MGMT305 - Unit 5 Individual Project Week 5- Case Studies Chasity Fenn American Intercontinental University
October , 2011
ABSTRACT This paper will discuss the questions asked about the four different case studies we are to read this week. The case studies are When antivirus software cripples your computers, How secure is the cloud, Are electronic medical records a cure for heath care, and JetBlue and WestJet: A tale of two IS projects (Laudon & Laudon, 2012, pgs 304, 321, 522 & 556).
WEEK 5 CASE STUDIES
WHEN ANTIVIRUS SOFTWARE CRIPPLES YOUR COMPUTERS There are a few reasons why McAfee’s antivirus software created so many problems for their users. First, when test simulations were done, management did not run
…show more content…
321). Lastly, cloud system users also have to deal with the fact there could be an interruption of the systems they use. It is expected by businesses and users for the systems to be available all the time, but in reality power outages and server problems could make data retrieval and usage of the system not possible (Laudon & Laudon, 2012, p. 321). The factors that contribute to the problem of the distribution of data are the number of users of the programs. Having multiple distribution centers is the way that cloud is able to have so many users and to store mass amounts of data. This also contributes to the problem of tracking activities. The reason why some cloud providers do not (and do not intend to) meet security requirements is the cost of audits. If a cloud provider does not have proof of security requirements, they often have to have outside companies audit their data. Many providers do not want outside companies viewing their data and it can be costly to hire someone to do this (Laudon & Laudon, 2012, p. 321). Cloud computing is only as secure as the company using it is. Even though cloud applications are secure and encrypted, it is the responsibility of the business using the cloud systems to use encryption and other security measures. It is important that security measures be used on the company’s side, not just the provider’s side (Laudon & Laudon, 2012, p. 321). If
Cloud computing means Internet computing. So cloud data is accessible from anywhere on the internet, meaning that if a data breach occurs via hacking, a disgruntled employee, or careless username/password security, your business data can be compromised. Due to that, should be aware of using cloud computing applications that involve using or storing data that are not comfortable having on the Internet.
Majority of organizations migrate to cloud because it is very easy to deploy, cost efficient and readily available throughout an entity. It may result in cloud environments being applied with low involvement or minimal control by entity's IT department and thus may
Organizations use the Cloud in a variety of different service models (SaaS, PaaS, IaaS) and deployment models (Private, Public, Hybrid). There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers.In most cases, the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information.
Also reliability is essential and any potential cloud provider would need to ensure they had distributed systems to ensure if a server failure occurred our company would not come to a standstill. Some vendors do allow options to export data and back this up, however if we were to store the data on our own servers also, this would minimise the actual cost savings and almost nullify the need for cloud computing.
One of the goals for large companies is to become a company with global expansion. The world still exists a lot of countries that do not have the technological and access to the internet for economic or political reasons. Such as in Africa and Asia continents have lowest internet users. In these countries, the cloud service is limited because without the internet not service, no service, no possibility of business expansion to these countries.
The purpose of this report is to explain what “Management Information Systems” (MIS) is. This report will discuss how management information system helps different departments in an organization. The functions and advantages of using MIS will also be examined in this report.
One may look for quality or ease of access but in the end the main thing that’s at the top of everybody’s mind is the economy. Cloud data centers are fundamentally different because they are built for very large user numbers and for a particular focus. Traditional data centers cannot compete on cost. In fact it’s no competition on the cost front.
When deciding which information, the company wants to move to cloud, the division of responsibilities needs to be clear between providers and customers, and an analysis of their security roles depending on the type of service offered (Software, Platform, or Infrastructure) (Gonzalez, et al, 2012). Prior to the start of the service contract, the security roles and responsibilities for everything needs to be clearly acknowledged. The management, cost, and security of clouds depend on whether an organization chooses to buy and operate its own cloud or to obtain cloud services from a third party (Grossman, 2009). Each of these choices has its own security and privacy issues. Some security concerns are lessened when a private cloud is used. Only your own information is stored there and the benefits of security might outweigh the costs. Two of the disadvantages of using a private cloud is the level of knowledge needed to support the cloud and the frequency of maintenance. On the other
All of us have an opinion about Cloud computing. Leaders in the industry think of it as a form of outsourcing, largely eliminates operational responsibilities, and offers substantial scalability and elasticity, the ability to store large amounts of data that is available only to authorized applications or users.
The risk of cloud computing could be the security of the information being stored by a large company like Amazon. It is still unclear how safe out-sourced data is and when using these services ownership of data is not always clear. In a study done in 2009, a team of computer scientists from the University of California, San Diego and Massachusetts Institute of Technology examined the widely-used Amazon EC2 services. They found that ‘it is possible to map the internal cloud infrastructure, identify where a particular target VM is likely to reside, and then instantiate new VMs until one is placed co-resident with the target’ (Ristenpart et al. 2009: 199). This demonstrated that the research team was able to load their eavesdropping software onto the same servers hosting targeted websites (Hardesty 2009). By identifying the target VMs, attackers can potentially monitor the cache (a small allotment of high-speed memory used to store frequently-used information) in order to steal data hosted on the same physical machine (Hardesty 2009). Such an attack is also known as side-channel attack. The findings of this research may
This paper will present a fictitious statistical analysis of cloud computing, and the number of security issues encountered by a variety of organization types. The fictitious organizations were surveyed to collect data on the number of software and hardware applications outsourced to the cloud, and the number of security issues encountered.
In the Cloud system, there are high security features as compared to peer to peer systems where security is handled by the end users.
Data is inherently insecure when it is in the hands of another individual or corporation. It is physically available for them to manipulate at will. Researchers from China’s College of Information Sciences and Engineering reported one avenue of this in an article published in Journal Of Chemical & Pharmaceutical Research. In this article they stated one of the security problems with cloud usage is that owners of cloud services cannot ensure that they or their employees do not access, steal
Discipline Investigation paper is that allows the students to gain more knowledge about the future job that they will do for an Organization 's. Doing an investigation on their future jobs, it allows the students to learn more about the place they will be working, and the environment surrounded. Working in a team environment, it will allow the student to learn about what type of language they will be speaking and learning. I am very keen to writing this paper; it will enable me to find out how a Management Information System professionals write articles. My professor, classmates, and other faculty members on the LLD 100A portfolio group are my audiences for this paper.
For example, Facebook and Google docs are system that store data in the cloud (Demir 2012, 31), and users do not have total control or knowledge of where or how long time the data is stored. The second category of risk, tradition security threats, is the one that most of systems are subjected and in cloud system have their consequence in a larger amount of users (Marinescu 2013, p. 274). Generally, tradition security threats are related to disorder in the system integrity that can occur through intentional attacks, such as phishing, SQL insertion, and cross-site scripting (NIST 2012; Marinescu 2013, p. 274). One example of this type of attack is the one that occurred in Akamai on 2004 that affected google, yahoo and other major companies (Marinescu 2013, p. 15). The last classification of risk, system availability, can be caused by unexpected events as system failures and power outages; for instance, the interruption of Amazon servers in 2009 that was caused by a lightning (Marinescu 2013, p. 15). Cloud systems are vulnerable to a series of different risks and a trustable system should be capable to avoid and rapidly recover from this failures.