Commonly use outsourcing and managed services for their company. Outsourcing of information technology is not new for those who work in the technology and banking sectors. Although this area is new on the IT areas, it is one that may be more prevalent in the workplace, especially when it comes to data security. This is because many banks do not have the expertise to gather all the information effectively.
2.1 Quality control
In some cases, these organizations have to pay a high price for qualified professional or take a candidate who is skilled and teaching expertise and technology needed to implement new employment responsibilities. This can cause their mistakes and costly employee training and extended working hours to complete the task.
…show more content…
Bank uses the standard software, outsourcing firms cannot provide the level of support to the needs of the business bank.
2.4 Virus
An effect of virus is so dangerous so the effect is a serious impact on outsourcing. Another related harm is a worm virus that makes computer to remote mail server and sends the e-mail cascading because denial of service attacks. These attacks are becoming more urbane.
According to Carole Theriault, security consultant at anti-virus company Sophos "Most mass mailing viruses require recipients to open an attachment to run malicious code,". "However, there are viruses that can take advantage of security flaws which means that the only view or open e-mail enough to launch malicious code."
According to David Litchfield, founder of NGS Software "We see it all the time". "It is behind the breach half a million credit card numbers stolen by Russian groups or information from the Drug Enforcement Agency sold to drug runner. This is a documented case of SQL injection does not get the respect it deserves”
2.5 Risk to reputation
Service providers should be concern of the standards set by the client in dealing with them. Overall Bank Operations outsourcing can lead to poor service and unhappy customers. Ideas of outsourcing are for service providers to provide better services for customers. Before outsourcing IT functions, this is a good idea to review the
The case identifies struggle and problem faced by organizations outsourcing IT projects and allows us to ponder on how to manage outsourcing well.
Let’s say user (A) download an execution file (EXE) on his-her PC and double click on that file, if this file is infected the virus works based on the written code by the hacker/ attacker/ intruder and copy some files into the system. In case, user (A) does not have virus protection, the virus works perfect in destroying that computer or sending information from this computer to the attacker email. Viruses not only designed to destroy PC’s, but also designed to get information from
Outsourcing has grown dramatically in the past few years due to the flexibility offered new information technology. Within the next five years it is estimated that $365 billon or 15 percent of financial service industry current cost will be moved off shore. (Federal Deposit Insurance Corpartion, 2013)
Outsourcing has become an integral part of many organizations today. Outsourcing has its advantages and disadvantages that organizations will have to weigh to decide whether or not outsourcing is the best possible solution to their current problems and business operations. Outsourcing refers to the process of hiring external provider to operate on a business or organization function (Venture Outsource, 2012). In this case, two organizations or businesses enter a contract where there will be an exchange of services and payments. This paper will discuss the possible risks an organization may encounter in outsourcing in relation to the use of an external service
Viruses and worms are malicious programs that self-replicate on computers or through computer systems without the user being cognizant. Worms are a series programs that repeat themselves from system to system minus the use of a host fie. Worms use methods to infiltrate remote computers and launch replicas of themselves like email messages or coping files to an accessible disk. A computer virus is a
Office Supply Incorporated (OSI) is a company in crisis, with challenges in its cost structure and poor IT performance. Outsourcing to Technology Infrastructure Solutions (TIS) is an opportunity to both reduce costs and complexity for the firm, but first must consider whether outsourcing is a good strategic fit for OSI. Outsourcing is known as the practice of turning over responsibility of some or all of organizations information systems to a foreign firm in order to stay competitive. Outsourcing is not new to the business world, as it dominated the manufacturing sector the past couple of decades. There are various advantages and disadvantages. Advantages include lower costs, better quality, and downsizing to focus on the
Computer viruses are minute program which is “embedded inside an application or within a data file which can copy itself into another program“(Adams et al, 2008 ) for the sole determination of meddling with normal computer operations. The consequences may range from corruption and deletion of data; propagation of virus on to network and deployment through attachments through emails in order to further creating havoc to all associated computing devices.
One of the most well-known types of malware among the general public is a virus. A computer virus is malicious software that infects a computer and then makes copies of itself, much like a biological virus. Before, viruses were spread through the use of floppy disks or USB flash drives. Nowadays, they are mainly spread through emails. Many phishing emails lead to webpages that download a virus onto the computer hardware. Viruses can corrupt computer files, making the computer unusable (Department of Homeland Security).
These viruses contain their own e-mail server, so that they can replicate by sending email to all mail addresses that they harvest from the system. Worms- An example of a worm is the Blaster worm, which rapidly spread through the Internet in August 2003. Blaster targeted computers running Windows operating systems, and used a vulnerability in Remote Procedure Call (RPC) code. Blaster affected computers running Windows 2003 operating system, Windows NT 4.0, Windows NT 4.0 Terminal Services Edition, Windows 2000, and Windows XP. After compromising hundreds of thousands of systems, Blaster launched a distributed denial of service attack on a Microsoft Windows update site. Trojan horses- As the name implies, these are software programs that are put onto target systems (whether by a direct hack, or as the result of a virus or worm) that have a malicious intent. The Trojan can capture passwords, or provide root access to the system remotely.
While it lessens the burden on organizations, reducing and shifting the cost and risk of its IT operation, security and management issues to an external service provider or vendor, outsourcing any portions of an organization's Information System has significant risks that can sometimes become detrimental to the outsourced organization. According to the Commission on Government Outsourcing, "when outsourcing an organization exposes itself to significant risks in terms of security, accuracy, and completeness of information (Holroyd City Council, 2008)". Comprised in the rest of this document is an
E-mailed Viruses are harder to avoid. Opening an attached file can trigger them or by touching the message that contains the attached file and then the file menu bar of the E-mail program. (Email Hole Exposes Computers) The seconded way to start a virus is because of a hole in Netscape’s mail program and also MS’s Outlook. A new way for Viruses to be spread by E-mail is to put the whole code for the virus in the subject line that way when the computer read the subject line it unwittingly activated the virus. The newest way for people to get viruses is through the web pages. This is done by putting the virus code into a script on the web page, now when the page is accessed the viruses executes the viruses code. (Virus Thrives on HTML) This can make a virus very prolific if a lot of people visit the web page.
The three primary types of outsourcing which are prevalent in the Banking Industry (i.e. IT, Business Processes and Knowledge Processes) has grown as the outsourcing market has evolved from a tactical to transformational outsourcing approach. The services offered have also evolved from traditional IT support to run & change the business outsourcing and finally the future is now to transform the business.
In the words of Frederick B. Cohen, computer virus as a" program that can infect other programs by modifying them to include a possibly evolved copy of it ' ' [1]. Computer virus spreads from one computer to another by copying itself to an existing executable code. With the infection property, a virus can spread in a computer system or network using the authorizations of everybody, thereby affecting the user 's program. Every program that gets affected may also act as a virus.
The article discusses whether a computer virus is useful or unreliable; furthermore it discusses whether is a good computer virus or a bad computer virus of the computer. There are many damage of computer virus however, there are two side of everything Advantages and disadvantages.
The banking sector is undergoing a major phase of change – embracing outsourcing of services more than ever before in a bid to streamline processes and maximise efficiencies. The business process outsourcing (BPO) sector is growing at an accelerating pace. More and more back office outsourcing is being applied across numerous industries. Specifically, the recession led to the start-up of many different solution providers as well as significant change in the outsourcing sector. These changes include outsourcing a plethora of services never before considered seriously for outsourcing – including areas such as customer relationship management, transparency in business