SlideShare a Scribd company logo
1 of 3
BIS 320 Week 5 Applying Information Security and SDLC
Link : http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/
Sample content
Information Security
BIS/320
Information Security
Kroenke, D.M. (2012) states that SDLC or Systems development life cycle is a
conventional method of information systems development. To survive in the
market, Amazon Corporation have put major thrust on areas like research,
development and building new information systems. SDLC process comes in
different versions with varying number of steps. Some go for the eight step process
while few prefer the seven step process. Another variation is the five step process
which includes the following stages: System definition, Requirement analysis,
Component design, Implementation and Maintenance.
There is a subtle difference between a disaster and a threat. Heavy physical loss
of computing machinery due to natural causes, assault or terrorist attacks come
under the category of Disasters. Threats cover issues arising from human errors,
malicious illegal acts and natural disasters. An instance of human error would be
an unintentional or intentional shredding of data by employees. Events like a
twister or flood beyond human control can disable all computing services
indefinitely. With all these factors established, it is important to consider the steps
to be taken in preparing for disasters ahead of development of plans (Kroenke,
“Information Security Management,” 2012). The SDLC process which has been so
strictly and exhaustively followed by Amazon can be used as a standard operating
procedure for application development by other organizations.
The first and foremost condition for being prepared in case of disasters is to locate
facilities in geographical positions which are beyond natural and human attacks.
Next important step is identification of systems and resources that are necessary to
get the business rolling. Having a secondary backup facility that can function at
quick intimation at times of threats is recommended. Exposure to the secondary
facility working conditions and its functioning to the employees are needed so they
can run these backup facilities immediately after any disaster (Kroenke,
“Information Security Management,” 2012).
Amazon can afford having their business data backed up in secure servers as they
are the makers of virtual servers that are intended for the exact functionality
purposes. Their product that does this is Amazon EC2 and this eliminates the need
to outsource data backup. All these can be performed within the premises of
Amazon. They also have the capabilities to have protected data centers anywhere
in the United States or globally. Another feature of the servers of Amazon is the
“availability zones” for data within data center facilities which can restrict the
damage to limited areas in case of breakdowns. Globally these centers are
positioned in groups. At times of failures, the data transfer takes place from the
impacted zone to the nearest safe zone. The high traffic is managed by balancing
the load in the rest of the centers.
An Incident Management team is assigned to take responsive actions in case of
emergencies. The main function of this team is to constantly survey the company
owned and rented virtual servers. Their personnel carryout this supervision task 24
hours every single day of the year. They are ready to quarantine incidents and take
immediate action. This complete monitoring activity keeps a check on essential
operational metrics. Whenever a limiting value of a parameter is reached on
important functioning systems, a notification is sent to staff in charge of operations
and management. A thorough documentation of the series of events during such
incidents helps make the job of the personnel easy. Conferencing system having
restrictive access and effective communication features can be of valuable
assistance when there is a need for collaboration. Amazon has a dedicated team of
skilled call leaders to ensure smooth systematic collaboration (Amazon, May
2011).
In order to expand their existing business functions and goals, and employment of
new information systems, Amazon can analyze these aspects exhaustively. In the
SDLC process, the first stage is concerned with identifying and listing the
applications as part of systems planning. Also, this is the stage where the business
stands to gain the most through development. In the subsequent stage, system
analysis helps to define the problem statement in hand. The requisites for the
business to set up an improved and optimized information system are realized. In
the systems design stage, decisions regarding the techniques of integrating
technical solutions with business needs are taken as per the conclusions from the
systems analysis stage. As the company continues down the SDLC process flow, it
would come to the implementation level where the prototypes of the improvised
system are put in operation and observe the outcomes. These stages work in
unison for the systems support to sustain and hold the systems for the rest of the
life cycle (Geerts, G.L., McCarthy, W.E., & Rockwell, S.R., 1996). As far as
application development is concerned, Amazon has set a standard with the strict
adherence to the systematic SDLC process covering in detail all stages. In the field
of a
http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/

More Related Content

Viewers also liked

Viewers also liked (8)

Curriculum impresiones finas
Curriculum impresiones finasCurriculum impresiones finas
Curriculum impresiones finas
 
DevOps Jump Start
DevOps Jump StartDevOps Jump Start
DevOps Jump Start
 
Continuous Deployment & Delivery + Culture Hacks @ QCON 2012
Continuous Deployment & Delivery + Culture Hacks @ QCON 2012Continuous Deployment & Delivery + Culture Hacks @ QCON 2012
Continuous Deployment & Delivery + Culture Hacks @ QCON 2012
 
Yam
YamYam
Yam
 
Evonik Supply Chain Visibility Presentation - Elemica Executive Luncheon
Evonik Supply Chain Visibility Presentation - Elemica Executive LuncheonEvonik Supply Chain Visibility Presentation - Elemica Executive Luncheon
Evonik Supply Chain Visibility Presentation - Elemica Executive Luncheon
 
2 funnystories
2 funnystories2 funnystories
2 funnystories
 
Corona effect, corona ring and any other topics
Corona effect, corona ring and any other topicsCorona effect, corona ring and any other topics
Corona effect, corona ring and any other topics
 
Content marketing för alla - föreläsning och bokrelease på Berghs
Content marketing för alla - föreläsning och bokrelease på BerghsContent marketing för alla - föreläsning och bokrelease på Berghs
Content marketing för alla - föreläsning och bokrelease på Berghs
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

BIS 320 Week 5 Applying Information Security and SDLC 2015 version

  • 1. BIS 320 Week 5 Applying Information Security and SDLC Link : http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/ Sample content Information Security BIS/320 Information Security
  • 2. Kroenke, D.M. (2012) states that SDLC or Systems development life cycle is a conventional method of information systems development. To survive in the market, Amazon Corporation have put major thrust on areas like research, development and building new information systems. SDLC process comes in different versions with varying number of steps. Some go for the eight step process while few prefer the seven step process. Another variation is the five step process which includes the following stages: System definition, Requirement analysis, Component design, Implementation and Maintenance. There is a subtle difference between a disaster and a threat. Heavy physical loss of computing machinery due to natural causes, assault or terrorist attacks come under the category of Disasters. Threats cover issues arising from human errors, malicious illegal acts and natural disasters. An instance of human error would be an unintentional or intentional shredding of data by employees. Events like a twister or flood beyond human control can disable all computing services indefinitely. With all these factors established, it is important to consider the steps to be taken in preparing for disasters ahead of development of plans (Kroenke, “Information Security Management,” 2012). The SDLC process which has been so strictly and exhaustively followed by Amazon can be used as a standard operating procedure for application development by other organizations. The first and foremost condition for being prepared in case of disasters is to locate facilities in geographical positions which are beyond natural and human attacks. Next important step is identification of systems and resources that are necessary to get the business rolling. Having a secondary backup facility that can function at quick intimation at times of threats is recommended. Exposure to the secondary facility working conditions and its functioning to the employees are needed so they can run these backup facilities immediately after any disaster (Kroenke, “Information Security Management,” 2012). Amazon can afford having their business data backed up in secure servers as they are the makers of virtual servers that are intended for the exact functionality purposes. Their product that does this is Amazon EC2 and this eliminates the need to outsource data backup. All these can be performed within the premises of Amazon. They also have the capabilities to have protected data centers anywhere in the United States or globally. Another feature of the servers of Amazon is the “availability zones” for data within data center facilities which can restrict the damage to limited areas in case of breakdowns. Globally these centers are positioned in groups. At times of failures, the data transfer takes place from the impacted zone to the nearest safe zone. The high traffic is managed by balancing the load in the rest of the centers.
  • 3. An Incident Management team is assigned to take responsive actions in case of emergencies. The main function of this team is to constantly survey the company owned and rented virtual servers. Their personnel carryout this supervision task 24 hours every single day of the year. They are ready to quarantine incidents and take immediate action. This complete monitoring activity keeps a check on essential operational metrics. Whenever a limiting value of a parameter is reached on important functioning systems, a notification is sent to staff in charge of operations and management. A thorough documentation of the series of events during such incidents helps make the job of the personnel easy. Conferencing system having restrictive access and effective communication features can be of valuable assistance when there is a need for collaboration. Amazon has a dedicated team of skilled call leaders to ensure smooth systematic collaboration (Amazon, May 2011). In order to expand their existing business functions and goals, and employment of new information systems, Amazon can analyze these aspects exhaustively. In the SDLC process, the first stage is concerned with identifying and listing the applications as part of systems planning. Also, this is the stage where the business stands to gain the most through development. In the subsequent stage, system analysis helps to define the problem statement in hand. The requisites for the business to set up an improved and optimized information system are realized. In the systems design stage, decisions regarding the techniques of integrating technical solutions with business needs are taken as per the conclusions from the systems analysis stage. As the company continues down the SDLC process flow, it would come to the implementation level where the prototypes of the improvised system are put in operation and observe the outcomes. These stages work in unison for the systems support to sustain and hold the systems for the rest of the life cycle (Geerts, G.L., McCarthy, W.E., & Rockwell, S.R., 1996). As far as application development is concerned, Amazon has set a standard with the strict adherence to the systematic SDLC process covering in detail all stages. In the field of a http://uopexam.com/product/bis-320-week-5-applying-information-security-and-sdlc/