SlideShare una empresa de Scribd logo
1 de 3
BIS 320 Week 5 Applying Information Security and SDLC
Link : http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/
Sample content
Information Security
BIS/320
Information Security
Kroenke, D.M. (2012) states that SDLC or Systems development life cycle is a
conventional method of information systems development. To survive in the
market, Amazon Corporation have put major thrust on areas like research,
development and building new information systems. SDLC process comes in
different versions with varying number of steps. Some go for the eight step process
while few prefer the seven step process. Another variation is the five step process
which includes the following stages: System definition, Requirement analysis,
Component design, Implementation and Maintenance.
There is a subtle difference between a disaster and a threat. Heavy physical loss
of computing machinery due to natural causes, assault or terrorist attacks come
under the category of Disasters. Threats cover issues arising from human errors,
malicious illegal acts and natural disasters. An instance of human error would be
an unintentional or intentional shredding of data by employees. Events like a
twister or flood beyond human control can disable all computing services
indefinitely. With all these factors established, it is important to consider the steps
to be taken in preparing for disasters ahead of development of plans (Kroenke,
“Information Security Management,” 2012). The SDLC process which has been so
strictly and exhaustively followed by Amazon can be used as a standard operating
procedure for application development by other organizations.
The first and foremost condition for being prepared in case of disasters is to locate
facilities in geographical positions which are beyond natural and human attacks.
Next important step is identification of systems and resources that are necessary to
get the business rolling. Having a secondary backup facility that can function at
quick intimation at times of threats is recommended. Exposure to the secondary
facility working conditions and its functioning to the employees are needed so they
can run these backup facilities immediately after any disaster (Kroenke,
“Information Security Management,” 2012).
Amazon can afford having their business data backed up in secure servers as they
are the makers of virtual servers that are intended for the exact functionality
purposes. Their product that does this is Amazon EC2 and this eliminates the need
to outsource data backup. All these can be performed within the premises of
Amazon. They also have the capabilities to have protected data centers anywhere
in the United States or globally. Another feature of the servers of Amazon is the
“availability zones” for data within data center facilities which can restrict the
damage to limited areas in case of breakdowns. Globally these centers are
positioned in groups. At times of failures, the data transfer takes place from the
impacted zone to the nearest safe zone. The high traffic is managed by balancing
the load in the rest of the centers.
An Incident Management team is assigned to take responsive actions in case of
emergencies. The main function of this team is to constantly survey the company
owned and rented virtual servers. Their personnel carryout this supervision task 24
hours every single day of the year. They are ready to quarantine incidents and take
immediate action. This complete monitoring activity keeps a check on essential
operational metrics. Whenever a limiting value of a parameter is reached on
important functioning systems, a notification is sent to staff in charge of operations
and management. A thorough documentation of the series of events during such
incidents helps make the job of the personnel easy. Conferencing system having
restrictive access and effective communication features can be of valuable
assistance when there is a need for collaboration. Amazon has a dedicated team of
skilled call leaders to ensure smooth systematic collaboration (Amazon, May
2011).
In order to expand their existing business functions and goals, and employment of
new information systems, Amazon can analyze these aspects exhaustively. In the
SDLC process, the first stage is concerned with identifying and listing the
applications as part of systems planning. Also, this is the stage where the business
stands to gain the most through development. In the subsequent stage, system
analysis helps to define the problem statement in hand. The requisites for the
business to set up an improved and optimized information system are realized. In
the systems design stage, decisions regarding the techniques of integrating
technical solutions with business needs are taken as per the conclusions from the
systems analysis stage. As the company continues down the SDLC process flow, it
would come to the implementation level where the prototypes of the improvised
system are put in operation and observe the outcomes. These stages work in
unison for the systems support to sustain and hold the systems for the rest of the
life cycle (Geerts, G.L., McCarthy, W.E., & Rockwell, S.R., 1996). As far as
application development is concerned, Amazon has set a standard with the strict
adherence to the systematic SDLC process covering in detail all stages. In the field
of a
http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/

Más contenido relacionado

Destacado

Continuous Deployment & Delivery + Culture Hacks @ QCON 2012
Continuous Deployment & Delivery + Culture Hacks @ QCON 2012Continuous Deployment & Delivery + Culture Hacks @ QCON 2012
Continuous Deployment & Delivery + Culture Hacks @ QCON 2012Jesse Robbins
 
Evonik Supply Chain Visibility Presentation - Elemica Executive Luncheon
Evonik Supply Chain Visibility Presentation - Elemica Executive LuncheonEvonik Supply Chain Visibility Presentation - Elemica Executive Luncheon
Evonik Supply Chain Visibility Presentation - Elemica Executive LuncheonElemica
 
Corona effect, corona ring and any other topics
Corona effect, corona ring and any other topicsCorona effect, corona ring and any other topics
Corona effect, corona ring and any other topicsMithilesh Raj
 
Content marketing för alla - föreläsning och bokrelease på Berghs
Content marketing för alla - föreläsning och bokrelease på BerghsContent marketing för alla - föreläsning och bokrelease på Berghs
Content marketing för alla - föreläsning och bokrelease på BerghsJoakim Arhammar
 

Destacado (8)

Curriculum impresiones finas
Curriculum impresiones finasCurriculum impresiones finas
Curriculum impresiones finas
 
DevOps Jump Start
DevOps Jump StartDevOps Jump Start
DevOps Jump Start
 
Continuous Deployment & Delivery + Culture Hacks @ QCON 2012
Continuous Deployment & Delivery + Culture Hacks @ QCON 2012Continuous Deployment & Delivery + Culture Hacks @ QCON 2012
Continuous Deployment & Delivery + Culture Hacks @ QCON 2012
 
Yam
YamYam
Yam
 
Evonik Supply Chain Visibility Presentation - Elemica Executive Luncheon
Evonik Supply Chain Visibility Presentation - Elemica Executive LuncheonEvonik Supply Chain Visibility Presentation - Elemica Executive Luncheon
Evonik Supply Chain Visibility Presentation - Elemica Executive Luncheon
 
2 funnystories
2 funnystories2 funnystories
2 funnystories
 
Corona effect, corona ring and any other topics
Corona effect, corona ring and any other topicsCorona effect, corona ring and any other topics
Corona effect, corona ring and any other topics
 
Content marketing för alla - föreläsning och bokrelease på Berghs
Content marketing för alla - föreläsning och bokrelease på BerghsContent marketing för alla - föreläsning och bokrelease på Berghs
Content marketing för alla - föreläsning och bokrelease på Berghs
 

Último

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 

Último (20)

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 

BIS 320 Week 5 Applying Information Security and SDLC 2015 version

  • 1. BIS 320 Week 5 Applying Information Security and SDLC Link : http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/ Sample content Information Security BIS/320 Information Security
  • 2. Kroenke, D.M. (2012) states that SDLC or Systems development life cycle is a conventional method of information systems development. To survive in the market, Amazon Corporation have put major thrust on areas like research, development and building new information systems. SDLC process comes in different versions with varying number of steps. Some go for the eight step process while few prefer the seven step process. Another variation is the five step process which includes the following stages: System definition, Requirement analysis, Component design, Implementation and Maintenance. There is a subtle difference between a disaster and a threat. Heavy physical loss of computing machinery due to natural causes, assault or terrorist attacks come under the category of Disasters. Threats cover issues arising from human errors, malicious illegal acts and natural disasters. An instance of human error would be an unintentional or intentional shredding of data by employees. Events like a twister or flood beyond human control can disable all computing services indefinitely. With all these factors established, it is important to consider the steps to be taken in preparing for disasters ahead of development of plans (Kroenke, “Information Security Management,” 2012). The SDLC process which has been so strictly and exhaustively followed by Amazon can be used as a standard operating procedure for application development by other organizations. The first and foremost condition for being prepared in case of disasters is to locate facilities in geographical positions which are beyond natural and human attacks. Next important step is identification of systems and resources that are necessary to get the business rolling. Having a secondary backup facility that can function at quick intimation at times of threats is recommended. Exposure to the secondary facility working conditions and its functioning to the employees are needed so they can run these backup facilities immediately after any disaster (Kroenke, “Information Security Management,” 2012). Amazon can afford having their business data backed up in secure servers as they are the makers of virtual servers that are intended for the exact functionality purposes. Their product that does this is Amazon EC2 and this eliminates the need to outsource data backup. All these can be performed within the premises of Amazon. They also have the capabilities to have protected data centers anywhere in the United States or globally. Another feature of the servers of Amazon is the “availability zones” for data within data center facilities which can restrict the damage to limited areas in case of breakdowns. Globally these centers are positioned in groups. At times of failures, the data transfer takes place from the impacted zone to the nearest safe zone. The high traffic is managed by balancing the load in the rest of the centers.
  • 3. An Incident Management team is assigned to take responsive actions in case of emergencies. The main function of this team is to constantly survey the company owned and rented virtual servers. Their personnel carryout this supervision task 24 hours every single day of the year. They are ready to quarantine incidents and take immediate action. This complete monitoring activity keeps a check on essential operational metrics. Whenever a limiting value of a parameter is reached on important functioning systems, a notification is sent to staff in charge of operations and management. A thorough documentation of the series of events during such incidents helps make the job of the personnel easy. Conferencing system having restrictive access and effective communication features can be of valuable assistance when there is a need for collaboration. Amazon has a dedicated team of skilled call leaders to ensure smooth systematic collaboration (Amazon, May 2011). In order to expand their existing business functions and goals, and employment of new information systems, Amazon can analyze these aspects exhaustively. In the SDLC process, the first stage is concerned with identifying and listing the applications as part of systems planning. Also, this is the stage where the business stands to gain the most through development. In the subsequent stage, system analysis helps to define the problem statement in hand. The requisites for the business to set up an improved and optimized information system are realized. In the systems design stage, decisions regarding the techniques of integrating technical solutions with business needs are taken as per the conclusions from the systems analysis stage. As the company continues down the SDLC process flow, it would come to the implementation level where the prototypes of the improvised system are put in operation and observe the outcomes. These stages work in unison for the systems support to sustain and hold the systems for the rest of the life cycle (Geerts, G.L., McCarthy, W.E., & Rockwell, S.R., 1996). As far as application development is concerned, Amazon has set a standard with the strict adherence to the systematic SDLC process covering in detail all stages. In the field of a http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/