1. 1
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
IT190-1502B-01 Introduction to IT
Information Systems
Jerrett S. Wilson
May 20th
, 2015
2. 2
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
Table of Contents
Section 1: Information Systems Overview ............................................................................................4
Organization...................................................................................................................................4
Information Systems.......................................................................................................................5
Section 2: Information Systems Concepts.............................................................................................9
Networks........................................................................................................................................9
Local Area Networks (LAN)........................................................................................................9
Wide Area Network (WAN).........................................................................................................9
LAN vs. WAN..........................................................................................................................10
Wi-Fi and Telecommuting.............................................................................................................10
Wi-Fi........................................................................................................................................10
Telecommuting .........................................................................................................................11
What’s Best For Us?.....................................................................................................................12
Section 3: Business Information Systems ...........................................................................................13
Management Information System (MIS).........................................................................................13
Decision Support System (DSS) ....................................................................................................14
Transaction Processing System (TPS)..............................................................................................15
Artificial Intelligence (AI).............................................................................................................16
Section 4: System Development ........................................................................................................18
Customer Tracking System ............................................................................................................18
Waterfall Model........................................................................................................................19
Prototype Model........................................................................................................................19
Creating MMOM3........................................................................................................................20
Software Requirement Specifications (SRS)................................................................................20
System and Software Design......................................................................................................21
Implementation and Unit Testing................................................................................................21
Integration and System Testing ..................................................................................................21
Operation and Maintenance........................................................................................................22
Section 5: Information Systems and Society .......................................................................................23
Information System Security .........................................................................................................23
Types of Cyber Crimes..................................................................................................................23
Hacking....................................................................................................................................23
4. 4
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
Section1: InformationSystems Overview
Organization
Although, there are very many different organizations out there to choose from, I have
chosen Meathead Movers as my Target Organization. Meathead Movers began in 1997, founded
by Aaron and Evan Steed. The company began as a way for two kids in high school to buy
clothes, food, and school supplies. Being in both football and wrestling it was tough for the two
to find a part-time job that would fit their busy schedules. They started by helping their friend’s
parents move which caused a chain reaction by word of mouth. At first the fee for their services
was a mere $20.00 and pizza for the work they did. Before they could say Meathead Movers, the
idea to start a moving company had already begun.
In 1997, Meathead Movers was only just beginning. Aaron and Evan posted flyers that
they had printed in computer class. The form of communication was Aaron’s beeper which he
would respond to calls on break whenever he got a chance. Clients would have to leave a
message, wait for the call, and then schedule an available time according to Aaron and Evan’s
school and sport schedule. Once booked, the clients would then rent a moving truck and pick
both of them up and watch them get to work. So, the only network they had back then was a
beeper, telephone, and word of mouth.
5. 5
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
From 2005 to 2015, Meathead Movers has expanded its locations along the west coast of
California. They opened several offices from Fresno, CA to Camarillo, CA, and even a storage
facility in San Luis Obispo, CA. Now having over 80 computers on their network and over 100
employees using them every day, the need for faster servers and larger bandwidths has arrived.
As Meathead Movers expanded, so did their need for information systems. Meathead
Movers has adopted several systems, such as, Customer Relationship Management (CRM),
Business to Business (B2B), and Transaction Processing System (TPS). By utilizing these three
systems, Meathead Movers has been able to grow successfully as a company, and will continue
to do so.
Information Systems
As for any small business, being able to implement a quality and effective information
system can be the difference between success and failure. However, without a properly trained
staff, any information system regardless of how great it is can cause epidemic failure. In order to
decide which information system to use, Meathead Movers has what is called a testing phase.
The testing phase is an extensive process where the company reality tests an information system
to find out the pros and cons of each system. After the testing phase is complete, all data will be
complied and company executives decide whether or not to implement an information system.
Below are just a few of the information systems that have passed the testing phase and were
implemented to become part of the company.
6. 6
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
One information system that Meathead Movers utilizes, which is considered the most
important, is called Meathead Movers Operation Management V2.0 (MOMM2). MMOM2 is the
heart of the company when it comes to a CRM information system. The program was originally
created and designed by Co-Founder, Evan Steed, to be a basic way to track upcoming services.
However, after realizing how it could be used to serve as a not just a service tracker, but also a
CRM, Evan created a multifunctional program capable of; creating services, updating and
tracking current and future services, e-mailing clients pertinent information about their move,
automatically notifying management of service completion, tracking consumer reviews, and
providing management with a live status of day to day operations.
In order to have a successful business, there must be some sort of TPS in play. Since
Meathead Movers offers a service at a cost, they must have a way to process transactions. Due to
the wide variety of payments customers use, Meathead Movers has decided to accept all forms of
payment. Of course, this means that some forms of payment, mainly credit cards, come at a cost
to process. Also, employees must be properly trained on how to accept all forms of payment,
especially credit cards. To cut down costs, Meathead Movers uses an imprint carbon copy
machine to capture credit card payment information. Although this system works, it comes with
many issues such as; customer card information being recorded on paper, it is possible for an
employee to lose this copy opening up the client to theft or fraud, old technology compared to
other companies, payment has to be called in after copy is taken, if services completed late in the
day then payment doesn’t go through until next business day, and requires employees to carry
the machine and blank carbon copies. As the company grows larger, this is an area that will need
great improvement in order to ensure future success.
7. 7
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
A major key factor to a successful moving company is having the right tools for the job.
Some of the tools and products required to complete a service have to be purchased, and others
can be created through proper training. This brings up a third information system called B2B,
which Meathead Movers uses to purchase products from other companies at wholesale to be
resold to clients for profit. In order to utilize a B2B system properly, Meathead Movers uses
MMOM2 to keep an accurate inventory of all supplies. When a certain product gets low in
supply, MMOM2 automatically sends an alert notification to operations to order more. From
there, an operation’s employee will submit, through MMOM2, a purchase order (PO) for
whichever product is called for. This has been extremely successful in maintaining product stock
in order to prevent customer failure.
As previously stated, without a properly trained staff there can be failure, regardless if an
information system passed the testing phase. Meathead Movers has one of the best employee
training systems used by any moving company, called Meathead University (MHU). MHU was
designed as a training tool that was easy to understand and operate by anyone. Similar to
MMOM2, MHU was designed by Evan Steed and created as an intranet site that is only
accessible by Meathead Movers employees, on Meathead Movers servers. Also known as “The
Meathead Wiki” to employees, this site contains all information vital to train employees on all
job functions. However, like MMOM2, MHU requires routine maintenance and updates in order
to maintain functionality. This maintenance is completed by the software engineering team, also
led by Evan Steed, weekly and monthly to ensure operational success.
Of course, as Meathead Movers grows as a company, technology will begin to improve
which means that the company will need to continue to evaluate how each information system is
operating. Although every information system went through an intense testing phase, every year
8. 8
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
each information system get reviewed again and compared with new possible systems. Once
again, after all the testing is done, the data is sent up to management and decided on whether or
not the information system has proven to remain effective, or obsolete. Even though it is highly
unlikely, there is a possibility that every information system could be completely replaced at one
time.
9. 9
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
Section2: InformationSystems Concepts
Networks
When it comes to using networks, Meathead Movers has a couple choices as far as what
they can utilize to best fit their needs. Although a network is a system of computers or other
devices that are connected to each other, how are they connected? Commonly, computers or
other devices are connected via a Local Area Network (LAN) or a Wide Area Network (WAN).
Local Area Networks (LAN)
One of the more common of the two network systems is going to be a LAN system. A
LAN can be connected through cable or wirelessly, such as Ethernet or Wi-Fi. While a user is
connected via “Wi-Fi”, it is now referred to as a Wireless Local Area Network (WLAN).
However, computers connected via an Ethernet cable can usually transfer data quicker than a
wireless connection. Unfortunately, using a LAN will limit the user’s network to a small area.
Due to the area restrictions, a LAN is commonly used in the home, schools, and even small
businesses. These restrictions are based on equipment limitations, such as length of Ethernet
cable or range of a Wi-Fi signal.
Wide Area Network (WAN)
Although a LAN is restricted by a small network area, one could still connect to other
LANs via telephone lines and radio waves. This is referred to as a WAN, which is typically used
for large businesses, online schools, and even the internet. A WAN can bridge the gap between a
company that has two or more LANs, and would like to connect together. By utilizing a WAN, a
10. 10
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
company can virtually connect and transmit data from anywhere on the planet. This can be
extremely useful for companies that have branches in all parts of the world.
LAN vs. WAN
Some of the obvious differences between a LAN and a WAN are the size capabilities.
However, another major difference is the performance capability. Hands down the quickest
connection will be a LAN, up to 30x faster, due to less distance for data to travel. Just like cars
on roads, data still has to travel when it is asked for. So, it only makes sense that a larger
network, such as a WAN, will take longer to transfer data than a smaller LAN. Another major
difference is going to be the cost between a LAN and a WAN. A LAN is usually relatively cheap
due to being easier to setup and requiring less equipment. Also, a LAN can require a lot less
advanced infrastructure to keep it running.
Wi-Fi and Telecommuting
Most employers will require their employees to work in the company building or on the
job site. However, some companies will allow their employees to work from home or another
place that may be more convenient for them. Some employees will even travel while working
and need to use wireless meansto work.These methodsof workcan be accomplishedviaaWi-Fi
connection,orthroughTelecommuting.Bothof whichare verycommonand will become more common
inthe future ascompaniesgrowandexpandwithtechnology.
Wi-Fi
As previous stated, Wi-Fi can also be described as a Wireless Local Area Network
(WLAN). This network is becoming more popular not only in the business environment but also
11. 11
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
in the home as well. Wi-Fi allows multiple users to connect to one network, without all the
clutter of cables since it connects via radio waves to what is called a router. Although this
method may not always be the fastest connection compared to an Ethernet cable, it is still very
fast.
One issue that may arise with Wi-Fi is security. With an Ethernet cable, all your
information is going through a wired cable from computer to network. However, with Wi-Fi, a
computer now connects via radio waves to a network that anyone else, that’s looking, can see. A
way users can combat this issue is by using a Wi-Fi password in order for someone to access
your network. Although password protecting your network doesn’t 100% guarantee your safety,
it sure helps reduce the risk of someone else accessing your information that shouldn’t be.
Telecommuting
A way employers utilize a WAN, is by allowing employees to work via telecommuting.
Telecommuting is the process of working through phones, e-mail, and internet. Although not all
jobs are able to utilize telecommuting, it can be a great benefit to those that do. A reason for
telecommuting could be; if an employee that works with software decides to relocate across the
country and the company is willing to allow work to be completed via email. Projects will still be
completed, the employee will still have a job and the employer doesn’t have to hire a new
employee and start from scratch.
A major problem with telecommuting is the lack of face to face interaction. This can be a
major problem if discipline is needed to be given, due to not being able to properly instill the
seriousness of the infraction via a phone call. Also, accountability is hard to keep up with if you
12. 12
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
don’t see the employee everyday to track if they are actually working every day or taking a few
days here and there off.
What’s Best For Us?
When Meathead Movers opened up their first branch, all that was needed was a LAN.
This system was setup in a rather small office and had 1 computer connected via cable. However,
upon opening several branches throughout California, Meathead Movers now utilizes a WAN.
They do this by renting a line from a service provider and using their network to stay connected.
This allows estimators to telecommute and go out to jobs, get all the information needed, go
home and set up all the paperwork needed for a quote, submit everything through MMOM2 for
approval, and finally an e-mail will be sent to the customer to set up a date for their services.
Although a WAN can be a lot slower than a LAN and more costly, the ability to have all
branches connected together is worth the slower network speeds and price.
13. 13
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
Section3: Business Information Systems
Management Information System (MIS)
In order to effectively manage data, a company needs to be able to pull reports about
various aspects of the operation. The way this is done is through a type of Management
Information System (MIS). A MIS is a computerized database of information organized and
programmed in such a way that it produces regular reports on operations for every level of
management in a company (Inc., 2015). Simply put, a MIS organizes data so that a company can
analyze it, convert it into information, and then gain knowledge and improve the company.
Why would this be an important asset for a company to acquire? Here’s an example of
how Meathead Movers uses their MIS: Every week a report on employee hours is generated, this
report shows which employees are getting overtime each week and which employees are not.
Many times one employee, we will call employee A, will have an exceptional amount of
overtime compared to others. This data is analyzed by the Operation’s Supervisor (OS), which
grants information saying that employee A is working too much, now the OS has knowledge of
employee A being over worked and will reduce the number of long jobs employee A will get the
next week. This will then allow hours to be spread out more evenly, which mean less overtime is
paid, and since Meathead Movers is a very physically demanding job, it gives employee A much
needed rest to reduce work related injuries.
As previously stated, MMOM2 is a part of Meathead Movers CRM and also plays a
number of roles in the success of the company, so it is no surprise that MMOM2 is also the
companies MIS. Another way that MMOM2 is used as a MIS, is monitoring the inventory of the
company to provide accurate and up to date information on when supply is low. When inventory
14. 14
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
of a certain items gets below 60% of maximum stock, an exception report is generated and sent
to the OS for immediate attention. Although inventory is regularly ordered on a weekly basis,
there are instances where a client will request more boxes than estimated for, this will cause an
unforeseen drop in inventory and can cause the exception report. This exception report will allow
the OS to decide whether or not a separate order needs to be placed depending on projected
supply and demand.
There are many different ways a company can fail; low customer satisfaction,
overspending, lack of inventory, negligence of poor employee performance, and ignoring
possible signs of work related injuries happening. However, one way to help reduce the
possibility of company failure is to have an effective MIS. As a growing company Meathead
Movers is continually learning and changing their MIS so that it can provide the best up to date
reports to help prevent future company failure.
DecisionSupport System (DSS)
A Decision Support System (DSS) is a lot like a MIS in the respect that it processes data
and can generate reports. However, a DSS is far more advanced than a MIS and can help analyze
the data and process it into information so that the consumer can use this information to gain
knowledge, which assists in decision making. Although a DSS doesn’t actually make the
decision, it does provide a great deal of flexibility in getting computer support for decision-
making activities (Principles of Information Systems, eBook, 2015).
For now, Meathead Movers still utilizes MMOM2 as a MIS due to the fact that it works
well for them. However, there is a possibility that with how quickly the company is expanding,
they will soon need some sort of DSS program to help with decision making. As far as a current
15. 15
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
model of DSS, Meathead Movers still has monthly meetings to analyze reports and make
important decisions with executives. This method, although a little old fashioned, still works well
as it keeps employees involved to gain real life input as opposed to a computerized analysis.
Transaction Processing System (TPS)
Any business that provides a service or sells merchandise must have some sort of
Transaction Processing System (TPS). A TPS is a way a company can interact with a customer
or other company either by ordering, billing, employee payroll, or even order tracking (Principles
of Information Systems, eBook, 2015). Although order tracking is primarily used with certain
companies such a parcel shipping and even pizza delivery companies, it still serves as a very
important TPS for those companies success. However, a TPS is pretty much just a basic system
that doesn’t provide much support like a MIS or assist with decision making like a DSS. None
the less, without some sort of TPS, companies would not be able to provide the services needed
to be successful.
In order for a TPS to be successful, a company must first understand how to use a TPS
effectively. A TPS can take data, such as services rendered, and put it together in the form of
information on an invoice, which can then be sent to the customer who will gain knowledge of
what exactly was down and the cost of the service. This is extremely important when providing
services where a company charges by time increments and also materials cost. If Meathead
Movers were to just tell customers “You owe $500” and provide no invoice or breakdown of
cost, there would be a lot of issues. However, Meathead Movers provides a very detailed copy of
the customer order which explains the time the service was started and completed, any materials
that were used, how much time it took to travel from origin to destination, and even a break
down section which shows hourly rates and overtime rates.
16. 16
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
Due to having a successful TPS, customers of Meathead Movers are rarely confused on
what they were charged for, and have a clear representation of what went on during the service.
This has attributed to customers having a positive experience with the company and sharing their
experience with friends and family, which ultimately leads to more business. Without an
effective TPS, a company can easily cause frustration not only to customers, but to employees as
well since the employees are the first line of communication between the customer and the
company. Even though Meathead Movers currently has an effective TPS, as they grow as a
company, there will always be room for improvement which can be said about any company.
Artificial Intelligence (AI)
Artificial Intelligence (AI) is very advanced software that allows a machine to
demonstrate some sort of intelligence. When most people think of AI, they think of scary robots
taking over the earth, or big fancy expensive computers talking with people however, AI is also
demonstrated in GPS devices, like your smart phone.
When using your smart phone or GPS devices to direct you to a location, it makes
intelligent decisions based on your current location. If you ended up making a wrong turn, your
GPS will recalculate and tell you how to get back on track. This is done by taking real time data
from your location and transmitting it through satellites to provide information on the correct
route to take, which is then converted to knowledge to the user through a turn by turn directory.
Meathead Movers doesn’t use fancy robots that move furniture for them, or talking
computers that run day to day operations all by themselves however, every driver uses some
form of GPS to guide them from the moment they leave the warehouse, to the moment they
return. Although this form of AI isn’t extraordinarily advanced, it still serves as a very important
17. 17
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
key to company success. Without some form of GPS, crews would not arrive to services on time,
which would cause customer dissatisfaction, which would lead to bad reputation, and ultimately
cause company failure.
Another way that Meathead Movers utilizes a form of AI is through MMOM2, via
location consideration. For example; when a service is entered into the system, the zip code is
also entered into the DBMS. The reason for this, is when a crew goes out to a service in a certain
area and discovers a road that is not maintained by the city and has very low hanging trees, a
location consideration is then input for future reference, this is so that the company can dispatch
a smaller truck which will fit to better service the customer. Data entered into MOMM2 is saved
so that the system can automatically alert operations via AI, so that a smaller truck will be
dispatched from the start. Although this isn’t very advanced AI, it is still a form of intelligence
that is demonstrated by MMOM2 to assist in company success.
18. 18
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
Section4: System Development
Customer Tracking System
As Meathead Movers continues to expand, a new and improved Customer Tracking
System will be needed in order to ensure success. Customer Tracking Systems, which can also
be referred to as Customer Relationship Management (CRM), are implemented in order to assist
companies with keeping data in a centralized system for easy accessibility. CRMs can also
perform a number of functions to help with day to day operations as well, such as; calendaring,
email management, log web traffic, sales tracking, reporting, and of course account management.
One of the greatest reasons for utilizing a CRM is the fact that it is typically all web-based via a
LAN or WAN. Why is this important though? As a company begins to grow, expand, or improve
technologically, they will need a more efficient way of handling data. For example, if a sales
representative for Meathead Movers books a job for branch A but it needs to be serviced out of
branch B due to the destination location, to save on costs, all of the data that was input for the
service will need to be available to branch B. In order for this to happen, without an effective
CRM, all of the paperwork will need to be physically taken from branch B to Branch A. Now,
this is not very effective, however with an effective CRM all of the data for the service can
instantly be available between any of the branches at anytime.
Currently, Meathead Movers is utilizing Meathead Movers Operational Management
v2.0, which does a very good job managing data and other operational tasks. However, with
future expansion and growth, the company will need a new Customer Tracking System to assist
with providing structured and centralized customer data on a web-based platform. In order to
decide on what system should be used, Meathead Movers first has to take a few things into
19. 19
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
account: 1) What will the requirements be for the new system? 2) What kind of budget is going
to be available? 3) How much time will be needed to create the new system? 4) Do we know
everything we want out of the system, or are we unsure? These questions will be very valuable in
determining not only what system to go with but how the system will be developed. These are
several different types of ways systems are developed. We will be looking at two, which include,
the Waterfall Model and Prototype Model.
Waterfall Model
A Waterfall Model is a sequential software development process model that follows a
certain phase process. It is called a Waterfall Model because it continues to progress downward
(Techopedia, 2015). This method is often used when a company knows exactly what they need
and the requirements needed to achieve results. Waterfall Model style development is one of the
most common ways systems are developed, they are very straight forward and often less costly
than other methods. However, this method does not allow much room for adjustments or changes
as any changes later on will cause a need to start all over since each phase has to be completed in
order to move on to the next. For this reason is why companies must know exactly what they
want so that developers do not have to waste time redoing work which leads to higher cost.
Think of it as building a foundation for a 1 story house, then after it is built deciding you want to
make a skyscraper. The current foundation will never hold, thus it will need to be completely
redone and the whole project will need to start from the beginning again. Of course, this is a very
severe example!
Prototype Model
A Prototype Model is essentially a product that is not based on strict planning but acts as
an early approximation of the final product or system (Penna Sparrow, 2015). In other words, a
20. 20
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
company states a general idea of what they want, then a software developer takes that idea and
creates a prototype, the company then gives feedback if they like it or not, and then the process is
repeated until a final product emerges. Through a prototype process, the customer is typically
more involved and doesn’t generally know the exact requirements, unlike the waterfall process.
However, using a Prototype Model can be more costly and require more time to create.
Creating MMOM3
Now that we know a couple different processes used in developing software, Meathead
Movers has decided that we know exactly what we want as far as requirements for our new
CRM. Since we know the exact requirements, we will be using the Waterfall Model process. By
using the Waterfall Model, we will be going phase by phase in a downward progression. Each
phase will be extremely important and must be completed before moving on. There will be 5
phases in creating our new software; Software Requirement Specifications (SRS), system and
software design, implementation and unit testing, integration and system testing, operation and
management.
Software Requirement Specifications (SRS)
During this phase, Meathead Movers will sit down with the developer and describe, in as
much detail as possible, the exact requirements the system will need. This phase is very
important, like the example of the foundation I described earlier, if we don’t get this correct,
there is a possibility that we will need to go back and start from the beginning. However, if done
correctly everything else should fall into place and a final product will be something to look
forward to that should meet all expectations.
21. 21
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
System and Software Design
Once all the requirements have been stated, developers take the SRS and begin designing
the system. After the system has been designed, software and hardware can then be designed to
create a fully functioning system. Design phase takes everything from the SRS and creates a
mould of what and how the system will be. This is pretty much the walls and structure of the
house, on top of the foundation.
Implementation and Unit Testing
Now that a system and software has been designed, coding will be needed in order for the
software and system to work properly. If there are no issues and the system and software is
implemented effectively, the unit will then be tested. This is the phase that the developer will
make sure there are no defects and that everything will function properly. We can think of this as
adding in the electrical, plumbing, flooring, windows, etc. into the house and the developer
making sure it all works.
Integration and System Testing
After thorough testing done by the developer, it will then be presented to the customer for
approval. The company will then take the completed software and decide if it meets all of their
requirements. In order to decide if it meets requirements, testing will be done. After testing is
completed, a test report will be generated which will, hopefully, lead to the final phase. This can
be considered the building the walk-through or inspection done by the building management
team.
22. 22
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
Operation and Maintenance
Since everything went well with testing and the developer has decided the software meets
all of Meathead Movers requirements, the product is then sent to Meathead Movers. Once
Meathead Movers has used the product, we will then decide if any changes needed to be made
and will send them to the developer. Let’s be honest, nobody buys a house without first doing a
walk-through. Consider this phase as making sure everything is how you want it, which
hopefully it is because if it isn’t, prepare for an uncomfortable conversation and more time and
money needed to go back and make changes!
23. 23
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
Section5: InformationSystems andSociety
Information System Security
As important as it is to create an effective information system, protecting it is equally
important. Cyber crimes are becoming a very real thing for companies to worry about, especially
with most companies operating on networks. Although Meathead Movers is still a relatively
small company, there are still major risks to be considered. In order to properly protect against
these risks, Meathead Movers must first identify which of these risks are worth protecting
against, and which are more than likely not a threat.
Types of Cyber Crimes
Cyber crimes can range from very severe, to simply a slight annoyance. None the less, as
a business grows these crimes must be addressed as they can all have a great impact on the
company. Some of these crimes include; hacking, malware, theft, and phishing. While some of
these crimes can require little to no information needed about the company, some require a direct
connection to full information. Although there is no guarantee that cyber crime can be prevented
100%, there are ways a reducing the likelihood of an attack. The following will describe in detail
about each of the previously stated crimes and how to possibly reduce risk and even get pretty
close to preventing them from happening.
Hacking
One of the many ways a cyber crime is committed is through hacking. Hacking is the use
of a computer to gain unauthorized access to data in an information system (Vandercreek, 2015).
Hacking is generally performed by a person, known as a hacker. However, there are several
types of hackers, some good and some bad. Ethical hackers, or white hat hackers, typically don’t
24. 24
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
want to harm a company; instead they just want to inform a company of their vulnerabilities and
how to strengthen company security. Unfortunately there is a reason that there are ethical
hackers, and that is because there are also criminal hackers. Criminal hackers, or black hat
hackers, generally want to steal information from a company, cause harm to data or files, or
attempt to just cause a scare. One way you can protect from black hat hackers is to maintain a
firewall. A firewall is pretty much a gate guard for your network, meaning anything coming
through the network is monitored for safety. Meathead Movers uses Microsoft’s firewall to
protect them from possible threats. So far Meathead Movers has yet to encounter any problems
with hackers trying to access their network, however by maintaining a firewall the company can
feel a little bit safer.
Malware
Malicious software that is installed without you adequate consent, is known as Malware
(Microsoft, 2015). Malware can be used to gain access to or damage a computer system by
forcing the user to download software. Common forms of malware include; keyloggers, viruses,
worms, and spyware. One of the easiest ways to prevent malware from being downloaded is to
train your workforce on being careful what they open or click on. Many people encounter
malware by clicking on an ad or opening an e-mail. Since humans due make mistakes, Meathead
Movers uses several methods to reduce the possibility of a malware attack such as; Microsoft
firewall, Malwarebytes, and regularly scans all information systems using Microsoft Safety
Scanner.
Theft
A major risk companies need to look out for is theft. Theft can be either physical theft or
virtual theft. Physical theft refers to the taking of company property that contains information,
25. 25
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
such as stealing a computer or flash drive. However, virtual theft pertains to stealing company or
employee information or data via hacking, malware, viruses etc. A major issue Meathead Movers
faced with theft is physical theft. In order to adhere to vehicle insurance requirements for their
trucks, cameras had to be installed; which recorded any incidents on to a microSD card. Even
though these cameras were just to provide assistance in case of an accident, some employees
were getting in trouble for being recorded doing activities that were against company policy. Of
course, employees did not like this so they would steal the microSD cards, in an effort to prevent
getting in trouble. So to prevent this theft from happening, Meathead Movers installed lock
boxes on all cameras which required a key to open that only managers had. By implementing
previous stated security measures, Meathead Movers has been able to reduce the possibility of
virtual theft of company information and also employee data. However, Meathead Movers
recommends all employees invest in some sort of identity theft protection such as LifeLock.
Also, checking your credit report regularly will alert individuals early on of any suspicious
activity (Consumer.gov, 2015).
Phishing
Phishing is using a fraudulent e-mail, website, or phone call in order to steal money or
personal information. Most of the time users will see e-mails claiming to be companies asking
for account information to be verified. However, at Meathead Movers it was very common to
receive automated phone calls asking for banking information. Phishing for information can be
very serious because it can open a company up to multiple risks such as; identity theft, unknown
access to employee information, company bank accounts, important e-mails, and company social
media pages where slander can be posted. Some ways to prevent phishing is, of course, don’t fall
for phishing attempts. Microsoft has a great post of how to recognize phishing attempts and also
26. 26
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
how to report them. Meathead Movers uses this reference to train employees, who have access to
information systems, on preventing phishing attempts.
Conclusion
Although there is no way to completely guarantee cyber crime will never happen to a
company, there are ways to help reduce risk. Hacking, malware, theft, and phishing are only a
few of the different types of cyber crime however, reducing the likelihood of these four types
will greatly increase the possible future success of a company. Some of the biggest ways a
company can help prevent cyber crimes is simply training their workforce to pay attention to
what content they are accessing. Also, keeping up a solid firewall, effective anti-virus software,
and regularly scanning for threats will help reduce risk.
27. 27
RunningHead:IT190 KEY ASSIGNMENT IT190 KeyAssignment
References
Jeremy Scriven (Personal Communication, May, 2015) Quality Control Manager, Meathead
Movers, Inc.
Benjamin Spielman (Personal Communication, May, 2015) Camarillo, CA Branch Manager,
Meathead Movers, Inc.
Evan Steed (Personal Communication, May, 2015) Co-Founder, Meathead Movers, Inc.
Meathead Movers, Inc. (2015)
Retrieved from www.meatheadmovers.com/our-team/history.aspx and
www.Wiki.MeatheadMovers.com (intranet site)
Ralph Stair & George Reynolds (2011) ebook, Principles of Information Systems, 10th edition
Retrieved from http://wow.coursesmart.com/
Penna Sparrow (2013) Waterfall Model of SDLC
Retrieved from http://www.ianswer4u.com/2011/11/waterfall-
model.html#axzz3dBsEYcif
Techopedia (2015)
Retrieved from http://www.techopedia.com/
Microsoft Corporation (2013-2015) Safety & Security Center
Retrieved from https://www.microsoft.com/security/default.aspx
Vandercreek, C. (May, 2015). Chat 9 & 10
[Chat]. Retrieved from Colorado Technical University, Virtual Campus:
https://campus.ctuonline.edu