Read below student posts reply each in 130 words.
Mohammad- Firstly, I have been blessed to be a part of this lovely class full of intellects. The
coursework design was exceptional and outstanding with topics ranging from cybersecurity to
information management. The course had a wide spectrum of different topics that helped me grow
through out the program. I will be discussing the course work in relation to what I have learned and
how this has helped me at my workplace.
Management information system, as the name suggests is much more than that. It gives you an
overview of the IT threats to understanding the IT infrastructure and managing the whole
interconnected web of information within a company. We can learn big data analytics by reading
several textbooks, but you have to understand how to implement this which can only be done by
understanding the management side of this great technology. I am not a manager yet but this course
has been of great help to me in understanding the various ways to deal with the cyber threats and
also comprehending different protocols and procedures while handling company data. I have learned
how to successfully comply with the company regulations while using any information on the data
base. For instance, we have a ton of information stored on our private network/ servers which is
protected. We use cisco AnyConnect to access this during this work from home time due to the
pandemic. I have had many experiences where external elements try to penetrate into our private
space. Our IT has set up strong fire walls and have taken other protective measures in order to
protect our servers. This is one of the aspects where this course has helped me.
One of the other topics that caught my attention is the ethical roles and responsibilities in IT which
has helped me perform my tasks in a more ethical way. I have enjoyed my tasks in the best possible
way by following the basic regulations set by the company. This includes proper handling of
company data per the norms set by the management.
In nutshell, this course has given the opportunity to learn and implement the basics of cyber security
and information management. I will proudly use the knowledge that I have gained from this course in
my future.
JoyThis course has helped me to understand different types of the roles involved information systems in
an organization and how they process data. Also learned about how to analyze data and document
management as well as their impacts on performance from an enterprise performance management
level. Especially because I work in a telecommunications domain it was really helpful to identify and
analyze the impact of business networks and wireless broadband networks on businesses and
organizations. Within the finance project it was helpful to enhance my skills on functions and
financial values of IT security. As a part of Business relationship management team learning to
analyze the need for enterprise resource planning (ERP) systems was a plus. Improved my
knowledge in the area of data mining, predictive analytics, dashboards, scorecards, and other
reporting and visualization tools in the management of information (John, 2015).
One of my job responsibilities include analyzing and visualizing data from an enterprise data
management system team that I work with. I work specially with a lot of financial data where I need
to know how to process data and the functions that are required to secure data, this course has
helped me in this aspect to learn about this kind of skills which in turn helped me in using at my work
place. ERP systems is one of the topics which definitely did help me to improve my skill set at my
job. Balanced score cards is something new which I learned in this course that is helpful in my
organization for performance reviews and a better success rate of delivering software product. Co
relating data and the methods to display data through visualization techniques is one of the best
ways which I learned to present the client in a simple language (John, 2015).
What I learnt is a good visualization involves two aspects, one is to represent data correctly with the
connections and the other is to make it easier to the customers to understand complex data by
breaking it down into simpler terms through visual diagrams. Data mining these days is applied in all
the industries and majorly that finance industry which I work with has data mining applications, this
hybrid course has helped me to increase my knowledge on these techniques as well. Overall this
course has been a balance of management skills and technology skills which are both needed for
people who are working in information management related field (John, 2015).
Dinesh- It is a very well known fact that all organizations, irrespective of irrelevant of the domain or
industry it is working for, are dependent upon Information Systems and Information Technology to
the greatest extent. These organizations operate over the attributes and information provided by
data they collect at the initiation stage and then keeps on proceeding by processing and utilization of
these data by the support provided by the Information Systems and Management.
Knowledge gained in the Learning Process
During the course of my learning process, the basic thing which I learned is that no organization can
attain the stages of high yield and productivity just by replying over human resources, as, the
support of information technology is very necessary for its sustainment in the industry.
I also learned that the importance of information technology in a business unit has made it a
compulsion for the formation of a different division of the business management group, namely, the
Information Management section. It is having respective sections of IT Governance protocols, Risk
Management parameters, Business strategies and functions, insights and analytics and ethics and
code of conduct. Although all the factors are very closely related with the management protocols of
the main business and corporate governance, yet, the difference lies in its mode of approach and
functionality.
I also learned as to how information systems have brought about a change in the modes of
operations of an organization. Just for instance, initially organisations used to rely upon traditional
marketing concepts for the promotion of their products and services, but, with the advent of
information technology in full swing, social media network and Internet is the major platform to
showcase products and services with a wide range of coverage at a cheaper cost than the traditional
methods of marketing.
I learned about data and record management, enterprise systems, geographic information systems,
big data analysis, SDLC and ethics and responsibilities of a professional at the workplace and
towards the society.
Skills acquired in the Learning Process
I acquired skills over a various multitude of the IT aspects which are functional in an organization. I
learned the importance and methods of measuring and analyzing the benefits which a new strategy
or concept can bring in the performance of an organization. The review methods like SWOT analysis
and Balanced Scorecard features and the methods of preparing their reports and projections is
understood by me during the learning process.
I also gained skill as for how to attract customers and clients using the IT Tools based over Internet
platform by means of social media websites and networks, search engines, semantics and digital
marketing tools. Apart from these, I gained skills relevant in the fields of project management, risk
management, data and record management and social metrics of the utility of Information
Technology for an organization.
Vinay- Critical Evaluation of Learning Outcomes
In this topic, we are discussing the critical evaluation of learning outcomes. For this, here we are
discussing the managerial decision making in IT industry, new skills for the business productivity and
applying of newly gained knowledge in the organization.
1. Information Management/ IT and Managerial Decision Making
In the IT systems, the process of decision making plays a virtual role. Every organization needs
better decisions in order to increase productivity and growth. To update the better concept, the
organization should be ready for keeping and enhancing the new formula. The main thing disaster
occurs mostly through online marketing by the time of the goods delivery process. They are not even
considering the ideas, issues facing by employees in organizations and most importantly they are
neglecting the conflicts among various people due to the competition in the society (Jarvenpaa,
1988).
2. New Skills for the Future Profession
Communication skills play a very important role in any business organization in order to perform their
job perfectly by sharing and transferring information from one department to another. The company
needs to perform all the activities which they think to do for business improvements because in
present society most of the companies are quickly entering into this online business market due to
its demand in people. According to my view, in any of the organization values, team strength and
organizational knowledge based on these factors the management success or failure the diction
making will be obtained (Rivera, 1996).
3. New Knowledge
In order to obtain knowledge, we need to learn about the new technologies and systems. After that
have to apply our knowledge in order to implement the organization growth. One of the major effects
on the business strategies from the external factors is environmental policies. By this sales plan, we
can improve our business in the upcoming years and also change some strategies to get more
profits and develop business. Even though making these targets and more policies to improve their
performance in the business organizations can experience more problems due to improper targets
settings by the inexperienced employees which are unachievable (Waddell, 1994).
Shiva- Case Scenarios in Cybersecurity
Cyber-attacks have increased in the recent past with cybercriminals. They have been able to create
more complicated schemes to enable them to attack a wide range of prey from governments, nongovernmental organizations, financial service firms, and manufacturing enterprises others (Wu et al.,
2019). The following videos, as obtained from YouTube, are just but a mere representation of the
vast presence of cyber-attacks in the corporate world and beyond.
Worst Case Scenario
In a financial services firm, a cyber attacker impersonates a client and contacts a staff at the
payments department. The attacker possesses account information of the client in question and
instructs the staff to transfer money to an account that belongs to the attacker. If this account is not
restricted, money is lost too, and the staff member bears the loss (Wu et al., 2019).
Best Case Scenario
A firm receives communication from the criminal who impersonates the manager. The
communication instructs a member of staff to transfer money to another account that belongs to the
attacker. The staff member becomes curious and brings the issue to the attention of his seniors.
They discover that the request was fraudulent, and therefore the transfer of funds is not carried
through. No money is lost (Wang et al., 2020).
In another case:
Worst Case Scenario
A university finance staff receives an invoice through an email with payment instructions from a
fraudster posing as a supplier. The staff employee makes the payments without validating the
request. The company bears the loss (Sani et al., 2019)
Priyanka- Cyberattack or the cybersecurity is any kind of the offensive targets that are targeted for
the organizations or the employees or companies or personal or it can be anything. Cyberattacks
occurs by threatening the malicious information if they have any. There are scenarios which
differentiate between the worst and best cyberattack scenario are follows:
Worst case scenario: Many researchers and the scientists declares to reduce the damage caused by
the cyberattacks and the type of the shutdowns that occurs by the grids and the uses the internet by
using the information that is stolen. Researchers claims that “reasons that they believe the
cybersecurity research and policy communities will soon confront a much more diverse set of
problems and opportunities comparatively than today. For example, Data breaches where the
internet users are not being trusted with the security and the giving their personal data. Having and
carrying the personal data and it’s been stolen for years and starts to manipulate and use the
personal information to give to the data breaching activities (Christofaro, 2019).
Best Case scenario: Ensuring all the information is protected within the organization and bringing the
awareness to the employees regarding the cybersecurity issues and learning from them would
impact less for the cybersecurity issues. Definitely monitoring and analyzing the threats and taking
actions and preventing them to happen over again would decrease the activities. When it comes to
finances, monitoring and confirming the large transaction and organizational documents being
controlled would impact less for issues for the organization (Christofaro, 2019).
Worst case scenario could learn from the best case scenario: Holding off the data breaches and
monitoring and preventing before the action would help them to get take the action. Data scientists
helps to develop the more powerful models which helps them to predict and manipulate the style and
behavior and on what basis they work (Christofaro, 2019).
Satish- Thank you providing a great article. The world had a revolutionary changed with the
introduction of the mobile computing and hence there has been a boom for a lot of applications,
most importantly the social media applications. Based on the list of social media sites provided, I
mostly use LinkedIn and WhatsApp. I am technology geek and I always admire the technological
revolution the world is experiencing each day. It fascinates me so much to a level that I do my level
of research in every new technology that is out in market and is planning to build a new technology
that integrates the Machine learning concepts with AWS. Since I am technologically aware of a lot of
things LinkedIn helps me with keeping me to update with what is happening across the world. It is
also a good platform for me to post my skill set and the achievements I get along my technological
career. LinkedIn is a great platform for professionals who seek for employment at any level of their
career. So, I’ll make sure I check LinkedIn at least once a day. My another most used application is
WhatsApp. I used it a lot of communicate with my parents as my parents stay in a different country.
We communicated via the normal calls or the video call or some time via the texts. It’s a great
application which has grown leaps and bounds in no time. It came with new features like the story’s
creation, group calling with more than 4 participants. The greatest achieved by WhatsApp is the
acquisition by Facebook. From then on WhatsApp has gotten more recognition across the world and
have recorder very less downtime even with the usage exceeding the double the users they
previously had.
From the list provided I don’t use a lot of applications. But I would be more interested in using
Meetup and Quora. I will be moving to Canada in a few days and I guess Meetup add would be
helpful in finding new friends and buddies I can play tennis with. So, I am pretty excited to start using
the Meetup app and also Quora caught my eye for a lot of important information of various questions
like sports, art, religion, current affairs etc.
My favorite social media a network is Instagram and Twitter. Instagram is one
of the latest social media platforms. One is a different platform because it emphasizes
visual effects, while the other focuses on social communication. Founded in 2010,
this platform is a multi-channel platform that can be used for both mobile applications
and desktop sites. I use Instagram for inspiration and the ability to connect with my
friends. In my opinion, Instagram is a great network for businesses to utilize because
they can create their own page and post pictures of their products for consumers to
view. Instagram also allows users to use hashtags and tag companies in their picture,
resulting in some free advertising, especially when a new product comes out.
Instagram is a great tool for brands (Etter, Ravasi and Colleoni, 2019). Security is an
important issue of concern in today's world. Everyone is passionate about their
importance on social media and sometimes shows a false identity. However, they are
not objects that some people often try to monitor people for updates. The previous
concept was that social networks were responsible for creating a lonely and lonely
atmosphere for people. It will enable Instagram to take people's social life to a new
level. Everyone needs to register an account to log in and provide them with unique
credentials to interact with other subscribers. Now, the company is turning to social
media to promote and promote advertising. This is because the social traffic that
always exists continues to grow regardless of time or place of work. Instagram now
provides a security feature that allows we to view your profile without permission. I
like Twitter because the variety of content. I think brands do great at using twitter
because they can respond to consumers. Today, many social media applications have
found a way to combine them seamlessly. Twitter, Instagram, and Facebook are
especially intertwined and transparent. Knowing these interconnections can help
parents or guardians figure out how to use Instagram through their child's activities
and other social media applications. Twitter has certain demographic information that
is actually active in the community (Borah, Banerjee., Lin, Jain and Eisingerich,
2020). Whether it is a discussion of politics or social humor, there will always be a
Gantse-
wide variety of people to discuss. Twitter is a convenient way to quickly resolve
customer concerns. Many companies respond to followers' tweets, asking questions
about products, or seeking help on specific issues. Twitter is also an effective way to
warn consumers, customers about policies, recalls, upcoming events or sales, and
other important notifications and advertising changes.
Read below student posts reply each in 130 words
Tarun- What is a Cyber Attack?
A cyber-attack is an offensive launched with cybercriminals doing individual about more processors
upon a unique about many computers about systems. A cyber-attack can maliciously damage
networks, keep data, and practice a breached network, which is a shipping time concerning different
relapses. Cybercriminals follow a variety of techniques to start a cyberattack, including malware,
phishing, ransomware, refusal of co-operation, with other organizations. (Liu, Wang, & Tang, 2020).
Worst-Case scenario:
DDoS: The Worst-Case Scenario
URL: https://youtu.be/ojHKn1xH3U8?t=11
Across the past many months, I have often questioned regarding the opinions on that slate of DDoS
attacks aimed upon these business management, including one question that becomes up plus and
experience repeatedly: "Is the worst yet to happen?" To stay fair, I do not remember for sure, though
it got them reminiscing of whatever the "worst" case scenario could happen, which caused this
happening.
On, September from last year, Izz ad-Din al-Qassam becomes involved in cyber warfare upon U.S.
financial systems, and it is a conflict among which all have had a great deal of apparent success if
we believe that their goal was to inconvenience U.S. bank customers by providing online business
doors difficult as several minutes at the moment.
Companies do typically provided remarks on Pastebin ere an intervention is to happen, including
service for organizations before-mentioned as FS-ISAC own heightened experience of ill-disposed
business experts including reduction methods that ought to give a measure of comfort.
Nevertheless, the charges have remained with every succeeding spring demonstrating to obtain
extra potent than that end. Consequently, over U.S. groups possess related downtimes that last
counterparts of everything they all experienced the current year. Single key hither means that while
more substantial than twenty companies possess remained targeted, six major groups should catch
more extra concentration than some rest. It seems that Izz ad-Din al-Qassam may mean targeting a
family of companies to sharpen their abilities and to deceive us because of their plans. Some
communications should maintain relatively uniform coverage from those charges, while the
commercial business and state leaders strive to know what does genuinely useful also something all
aim to deliver. (Wu, Chen, Li, Luo, Liu, & Liu, 2020).
Rebels that would never leave a free press for concern about the results that an extensive
discussion could hold on their management may occur depending upon the power from the evidence
in that U.S. can negatively influence the users' opinion on the security from a unique economic
system. It begins by concentrating their energies at the school, including some shortest answer to
some unwarranted charges, with the significant six targeted groups. A spearfishing attack offered to
distribute malware including the purpose of damaging national group rules, including ATM owner
processing servers, related to anything South Korean groups encountered last period. At one period,
the full capacity of robot made to turn upon that one sequence, outdoors one forewarning.
Kiran- Today the cybersecurity attacks are top in mind and went coming to the recent news about
the high-profit incidents that are happened which involves the democratic national committee and
the yahoo dominating headlines. Due to these incidents, it leads to significant fallout for all the
individuals and the companies who are facing the issue. Whether everyone realizes or not the
cybersecurity is the greatest risks which are facing by the small and medium business. It is common
for the business to face the attacks which are small, and they can bounce back for the little damage
that has happened. Let us discuss the worst-case scenario where the companies cannot find a
better solution to sort it out. A perfect storm and its Monday were every employee start there day
casually and start working and share their weekend talks. Later about 11 O’clock they found that the
website is not working and the latest they noticed none of the sites are working (Taylor & et al.,
2018).
Sometime later the IT team pings that by 11:45 say that everything is working better and running
week without any problem. But in reality, it is not true exactly and they did not identify that is a denial
attract and the IT team will consider that different defense strategy just in the case which is hit by
another attack. Based on the company size the attack will range and the downtime will be $1 to
$1000000. This denial attack will not be the primary goal for the hacker he just smokes the screen
and get access of the system and interrupt and disturb the customer's privacy by toughing the spam
emails. Later the employees get the messages and the complaints from the customers that they are
been interrupted with the unusual activities (Fuller, C. J. (2019).
Priyanka- Cyberattack or the cybersecurity is any kind of the offensive targets that are targeted for
the organizations or the employees or companies or personal or it can be anything. Cyberattacks
occurs by threatening the malicious information if they have any. There are scenarios which
differentiate between the worst and best cyberattack scenario are follows:
Worst case scenario: Many researchers and the scientists declares to reduce the damage caused by
the cyberattacks and the type of the shutdowns that occurs by the grids and the uses the internet by
using the information that is stolen. Researchers claims that “reasons that they believe the
cybersecurity research and policy communities will soon confront a much more diverse set of
problems and opportunities comparatively than today. For example, Data breaches where the
internet users are not being trusted with the security and the giving their personal data. Having and
carrying the personal data and it’s been stolen for years and starts to manipulate and use the
personal information to give to the data breaching activities (Christofaro, 2019).
Best Case scenario: Ensuring all the information is protected within the organization and bringing the
awareness to the employees regarding the cybersecurity issues and learning from them would
impact less for the cybersecurity issues. Definitely monitoring and analyzing the threats and taking
actions and preventing them to happen over again would decrease the activities. When it comes to
finances, monitoring and confirming the large transaction and organizational documents being
controlled would impact less for issues for the organization (Christofaro, 2019).
Worst case scenario could learn from the best case scenario: Holding off the data breaches and
monitoring and preventing before the action would help them to get take the action. Data scientists
helps to develop the more powerful models which helps them to predict and manipulate the style and
behavior and on what basis they work (Christofaro, 2019).
Reference
Bhuvana- Mobile users are becoming the primary targets for the attackers where they have been
into deep troubles. Unknowingly, several internet users and social media users are prone to threats
due to ineffective use and inappropriate sharing of information. People on social media tend to share
their personal information. It led to several cyber crimes, which noticed that cybercrimes and their
impacts were increased around 43%, and there is no doubt this will be inherited in the coming years
with more devastating results. In 2018, users of Facebook, Twitter, and Whatsapp had been affected
by cyber threats in which that impact was never recorded before. Millions of social media users and
their information were attacked, which resulted in the loss of personal and professional information.
This included credit card details, addresses, mobile numbers, and other contact details that have
been hacked by attackers.
IBM has overcome many downfalls managing cybersecurity issues, and now it became the most
influential company that has successfully defended and disrupted several cyber attacks. The
company has focused on customizing its security services and increased the reliability to a great
extent. It has designed customer-driven security software applications using which the company
enabled many internet and mobile users to manage their information effectively. It expanded its
storage capabilities by improving and acquiring cloud infrastructures and services. On top of that, it
restricted the accessibility to its employees to access the information by complying with the
Privileged Access Management (Samkova, 2018).
Therefore, it can be seen that social media platforms like Facebook and WhatsApp also should
deploy customized services. Social media companies have deployed customer-driven services, but
they did not quantify and strengthen the authentication and authorization facilities. Hence, Facebook
and WhatsApp can follow the strategy of IBM to facilitate users with proper utilization of online
resources and prevent social hacks and privacy disruptions (Shackelford & Kastelic, 2014).
Praveen- Facebook
Facebook is one of the platforms with the largest number of users thus will market the
website effectively. Facebook has the most accurate and effective micro targeting of
audience in terms of income, age, gender, location and interest of individuals.Using
Facebook is cheap.Facebook has been plummeted that is people are required to use
plat forms where they can pay for effectiveness (Jeske, 2016).
Twitter
Twitter is known as the most effective platform where the content is delivered in time
that is there is no delay.This platform is the most cost-effective and time saving, where
tweets are quickly delivered.Although twitter is the second platform with the largest
number of audience, the number continues to decline thus it’s not reliable for
future.Twitter is highly affected by direct automation and rampant spam, which at times
it can be frustrating to the users (Dolan, 2016).
Instagram
Instagram is the popular and greatest platform which has the largest audience since it is
used by adults and teenagers, thus making marketing effective.This app favors an
advert that involves visual products that is videos and images.Most of instagram users
are teenagers and youths whose purchasing power is low (Tuten, 2017.).
The best plat form for a web developer can market their website is through Facebook
since its pros are reasonable and the pros have over done the cons.
Most of business people come up with business ideas and lack time to create websites
where they can advertise their products and services. This is good business since
individual can with entrepreneurs worldwide. The potential customers of this business
idea are entrepreneurs who don’t have websites where they can advertise their
products and services.A web developer can market the website on social media
platforms to attract more clients. Now days the use of social media platforms is the
trending system and so advertisement through this platforms will increase number of
customers. Web developer can use Facebook to advertise the website since it’s the
most popular platform.
Nikhil- Pinterest:
Pinterest is an excellent blogging platform for business owners and entrepreneurs.
Companies can benefit from great feedback and interesting content, they can also
display their products on an attractive blog. Investors and brand advocates can start
their own pin boards and showcase their ideas. You can, through this site, find out
which marketing agencies, product manufacturers, blogs, book publishers and blogs to
partner with. According to Mashable, Pinterest has almost one billion users around the
globe, but the new trend amongst today's youngsters is not to put their brand avatar on
the website's profile but to create Pinterest boards instead. It is a great opportunity for
brands to take advantage of the current, highly viral trend of Pinterest boards, which
have over 30 million users per month worldwide, according to Brandline. There is one
dedicated Pinterest board for each million followers of a brand and users can add their
messages, pictures, gifs. According to Nadella, Pinterest is one of the highest used
social media platforms, but a lot of businesses don't even know what to do with it. To
learn more about Pinterest marketing and ideas for how to use Pinterest for your
business. (Kaur, G. (2016)).
Youtube:
Another popular channel for communication between businesses and customers is
YouTube Partner. This channel has been around since 2009, and provides an easy way
for businesses to communicate with existing and potential customers. Each video
featured on this channel includes a link to your website, business cards, contact
information and even coupons and offers. YouTube comment functionality allows users
to talk about your videos with friends, on television, in publications, and even in person.
The company hosts event videos, full-length documentaries, reviews and even offers
discounts to customers that leave nice comments in response to other customers'
comments.
Tumblr:
Tumblr has a 'blog zone' where users can create and share their own blog. Many girls
and young teens use Tumblr because of the ways it allows them to post personal
details. In addition, girls and young teens use Tumblr to create their own fan-fan boards.
A fan-fan is a group of friends who share a fandom or interest. Because girls and young
teens use Tumblr, they post many of their personal thoughts and pictures, and Tumblr is
the place where users gather. After blogging, users could read and share. (Stelzner, M.
(2014)).
Monica- Virtualization software virtually divides physical resources, which results in
efficient usage of them. Virtualization can make it possible to use one computer like two or more
computers, as it makes running of two or more operating systems on a single PC possible. By
using virtualization software, one PC can be used simultaneously as two computers, where one is
physical and the others are virtual computers. I completely agree with the advantages of
virtualization software listed in weekly readings. This software makes the use of IT resources
efficiently; as a result, the procedures are performed in less time, and the processing and
execution become faster without demanding additional hardware devices. The installation or
backup of the operating system is done at the speed of backup document files. The virtual
operating system is treated as a group of files. Even if the device or software gets hacked,
recovery is possible on a virtual machine (Metzler, 2011).
Virtualization software allows you to run two or more operating systems on the same
device at the same time. For example, if you are using windows 10 and need applications that
only support Linux, you can use a virtual operating system, that will divide the hard drive into
two parts. Similarly, virtualization software also helps in running applications only supported by
old versions of the operating system. This software reduces cost, makes recovery of data possible
after the attack, quick processing, and execution and enhances the productivity, agility, and
efficiency of IT resources. There are many virtualization software like OpenVZ, Hyper-V,
Power VM, and VMware ESXi. The virtualization software also results in the creation of serious
security concerns like VM sprawl, low control, and visibility on the network, resource wastage,
and critical data in VM. Server sprawl causes exhaustion of virtual resources and physical
servers. This causes high pressure on procedures. In virtualization, this server sprawl is even
more (Brooks, Caicedo, & Park, 2012)
Priyal- Benefits of Virtualization Software
Virtualization can improve the IT agility, flexibility as well as scalability. As such, it creates
a notable cost of savings becoming one of the critical benefits of virtualized software. Another
essential advantage of virtualization of software is its ability to enhance workload mobility in a
significant way and increase the performance alongside the availability of resources. It enhances
resiliency and reduces downtime by cloning machines, which could be affected in the event of a
disaster (Kist et al. 2019). Besides, it also increases efficiency and productivity as a result of a
few servers. The IT team can maintain physical hardware using relatively less time. The server
allows one to install, maintain, and update all machines avoiding tedious work of server to
server.
Controlled independence also gets enhanced through the virtualization of software.
Developers get provided with the ability to spin up a virtual machine quite quickly without
necessarily impacting the production space. It is as a result of the virtualized environment being
segmented into the virtual machines (Kist et al. 2019). Moreover, virtualization software is
associated with being organizational and environmental. It remains more green-friendly due to
the ability to cut down numbers of physical servers. Such a move consequently leads to a
reduction in the amount of power used, reducing the carbon footprint. The reduction of power
also translates to the business expenses, significantly reducing and the resources invested
elsewhere.
The physical and software resources are not only wasted by the existence of virtual
sprawl but also significantly burden the IT with new manual processes. In essence, this increases
the security risk as noted by Zheng et al. (2017) Hypervisors also remain susceptible to hacking
posing another severe security concern. Due to the security risks highlighted, I would suggest to
my organization to invest heavily in technology. New technology and constant updating of
systems would aid in keeping the would-be hackers at bay
Purchase answer to see full
attachment