Vinod CSP replies
1 day ago
Mayukha Bairy
Week5Discussion
Name: Mayukha Bairy
COLLAPSE
The innovation blast of the previous two decades has utilized innovation in practically all
parts of the association a basic piece of the business. As the utilization of innovation has
expanded, so has the electronic waste. Subsequently, a ton of mindfulness is being raised
about green IT, which is vitality productive utilization of innovation and appropriate
removal of electronic waste. One idea that can help empower Green IT is Cloud figuring.
Distributed computing is the sharing of assets over the web as opposed to having
neighborhood workers. It is the conveyance of processing as assistance instead of an item,
whereby shared assets are given to PCs as a utility over the web. This paper expects to
contemplate the current circumstance with respect to the utilization of IT use and the effect
of e-squander at the University of Bahrain. It will likewise recognize the empowering agents
and inhibitors of adjusting Green IT at the University of Bahrain.
Vitality use and its effect on the earth have become a subject of worldwide worry in recent
years Gardner, G. and Stern, P. (2008). The creation and utilization of different types of
vitality is a large supporter of ozone-depleting substance (GHG) outflows and
environmental change (BSD Global, 2002). These issues are getting imperative to
associations as such issues are progressively thought to affect intensity (Rao and Holt,
2005). In many associations, IT is a significant buyer of energy. Greening IT can thusly lead
not exclusively to a decrease in carbon discharges yet, in addition, to significant cost
investment funds (Mines, 2008; Donston, 2007; Nunn, 2007). Greening IT along these
lines not only lessens the all-out expense of innovation proprietorship yet, in addition but
also builds the all-out environmental value of possession (Tung, 2007). The capability of
innovation to make feasible business and society is generally acknowledged (Olson, 2008;
Gonzalez, 2005; Hart 1997) with just a couple (Fuchs,2008) addressing such possibilities.
Additionally, there are a few reports of major counseling firms and popular press hailing
Green IT and estimating that Green IT can possibly make new competitive chances, to
diminish carbon emanations and to improve by and large business efficiency(ACS, 2007;
Baines, 2007; Gartner, 2008; Info~Tech, 2008a, 2008b; Jones and Mingay, 2008; Mines,
2008).
References:
Mines, C. (2008) The Dawn of Green IT Services, FORRESTER Research Inc, February
2008, 1- 1419.
Donston, D. (2007) Green IT generates fertile ideas, eWeek, 24(16), 46.20. Nunn, S. (2007)
Green IT: Beyond the data center how IT can contribute to the environmental agenda across
and beyond the business, Accenture, 1- 7.21.
Tung, L. (2007) Green IT will hit Australian govt 'like a ton of bricks, Accessed June 30,
2008, fromhttp://www.zdnet.com.au 22.
Olson, E.G (2008) Creating an enterprise-level "green" strategy", The Journal of Business
Strategy, 29(2),22-30.23. González, P.d.R. (2005) Analyzing the factors influencing clean
technology adoption: A Study of the Spanish pulp and paper industry, Business Strategy and
the Environment 14(1), 20-37
7 hours ago
Teja Sri Mallempati
Discussion
COLLAPSE
Cloud computing is the availability of computer system resources on demand especially
computing power and cloud storage without direct active management by the user. I disagree
that cloud computing enhances green computing and reduces the total cost of computing.
My reasons are as follows: To access the files stored in the cloud storage, there must be
an internet connection. Wherever there is no internet connection or the internet service is
down, you would not be able to access your files at that time even though they are safely
stored. Another disadvantage is the terms of the agreement. Before agreeing to the services,
one should look for what is offered (Obrutsky, 2016). Cloud computing is because some
systems known to provide a certain number of gigs yet delivers lesser. For this, the number of
files that can be stored can be less than what the person wanted.
Cloud-computing may appear cheaper than other software solutions. They cost too much. Yes,
cloud application does not require significant investments for support or license infrastructure.
Still, it does not contain all the features available in software applications. This feature missing
may be as important as the other features available .in cases of transfer of data, the cloud
requires a large amount of data charged on a per GB basis. The data used can add up hence end
up costing a lot of money
Cloud computing is usually vulnerable to various cyberattacks that are designed to
penetrate through. (Shaikh & Haider, 2011) Cloud itself is a third party where someone`s or a
company's data is stored, and they are stored so that they can be accessed from anywhere.
However, most third parties try to secure the data, but this has been poorly done because there
many users using the cloud. So, the person or company using should ensure further security to
protect their data. Cloud computing is also exposed to security threats such as hacking. For
most accounts, a password or a pin is used to secure the documents but in the field of
authentication password and pins are known to be the weakest form of authenticating, and for
that, someone’s account can be illegally breached. After hacking the information is costly to
retrieve.
Reference
Shaikh, F. B., & Haider, S. (2011, December). Security threats in cloud computing. In 2011
International conference for Internet technology and secured transactions (pp. 214-219).
Obrutsky, S. (2016). Cloud storage: Advantages, disadvantages and enterprise solutions for
business. In Conference: EIT New Zealand.
Saket replies
1 day ago
Tejaswini Mylaram
Discussion 13
COLLAPSE
Mitigation is also the approach to mitigating damage caused by natural disasters by removing risk factors.
Mitigation can come in several different forms: restoration of natural systems, restoration of land, removal of
hazards, and prevention of future disasters. Prevention is an attempt to prevent damage from natural
disasters. It is usually associated with reducing risk in the future when possible or protecting against the next
disaster in the same way that we protect against a natural disaster today, such as protecting against flood
damage and earthquakes (Shultz & Galea, 2017). Prevention takes a long-term approach. It focuses on making
changes, as opposed to preventing damage. Previsions made in the future will affect the damage done by the
next disaster. Preventing loss of life means making sure that people's lives are not put in danger and that
others have adequate protection against danger. Prevention works best by focusing on the present decades to
centuries. It focuses on making changes, as opposed to preventing damage. Prevention is most effective when
the actions taken in the present are taken by people in control of the future and made to reduce future
damage (Shultz & Galea, 2017).
The purpose of mitigation is to minimize the impact of the disaster. As part of this effort, we will also focus on
mitigating the effects of natural disasters. The goal of mitigations is to minimize the impact of the disaster.
Mitigation is the effort to reduce the loss of life and property by lessening the impact of disasters. Actions that
are not mitigation-oriented are usually called preventive actions. Prevention efforts may provide immediate
relief against potential future disasters, but they do not address the underlying causes of disasters. Preventive
actions can include efforts to improve the infrastructure and services in a community or country or prevent
an individual from becoming a victim of a disaster (Bier, 2017). These steps will help mitigate a disaster's
impact. The more a disaster impacts a community, the less likely it is to be mitigated. A disaster can result in a
loss of life and personal loss. The potential loss of human life from an earthquake is very high, but there is
also the potential loss of a business, home, or even an entire town. Mitigation planning is often a multi-year
effort that combines disaster risk and mitigation actions—and it will be a lengthy and costly process.
Mitigation can be measured as either loss of life or property. The probability of death measures loss of life due
to a natural disaster and loss of property is when property and assets are lost or damaged. Risk is the
probability of an event occurring, risk of death. Mitigation means reducing the loss of life or property to a
level where the probability of loss is less than the risk of a loss (Bier, 2017).
References:
Bier, V. M. (2017). Understanding and mitigating the impacts of massive relocations
due to disasters. Economics of disasters and climate change, 1(2), 179-202.
Shultz, J. M., & Galea, S. (2017). Mitigating the mental and physical health
consequences of Hurricane Harvey. Jama, 318(15), 1437-1438.
2 hours ago
Venkata Sivasai Kasani
Discussion 13
COLLAPSE
Disaster Recovery Plan
According to Makwae (2018), after a disaster has attacked a company or country, it is the
responsibility of the leaders to participate in a recovery process. The processes in this situation are
always led by the goal of returning the society or the organization in its pre-disaster form. On the
other hand, the business continuity plan refers to the processes designed to curb any disasters that
have the potential of hindering the critical processes of the business (Fani & Subriadi, 2019).
Therefore, it is well established that a disaster recovery plan has to be within the business
continuity plan for its efficiency.
From the definition of the disaster recovery plan, it is well established that it contains the
processes that are used in mitigating the destruction that a disaster can cause in organizations. On
the other hand, this is a concept that applies to numerous societal aspects. In a concert, coming up
with an efficient risk management plan is vital for the overall success. On the other hand, a disaster
recovery plan has to be a part of the risk management plan as it assists in mitigating the risks that
arise from any disastrous incidences in concerts.
Furthermore, Prescent (2018) outlined that having a written plan, keeping data copies offsite, testing plans with realistic scenarios, updating the disaster recovery plan throughout, and
planning and resuming normal operations are some of the common best practices that can be done
for a successful disaster recovery plan. It is, therefore, well established that a disaster recovery
plan is an important aspect in modern-day society and companies should make sure that they have
these plans.
References
Fani, S. V., & Subriadi, A. P. (2019). Business Continuity Plan: Examining of Multi-Usable
Framework. Procedia Computer Science, 161, 275282. https://doi.org/10.1016/j.procs.2019.11.124
Makwae, E. (2018). An assessment of disaster recovery planning: A strategy for data
security. Lap Lambert Academic Publishing. ISBN: 978-613-3-99011-1. Retrieved
from https://www.researchgate.net/publication/327572587_An_assessment_of_disaster_r
ecovery_planning_A_strategy_for_data_security
Prescent (2018) Best Practices for Disaster Recovery. Retrieved
from https://www.prescientsolutions.com/blog/best-practices-disaster-recovery/
Divya replies
Femi OBAYEMI
3 hours ago, at 9:42 AM
Heightened cyber warfare on internet users and businesses make them prone to a wide range of attacks
that can cripple or crush them irreparably. None is guaranteed immunity from these attacks. Major
security threats to e-commerce web sites include:
Data breach occurs when hackers gain unauthorized access by means such as backdoor, malware
(viruses, trojan horses, drive by downloads, ransomware), DOS, DDoS and so on. In 2016, Yahoo’s data
for 1 billion users was compromised in this regard.
Credit Card fraud targets hijacking financial transactions and inventory volume cum delivery address.
It is one of the oldest and most attractive internet frauds.
E-skimming (identity theft) targets websites to steal clients’ data and initiate clandestine transactions
under the guise of an assumed identity.
Brute force attack occurs when fraudulent programs attempt multiple combinations on the Admin
Panel to crack its password.
Man in the Middle attack occurs when a hacker can listen in on or access communication between the
firm and client, and use information gained to inflict damage to both of them. This mostly occurs when
the user is connected to a vulnerable wi-fi.
Exploitation of known variables such as poor security policies, non-compliance by employees, social
engineering hacks and security breaches such as defective software and data (bugs and defects,
maintenance nightmare, software metrics.
Employee Sabotage implies deliberate damage inflicted by disgruntled staff or competitor’s plant to
destabilize the website and operations. Research by Intermedia and Osterman showed that 89% of exemployees still have access to corporate applications for a window of time post-departure.
The impact of these attacks includes financial loss, down time or loss of time to productivity, brand or
reputation damage, cost of trouble shooting by IT consultants, effects of black listing by search engines,
loss of future sales due to reputation damage and search engine limitations.
Satyasriram_Varma DANTULURI
13 hours ago, at 11:34 PM
NEW
Credit Card Fraud Most of the times, ecommerce sites let customers to create accounts and the option to save their credit
card details. When Hackers hack devices which customers use like Laptops or Phones, they get access to
credentials of customers and can make unintended purchases on customer’s credit cards.
Spamming
Fraudulent emails are sent to customers and when they are opened and clicked, customers are directed
to fraudulent websites where customer credit card information is captured and misused.
Suspicious Application Downloads
When accessing certain sites, unauthorized applications and viruses are downloaded into our laptops
and they start tracking all user activity. They have the ability to capture user sensitive data and this data
can be sold to 3rd party services for a price.
Network Attack
Network attacks like Distributed Denial of Service (DDoS) can make ecommerce sites not accessible as
the site is overwhelmed with traffic from illegal multiple sources. As recent of June 2020, Amazon web
services site had a DDoS attack which effected a large number of websites.
Steps to avoid security threats –
•
Use websiteprotection services like Cloudflare, AWS Shield or Akamai to reduce the impactof DDoS
attacks.
•
•
Using good anti-virusand anti-malware applications.
Using a VPNservice, which keeps user’s activity and data secured.
References:
Laudon, K. C., & Laudon, J. P. (2017c). Management Information Systems: Managing the Digital Firm (15th
Edition) (15th ed.). Pearson.
Reply
Venkata MYNAMPATI
19 hours ago, at 5:19 PM
NEW
Selecting information systems projects is critical because all the companies rely on information systems'
smooth operation. The selection process is complicating due to the availability of several information
system projects. Due to the nature of the problem, preferences, and requirements, choosing an
appropriate method often becomes challenging (Deng & Wibowo,2008). Hence, the need for an
intelligent decision support system (DSS) facilitates adopting proper multicriteria analysis for solving
information systems project evaluation and selection process.
The selection process for appropriate information systems projects requires evaluating the performance
of all the available information systems projects, assessing the importance of the criteria, and sum up
the assessments for the overall performance index for each information system project (Deng &
Wibowo,2008).
For an effective information system plan, the organization must have a vision for short and long-term
information requirements. The first step in the information system plan is to know the purpose of the
plan. The second step is the strategic business plan rationale. The third step is the current system that
exists in the firm. The fourth step is the new developments. The fifth step is the management strategy.
The sixth step is to anticipate the difficulties in implementation. The last step is to analyze the business
requirements. The large-sized companies
Large corporations will have a management structure to ensure the most critical systems projects
receive priority.
Critical success factors (CSF), portfolio analysis, and scoring models are used to identify and evaluate
alternative information systems projects.
In CSF's approach, the key performance indicators of managers determine the company's information
requirements. The portfolio analysis is the analysis of potential applications to assess the risks and
benefits of selecting among the alternatives for information systems.
A scoring model is used for deciding the alternative systems based on rating systems for selected
objectives (Laudon & Laudon, 2017).
References
Deng, H. & Wibowo, S. (2008). Intelligent Decision Support for Evaluating and Selecting Information
Systems Projects
Laudon, K. C., & Laudon, J. P. (2017). Management Information Systems: Managing th
Pujitha GANGARAPU
7/28/20, 10:24 AM
NEW
The management structure for projects look something as follows:
Corporate strategic planning group
: They develop the firm’s strategic plan
IS steering committee
operation
: They are responsible for system development and
Project management
: They oversee IS projects
Project team
: They are responsible for the individual systems
project Organizations need an information systems plan that describes how IT supports the
attainment of their business goals and documents all their system applications and IT
infrastructure components. This should identify and evaluate alternative information
systems projects:
•
•
•
Critical success factors: Organisation must have a clear understanding of its long and short
term information requirements. Personal interviews with top managers and identifying
their goals to develop the firm’s CSFs.
Portfolio analysis: Management can determine the optimal mix of investment risk and
reward for their firms, balancing riskier high-reward projects with safer lower-reward
ones.
Scoring models: Assigns weights to various features of a system and then calculates the
weighted totals.
For selecting and evaluating information systems projects and aligning them with the
firm’s business goals:
•
•
•
•
One must calculate its costs and benefits. Tangible benefits are quantifiable, and intangible
benefits that cannot be immediately quantified may provide quantifiable benefits in the
future.
Benefits that exceed costs should be analyzed using capital budgeting methods to make
sure a project represents a good return on the firm’s invested capital.
Rely on measures of cash flows into and out of the firm; capital projects generate those
cash flows.
Real options pricing models, which apply the same techniques for valuing financial options
to systems investments, can be useful when considering highly uncertain IT investments.
Reply
Purchase answer to see full
attachment