Galliers and Leidner 2014). This report will highlight the various challenges they can face and the probable measures that should be taken. The challenges associated with building information system architecture Vulnerable to DDoS attack: The users who are registered with WholeWorldBand may be the targets. The intruders can hack the database and can the misuse the registered users data (Buttyn 2016). The robots or the automation machine can infect the WholeWorld Bands system. System Hijacking: The WholeWorldBand database can be vulnerable to threats and risks. The malware, virus attack can lead to a leak of personal information, the security breach can affect the companys reputation and the loss of data (Galliers and Leidner 2014). iii. Securing web applications: The WholeWorldBands apps can also be the target of a security breach. Thus security questions arise with the apps too. The users registered with the email id, the password can get into trouble as there is a chance that information can be hacked. If WholeWorldBand adopts the cloud database architecture like Amazon AWS, Microsoft Azure, that can be beneficial for both the companies (Wu 2014). Amazon or Microsoft spends a lot of money on the security. WholeWorldBand by taking the IaaS approach of cloud computing can enhance as well as secure their company. Fig 1: The threats associated with building information system architecture (Source: Wu 2014) WholeWorldBand should employ SQL for their business activities WholeWorldBand should choose the SQL database that does not require manual data transmission, and secondly, they should integrate the SQL server with the cloud vendors platform. SQL database has structured data which plays a vital role in business activities, it assists to store the customer data and also the finance data (Sennewald and Baillie 2015). WholeWorldBand websites, email portals can be maintained by scalable software and apps. WholeWorldBand if planned for developing secured apps must go for the SQL databases as SQL databases ensure data reliability, it also guarantees the safety of the transactions (Wu 2014). SQL database is used worldwide and facilitates eCommerce and WholeWorldBand can be largely benefitted. Fig 2: Functioning of SQL database (Source: Sennewald and Baillie 2015) The measures to protect the unauthorized access of the copyrighted materials Limited access- Should provide access or should give the privileges who works for the company or the association, they should ask the POS reseller to turn on the remote access when required and POS reseller must ensure that the service tools they offer are updated and secured (Soomro, Shah and Ahmed 2016). Usage of strong passwords- The users must be assigned a unique ID so that the WholeWorldBand system can track each of them, however, the customers must set up a strong password. iii.Restriction of physical access-WholeWorldBand must apply locks to hard copies, data and database systems. They must ensure that others have no access to their own system (Soomro, Shah and Ahmed 2016). Fig 3: Security measures (Source: Soomro, Shah and Ahmed 2016) Conclusion It can be concluded from the above discourse that WholeWorldBand has planned to embellish their business activities by improving the database and the website. This report highlighted the challenges correlated with the information system architecture, vulnerabilities of DDoS attack, system hijacking, website security have been discussed, the benefits of adopting SQL database have also been discussed and ultimately the measures to protect the unauthorized access have been elaborated in this report. References Buttyn, L., 2016. Introduction to IT Security. Galliers, R.D. and Leidner, D.E. eds., 2014.Strategic information management: challenges and strategies in managing information systems. Routledge. Sennewald, C.A. and Baillie, C., 2015.Effective security management. Butterworth-Heinemann. Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more holistic approach: A literature review.International Journal of Information Management,36(2), pp.215-225. Wu, A.J., 2014, May. Project development for ethical hacking practice in a website security course. InProceedings of the Western Canadian Conference on Computing Education(p. 18). ACM
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.