SlideShare una empresa de Scribd logo
1 de 3
BIS 320 Week 5 Applying Information Security and SDLC
Link : http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/
Sample content
Information Security
BIS/320
Information Security
Kroenke, D.M. (2012) states that SDLC or Systems development life cycle is a
conventional method of information systems development. To survive in the
market, Amazon Corporation have put major thrust on areas like research,
development and building new information systems. SDLC process comes in
different versions with varying number of steps. Some go for the eight step process
while few prefer the seven step process. Another variation is the five step process
which includes the following stages: System definition, Requirement analysis,
Component design, Implementation and Maintenance.
There is a subtle difference between a disaster and a threat. Heavy physical loss
of computing machinery due to natural causes, assault or terrorist attacks come
under the category of Disasters. Threats cover issues arising from human errors,
malicious illegal acts and natural disasters. An instance of human error would be
an unintentional or intentional shredding of data by employees. Events like a
twister or flood beyond human control can disable all computing services
indefinitely. With all these factors established, it is important to consider the steps
to be taken in preparing for disasters ahead of development of plans (Kroenke,
“Information Security Management,” 2012). The SDLC process which has been so
strictly and exhaustively followed by Amazon can be used as a standard operating
procedure for application development by other organizations.
The first and foremost condition for being prepared in case of disasters is to locate
facilities in geographical positions which are beyond natural and human attacks.
Next important step is identification of systems and resources that are necessary to
get the business rolling. Having a secondary backup facility that can function at
quick intimation at times of threats is recommended. Exposure to the secondary
facility working conditions and its functioning to the employees are needed so they
can run these backup facilities immediately after any disaster (Kroenke,
“Information Security Management,” 2012).
Amazon can afford having their business data backed up in secure servers as they
are the makers of virtual servers that are intended for the exact functionality
purposes. Their product that does this is Amazon EC2 and this eliminates the need
to outsource data backup. All these can be performed within the premises of
Amazon. They also have the capabilities to have protected data centers anywhere
in the United States or globally. Another feature of the servers of Amazon is the
“availability zones” for data within data center facilities which can restrict the
damage to limited areas in case of breakdowns. Globally these centers are
positioned in groups. At times of failures, the data transfer takes place from the
impacted zone to the nearest safe zone. The high traffic is managed by balancing
the load in the rest of the centers.
An Incident Management team is assigned to take responsive actions in case of
emergencies. The main function of this team is to constantly survey the company
owned and rented virtual servers. Their personnel carryout this supervision task 24
hours every single day of the year. They are ready to quarantine incidents and take
immediate action. This complete monitoring activity keeps a check on essential
operational metrics. Whenever a limiting value of a parameter is reached on
important functioning systems, a notification is sent to staff in charge of operations
and management. A thorough documentation of the series of events during such
incidents helps make the job of the personnel easy. Conferencing system having
restrictive access and effective communication features can be of valuable
assistance when there is a need for collaboration. Amazon has a dedicated team of
skilled call leaders to ensure smooth systematic collaboration (Amazon, May
2011).
In order to expand their existing business functions and goals, and employment of
new information systems, Amazon can analyze these aspects exhaustively. In the
SDLC process, the first stage is concerned with identifying and listing the
applications as part of systems planning. Also, this is the stage where the business
stands to gain the most through development. In the subsequent stage, system
analysis helps to define the problem statement in hand. The requisites for the
business to set up an improved and optimized information system are realized. In
the systems design stage, decisions regarding the techniques of integrating
technical solutions with business needs are taken as per the conclusions from the
systems analysis stage. As the company continues down the SDLC process flow, it
would come to the implementation level where the prototypes of the improvised
system are put in operation and observe the outcomes. These stages work in
unison for the systems support to sustain and hold the systems for the rest of the
life cycle (Geerts, G.L., McCarthy, W.E., & Rockwell, S.R., 1996). As far as
application development is concerned, Amazon has set a standard with the strict
adherence to the systematic SDLC process covering in detail all stages. In the field
of a
http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/

Más contenido relacionado

Destacado

Destacado (8)

Curriculum impresiones finas
Curriculum impresiones finasCurriculum impresiones finas
Curriculum impresiones finas
 
DevOps Jump Start
DevOps Jump StartDevOps Jump Start
DevOps Jump Start
 
Continuous Deployment & Delivery + Culture Hacks @ QCON 2012
Continuous Deployment & Delivery + Culture Hacks @ QCON 2012Continuous Deployment & Delivery + Culture Hacks @ QCON 2012
Continuous Deployment & Delivery + Culture Hacks @ QCON 2012
 
Yam
YamYam
Yam
 
Evonik Supply Chain Visibility Presentation - Elemica Executive Luncheon
Evonik Supply Chain Visibility Presentation - Elemica Executive LuncheonEvonik Supply Chain Visibility Presentation - Elemica Executive Luncheon
Evonik Supply Chain Visibility Presentation - Elemica Executive Luncheon
 
2 funnystories
2 funnystories2 funnystories
2 funnystories
 
Corona effect, corona ring and any other topics
Corona effect, corona ring and any other topicsCorona effect, corona ring and any other topics
Corona effect, corona ring and any other topics
 
Content marketing för alla - föreläsning och bokrelease på Berghs
Content marketing för alla - föreläsning och bokrelease på BerghsContent marketing för alla - föreläsning och bokrelease på Berghs
Content marketing för alla - föreläsning och bokrelease på Berghs
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

BIS 320 Week 5 Applying Information Security and SDLC 2015 version

  • 1. BIS 320 Week 5 Applying Information Security and SDLC Link : http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/ Sample content Information Security BIS/320 Information Security
  • 2. Kroenke, D.M. (2012) states that SDLC or Systems development life cycle is a conventional method of information systems development. To survive in the market, Amazon Corporation have put major thrust on areas like research, development and building new information systems. SDLC process comes in different versions with varying number of steps. Some go for the eight step process while few prefer the seven step process. Another variation is the five step process which includes the following stages: System definition, Requirement analysis, Component design, Implementation and Maintenance. There is a subtle difference between a disaster and a threat. Heavy physical loss of computing machinery due to natural causes, assault or terrorist attacks come under the category of Disasters. Threats cover issues arising from human errors, malicious illegal acts and natural disasters. An instance of human error would be an unintentional or intentional shredding of data by employees. Events like a twister or flood beyond human control can disable all computing services indefinitely. With all these factors established, it is important to consider the steps to be taken in preparing for disasters ahead of development of plans (Kroenke, “Information Security Management,” 2012). The SDLC process which has been so strictly and exhaustively followed by Amazon can be used as a standard operating procedure for application development by other organizations. The first and foremost condition for being prepared in case of disasters is to locate facilities in geographical positions which are beyond natural and human attacks. Next important step is identification of systems and resources that are necessary to get the business rolling. Having a secondary backup facility that can function at quick intimation at times of threats is recommended. Exposure to the secondary facility working conditions and its functioning to the employees are needed so they can run these backup facilities immediately after any disaster (Kroenke, “Information Security Management,” 2012). Amazon can afford having their business data backed up in secure servers as they are the makers of virtual servers that are intended for the exact functionality purposes. Their product that does this is Amazon EC2 and this eliminates the need to outsource data backup. All these can be performed within the premises of Amazon. They also have the capabilities to have protected data centers anywhere in the United States or globally. Another feature of the servers of Amazon is the “availability zones” for data within data center facilities which can restrict the damage to limited areas in case of breakdowns. Globally these centers are positioned in groups. At times of failures, the data transfer takes place from the impacted zone to the nearest safe zone. The high traffic is managed by balancing the load in the rest of the centers.
  • 3. An Incident Management team is assigned to take responsive actions in case of emergencies. The main function of this team is to constantly survey the company owned and rented virtual servers. Their personnel carryout this supervision task 24 hours every single day of the year. They are ready to quarantine incidents and take immediate action. This complete monitoring activity keeps a check on essential operational metrics. Whenever a limiting value of a parameter is reached on important functioning systems, a notification is sent to staff in charge of operations and management. A thorough documentation of the series of events during such incidents helps make the job of the personnel easy. Conferencing system having restrictive access and effective communication features can be of valuable assistance when there is a need for collaboration. Amazon has a dedicated team of skilled call leaders to ensure smooth systematic collaboration (Amazon, May 2011). In order to expand their existing business functions and goals, and employment of new information systems, Amazon can analyze these aspects exhaustively. In the SDLC process, the first stage is concerned with identifying and listing the applications as part of systems planning. Also, this is the stage where the business stands to gain the most through development. In the subsequent stage, system analysis helps to define the problem statement in hand. The requisites for the business to set up an improved and optimized information system are realized. In the systems design stage, decisions regarding the techniques of integrating technical solutions with business needs are taken as per the conclusions from the systems analysis stage. As the company continues down the SDLC process flow, it would come to the implementation level where the prototypes of the improvised system are put in operation and observe the outcomes. These stages work in unison for the systems support to sustain and hold the systems for the rest of the life cycle (Geerts, G.L., McCarthy, W.E., & Rockwell, S.R., 1996). As far as application development is concerned, Amazon has set a standard with the strict adherence to the systematic SDLC process covering in detail all stages. In the field of a http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/