SlideShare a Scribd company logo
1 of 3
BIS 320 Week 5 Applying Information Security and SDLC
Link : http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/
Sample content
Information Security
BIS/320
Information Security
Kroenke, D.M. (2012) states that SDLC or Systems development life cycle is a
conventional method of information systems development. To survive in the
market, Amazon Corporation have put major thrust on areas like research,
development and building new information systems. SDLC process comes in
different versions with varying number of steps. Some go for the eight step process
while few prefer the seven step process. Another variation is the five step process
which includes the following stages: System definition, Requirement analysis,
Component design, Implementation and Maintenance.
There is a subtle difference between a disaster and a threat. Heavy physical loss
of computing machinery due to natural causes, assault or terrorist attacks come
under the category of Disasters. Threats cover issues arising from human errors,
malicious illegal acts and natural disasters. An instance of human error would be
an unintentional or intentional shredding of data by employees. Events like a
twister or flood beyond human control can disable all computing services
indefinitely. With all these factors established, it is important to consider the steps
to be taken in preparing for disasters ahead of development of plans (Kroenke,
“Information Security Management,” 2012). The SDLC process which has been so
strictly and exhaustively followed by Amazon can be used as a standard operating
procedure for application development by other organizations.
The first and foremost condition for being prepared in case of disasters is to locate
facilities in geographical positions which are beyond natural and human attacks.
Next important step is identification of systems and resources that are necessary to
get the business rolling. Having a secondary backup facility that can function at
quick intimation at times of threats is recommended. Exposure to the secondary
facility working conditions and its functioning to the employees are needed so they
can run these backup facilities immediately after any disaster (Kroenke,
“Information Security Management,” 2012).
Amazon can afford having their business data backed up in secure servers as they
are the makers of virtual servers that are intended for the exact functionality
purposes. Their product that does this is Amazon EC2 and this eliminates the need
to outsource data backup. All these can be performed within the premises of
Amazon. They also have the capabilities to have protected data centers anywhere
in the United States or globally. Another feature of the servers of Amazon is the
“availability zones” for data within data center facilities which can restrict the
damage to limited areas in case of breakdowns. Globally these centers are
positioned in groups. At times of failures, the data transfer takes place from the
impacted zone to the nearest safe zone. The high traffic is managed by balancing
the load in the rest of the centers.
An Incident Management team is assigned to take responsive actions in case of
emergencies. The main function of this team is to constantly survey the company
owned and rented virtual servers. Their personnel carryout this supervision task 24
hours every single day of the year. They are ready to quarantine incidents and take
immediate action. This complete monitoring activity keeps a check on essential
operational metrics. Whenever a limiting value of a parameter is reached on
important functioning systems, a notification is sent to staff in charge of operations
and management. A thorough documentation of the series of events during such
incidents helps make the job of the personnel easy. Conferencing system having
restrictive access and effective communication features can be of valuable
assistance when there is a need for collaboration. Amazon has a dedicated team of
skilled call leaders to ensure smooth systematic collaboration (Amazon, May
2011).
In order to expand their existing business functions and goals, and employment of
new information systems, Amazon can analyze these aspects exhaustively. In the
SDLC process, the first stage is concerned with identifying and listing the
applications as part of systems planning. Also, this is the stage where the business
stands to gain the most through development. In the subsequent stage, system
analysis helps to define the problem statement in hand. The requisites for the
business to set up an improved and optimized information system are realized. In
the systems design stage, decisions regarding the techniques of integrating
technical solutions with business needs are taken as per the conclusions from the
systems analysis stage. As the company continues down the SDLC process flow, it
would come to the implementation level where the prototypes of the improvised
system are put in operation and observe the outcomes. These stages work in
unison for the systems support to sustain and hold the systems for the rest of the
life cycle (Geerts, G.L., McCarthy, W.E., & Rockwell, S.R., 1996). As far as
application development is concerned, Amazon has set a standard with the strict
adherence to the systematic SDLC process covering in detail all stages. In the field
of a
http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/

More Related Content

Viewers also liked (8)

Adsensus_onePager_dark
Adsensus_onePager_darkAdsensus_onePager_dark
Adsensus_onePager_dark
 
DevOps Jump Start
DevOps Jump StartDevOps Jump Start
DevOps Jump Start
 
قانون 96 لسنه 2015
قانون 96 لسنه 2015قانون 96 لسنه 2015
قانون 96 لسنه 2015
 
Curriculum impresiones finas
Curriculum impresiones finasCurriculum impresiones finas
Curriculum impresiones finas
 
Continuous Deployment & Delivery + Culture Hacks @ QCON 2012
Continuous Deployment & Delivery + Culture Hacks @ QCON 2012Continuous Deployment & Delivery + Culture Hacks @ QCON 2012
Continuous Deployment & Delivery + Culture Hacks @ QCON 2012
 
Yam
YamYam
Yam
 
Evonik Supply Chain Visibility Presentation - Elemica Executive Luncheon
Evonik Supply Chain Visibility Presentation - Elemica Executive LuncheonEvonik Supply Chain Visibility Presentation - Elemica Executive Luncheon
Evonik Supply Chain Visibility Presentation - Elemica Executive Luncheon
 
Corona effect, corona ring and any other topics
Corona effect, corona ring and any other topicsCorona effect, corona ring and any other topics
Corona effect, corona ring and any other topics
 

Recently uploaded

An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

BIS 320 Week 5 Applying Information Security and SDLC 2015 version

  • 1. BIS 320 Week 5 Applying Information Security and SDLC Link : http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/ Sample content Information Security BIS/320 Information Security
  • 2. Kroenke, D.M. (2012) states that SDLC or Systems development life cycle is a conventional method of information systems development. To survive in the market, Amazon Corporation have put major thrust on areas like research, development and building new information systems. SDLC process comes in different versions with varying number of steps. Some go for the eight step process while few prefer the seven step process. Another variation is the five step process which includes the following stages: System definition, Requirement analysis, Component design, Implementation and Maintenance. There is a subtle difference between a disaster and a threat. Heavy physical loss of computing machinery due to natural causes, assault or terrorist attacks come under the category of Disasters. Threats cover issues arising from human errors, malicious illegal acts and natural disasters. An instance of human error would be an unintentional or intentional shredding of data by employees. Events like a twister or flood beyond human control can disable all computing services indefinitely. With all these factors established, it is important to consider the steps to be taken in preparing for disasters ahead of development of plans (Kroenke, “Information Security Management,” 2012). The SDLC process which has been so strictly and exhaustively followed by Amazon can be used as a standard operating procedure for application development by other organizations. The first and foremost condition for being prepared in case of disasters is to locate facilities in geographical positions which are beyond natural and human attacks. Next important step is identification of systems and resources that are necessary to get the business rolling. Having a secondary backup facility that can function at quick intimation at times of threats is recommended. Exposure to the secondary facility working conditions and its functioning to the employees are needed so they can run these backup facilities immediately after any disaster (Kroenke, “Information Security Management,” 2012). Amazon can afford having their business data backed up in secure servers as they are the makers of virtual servers that are intended for the exact functionality purposes. Their product that does this is Amazon EC2 and this eliminates the need to outsource data backup. All these can be performed within the premises of Amazon. They also have the capabilities to have protected data centers anywhere in the United States or globally. Another feature of the servers of Amazon is the “availability zones” for data within data center facilities which can restrict the damage to limited areas in case of breakdowns. Globally these centers are positioned in groups. At times of failures, the data transfer takes place from the impacted zone to the nearest safe zone. The high traffic is managed by balancing the load in the rest of the centers.
  • 3. An Incident Management team is assigned to take responsive actions in case of emergencies. The main function of this team is to constantly survey the company owned and rented virtual servers. Their personnel carryout this supervision task 24 hours every single day of the year. They are ready to quarantine incidents and take immediate action. This complete monitoring activity keeps a check on essential operational metrics. Whenever a limiting value of a parameter is reached on important functioning systems, a notification is sent to staff in charge of operations and management. A thorough documentation of the series of events during such incidents helps make the job of the personnel easy. Conferencing system having restrictive access and effective communication features can be of valuable assistance when there is a need for collaboration. Amazon has a dedicated team of skilled call leaders to ensure smooth systematic collaboration (Amazon, May 2011). In order to expand their existing business functions and goals, and employment of new information systems, Amazon can analyze these aspects exhaustively. In the SDLC process, the first stage is concerned with identifying and listing the applications as part of systems planning. Also, this is the stage where the business stands to gain the most through development. In the subsequent stage, system analysis helps to define the problem statement in hand. The requisites for the business to set up an improved and optimized information system are realized. In the systems design stage, decisions regarding the techniques of integrating technical solutions with business needs are taken as per the conclusions from the systems analysis stage. As the company continues down the SDLC process flow, it would come to the implementation level where the prototypes of the improvised system are put in operation and observe the outcomes. These stages work in unison for the systems support to sustain and hold the systems for the rest of the life cycle (Geerts, G.L., McCarthy, W.E., & Rockwell, S.R., 1996). As far as application development is concerned, Amazon has set a standard with the strict adherence to the systematic SDLC process covering in detail all stages. In the field of a http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/