SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
BIS 320 Week 5 Applying Information Security and SDLC
Link : http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/
Sample content
Information Security
BIS/320
Information Security
Kroenke, D.M. (2012) states that SDLC or Systems development life cycle is a
conventional method of information systems development. To survive in the
market, Amazon Corporation have put major thrust on areas like research,
development and building new information systems. SDLC process comes in
different versions with varying number of steps. Some go for the eight step process
while few prefer the seven step process. Another variation is the five step process
which includes the following stages: System definition, Requirement analysis,
Component design, Implementation and Maintenance.
There is a subtle difference between a disaster and a threat. Heavy physical loss
of computing machinery due to natural causes, assault or terrorist attacks come
under the category of Disasters. Threats cover issues arising from human errors,
malicious illegal acts and natural disasters. An instance of human error would be
an unintentional or intentional shredding of data by employees. Events like a
twister or flood beyond human control can disable all computing services
indefinitely. With all these factors established, it is important to consider the steps
to be taken in preparing for disasters ahead of development of plans (Kroenke,
“Information Security Management,” 2012). The SDLC process which has been so
strictly and exhaustively followed by Amazon can be used as a standard operating
procedure for application development by other organizations.
The first and foremost condition for being prepared in case of disasters is to locate
facilities in geographical positions which are beyond natural and human attacks.
Next important step is identification of systems and resources that are necessary to
get the business rolling. Having a secondary backup facility that can function at
quick intimation at times of threats is recommended. Exposure to the secondary
facility working conditions and its functioning to the employees are needed so they
can run these backup facilities immediately after any disaster (Kroenke,
“Information Security Management,” 2012).
Amazon can afford having their business data backed up in secure servers as they
are the makers of virtual servers that are intended for the exact functionality
purposes. Their product that does this is Amazon EC2 and this eliminates the need
to outsource data backup. All these can be performed within the premises of
Amazon. They also have the capabilities to have protected data centers anywhere
in the United States or globally. Another feature of the servers of Amazon is the
“availability zones” for data within data center facilities which can restrict the
damage to limited areas in case of breakdowns. Globally these centers are
positioned in groups. At times of failures, the data transfer takes place from the
impacted zone to the nearest safe zone. The high traffic is managed by balancing
the load in the rest of the centers.
An Incident Management team is assigned to take responsive actions in case of
emergencies. The main function of this team is to constantly survey the company
owned and rented virtual servers. Their personnel carryout this supervision task 24
hours every single day of the year. They are ready to quarantine incidents and take
immediate action. This complete monitoring activity keeps a check on essential
operational metrics. Whenever a limiting value of a parameter is reached on
important functioning systems, a notification is sent to staff in charge of operations
and management. A thorough documentation of the series of events during such
incidents helps make the job of the personnel easy. Conferencing system having
restrictive access and effective communication features can be of valuable
assistance when there is a need for collaboration. Amazon has a dedicated team of
skilled call leaders to ensure smooth systematic collaboration (Amazon, May
2011).
In order to expand their existing business functions and goals, and employment of
new information systems, Amazon can analyze these aspects exhaustively. In the
SDLC process, the first stage is concerned with identifying and listing the
applications as part of systems planning. Also, this is the stage where the business
stands to gain the most through development. In the subsequent stage, system
analysis helps to define the problem statement in hand. The requisites for the
business to set up an improved and optimized information system are realized. In
the systems design stage, decisions regarding the techniques of integrating
technical solutions with business needs are taken as per the conclusions from the
systems analysis stage. As the company continues down the SDLC process flow, it
would come to the implementation level where the prototypes of the improvised
system are put in operation and observe the outcomes. These stages work in
unison for the systems support to sustain and hold the systems for the rest of the
life cycle (Geerts, G.L., McCarthy, W.E., & Rockwell, S.R., 1996). As far as
application development is concerned, Amazon has set a standard with the strict
adherence to the systematic SDLC process covering in detail all stages. In the field
of a
http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/

Mais conteúdo relacionado

Destaque

An Accounting Career: Big Waves of Change and Oceans of Opportunity
An Accounting Career: Big Waves of Change and Oceans of OpportunityAn Accounting Career: Big Waves of Change and Oceans of Opportunity
An Accounting Career: Big Waves of Change and Oceans of OpportunityTom Hood, CPA,CITP,CGMA
 
5 Steps to Building a Mature DevOps Organization with Sherwin-Williams
5 Steps to Building a Mature DevOps Organization with Sherwin-Williams5 Steps to Building a Mature DevOps Organization with Sherwin-Williams
5 Steps to Building a Mature DevOps Organization with Sherwin-WilliamsDynatrace
 
Engineering Tools at Netflix: Enabling Continuous Delivery
Engineering Tools at Netflix: Enabling Continuous DeliveryEngineering Tools at Netflix: Enabling Continuous Delivery
Engineering Tools at Netflix: Enabling Continuous DeliveryMike McGarr
 

Destaque (6)

Resume_Anusha
Resume_AnushaResume_Anusha
Resume_Anusha
 
An Accounting Career: Big Waves of Change and Oceans of Opportunity
An Accounting Career: Big Waves of Change and Oceans of OpportunityAn Accounting Career: Big Waves of Change and Oceans of Opportunity
An Accounting Career: Big Waves of Change and Oceans of Opportunity
 
Cerveza Budweiser
Cerveza BudweiserCerveza Budweiser
Cerveza Budweiser
 
Funny stories
Funny storiesFunny stories
Funny stories
 
5 Steps to Building a Mature DevOps Organization with Sherwin-Williams
5 Steps to Building a Mature DevOps Organization with Sherwin-Williams5 Steps to Building a Mature DevOps Organization with Sherwin-Williams
5 Steps to Building a Mature DevOps Organization with Sherwin-Williams
 
Engineering Tools at Netflix: Enabling Continuous Delivery
Engineering Tools at Netflix: Enabling Continuous DeliveryEngineering Tools at Netflix: Enabling Continuous Delivery
Engineering Tools at Netflix: Enabling Continuous Delivery
 

Último

Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphNetziValdelomar1
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxEduSkills OECD
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptxraviapr7
 
Patterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxPatterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxMYDA ANGELICA SUAN
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxDr. Santhosh Kumar. N
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesCeline George
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationMJDuyan
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesMohammad Hassany
 
CAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxCAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxSaurabhParmar42
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptxmary850239
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxKatherine Villaluna
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17Celine George
 

Último (20)

Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a Paragraph
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
 
Patterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxPatterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptx
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptx
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 Sales
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive Education
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming Classes
 
CAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxCAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptx
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptx
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptx
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17
 
Prelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quizPrelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quiz
 

BIS 320 Week 5 Applying Information Security and SDLC 2015 version

  • 1. BIS 320 Week 5 Applying Information Security and SDLC Link : http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/ Sample content Information Security BIS/320 Information Security
  • 2. Kroenke, D.M. (2012) states that SDLC or Systems development life cycle is a conventional method of information systems development. To survive in the market, Amazon Corporation have put major thrust on areas like research, development and building new information systems. SDLC process comes in different versions with varying number of steps. Some go for the eight step process while few prefer the seven step process. Another variation is the five step process which includes the following stages: System definition, Requirement analysis, Component design, Implementation and Maintenance. There is a subtle difference between a disaster and a threat. Heavy physical loss of computing machinery due to natural causes, assault or terrorist attacks come under the category of Disasters. Threats cover issues arising from human errors, malicious illegal acts and natural disasters. An instance of human error would be an unintentional or intentional shredding of data by employees. Events like a twister or flood beyond human control can disable all computing services indefinitely. With all these factors established, it is important to consider the steps to be taken in preparing for disasters ahead of development of plans (Kroenke, “Information Security Management,” 2012). The SDLC process which has been so strictly and exhaustively followed by Amazon can be used as a standard operating procedure for application development by other organizations. The first and foremost condition for being prepared in case of disasters is to locate facilities in geographical positions which are beyond natural and human attacks. Next important step is identification of systems and resources that are necessary to get the business rolling. Having a secondary backup facility that can function at quick intimation at times of threats is recommended. Exposure to the secondary facility working conditions and its functioning to the employees are needed so they can run these backup facilities immediately after any disaster (Kroenke, “Information Security Management,” 2012). Amazon can afford having their business data backed up in secure servers as they are the makers of virtual servers that are intended for the exact functionality purposes. Their product that does this is Amazon EC2 and this eliminates the need to outsource data backup. All these can be performed within the premises of Amazon. They also have the capabilities to have protected data centers anywhere in the United States or globally. Another feature of the servers of Amazon is the “availability zones” for data within data center facilities which can restrict the damage to limited areas in case of breakdowns. Globally these centers are positioned in groups. At times of failures, the data transfer takes place from the impacted zone to the nearest safe zone. The high traffic is managed by balancing the load in the rest of the centers.
  • 3. An Incident Management team is assigned to take responsive actions in case of emergencies. The main function of this team is to constantly survey the company owned and rented virtual servers. Their personnel carryout this supervision task 24 hours every single day of the year. They are ready to quarantine incidents and take immediate action. This complete monitoring activity keeps a check on essential operational metrics. Whenever a limiting value of a parameter is reached on important functioning systems, a notification is sent to staff in charge of operations and management. A thorough documentation of the series of events during such incidents helps make the job of the personnel easy. Conferencing system having restrictive access and effective communication features can be of valuable assistance when there is a need for collaboration. Amazon has a dedicated team of skilled call leaders to ensure smooth systematic collaboration (Amazon, May 2011). In order to expand their existing business functions and goals, and employment of new information systems, Amazon can analyze these aspects exhaustively. In the SDLC process, the first stage is concerned with identifying and listing the applications as part of systems planning. Also, this is the stage where the business stands to gain the most through development. In the subsequent stage, system analysis helps to define the problem statement in hand. The requisites for the business to set up an improved and optimized information system are realized. In the systems design stage, decisions regarding the techniques of integrating technical solutions with business needs are taken as per the conclusions from the systems analysis stage. As the company continues down the SDLC process flow, it would come to the implementation level where the prototypes of the improvised system are put in operation and observe the outcomes. These stages work in unison for the systems support to sustain and hold the systems for the rest of the life cycle (Geerts, G.L., McCarthy, W.E., & Rockwell, S.R., 1996). As far as application development is concerned, Amazon has set a standard with the strict adherence to the systematic SDLC process covering in detail all stages. In the field of a http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/