Tuesday, May 5, 2020

IT Strategy and Policy Implementation of a Comprehensive Enterprise

Question: Discuss about the IT Strategy and Policy for Implementation of a Comprehensive Enterprise . Answer: Introduction Case Description This report is about the development of an effective infrastructure for protecting the network of an MNC from the virus attacks. The selected case study organization is eBay. The problem in the existing system will be identified and then effective action plan will be developed after analyzing the problems. eBay is an American MNC and e-commerce company, which provides both the customer-to-customer and business-to-customer services via online platform. The customers of the company have their online account in the web server (International Business Times, 2016). The security vulnerable of the companys system could enable the hackers to attack the system and inject virus for affecting the JavaScript code. This may be the reason of facing many issues in the business. The customers may face huge problems as they have the online transaction details in the online accounts (Peltier, 2013). The online accounts of the company hacked or affected by the virus several times in the past few years. The system has been upgraded but there are some vulnerabilities, which may be malicious attacks to the system and theft of confidential data and the personal details of the customers. The main objectives of this assignment are as follows: To identify the potential risks of the system of the case study company To analyze the risks for identifying the particular sections To develop a strong defense system for preventing further virus attacks Digital Collaboration in eBay Business System eBay has e-commerce system i.e. it conducts business online. Digitalization has played a major role in the development of the e-commerce system and eBay is one of the companies that have taken up e-commerce system as their business method. The digital collaboration in eBay business system is evident from the following facts. Business Set Up eBay sells products to the customers through the online retail system i.e. the bookings of products are made online and the sale receipts and other documents are generated and sent to the student online. Information System eBays information system has also been upgraded with the help digitalization. eBay conducts all its business related operations through internet services. eBay has a specific cloud server client in which, all the information are stored. Handling of Confidential Information eBay stores all the confidential information with the help of the digital media. This confidential information includes customer details (address, phone number, etc.), business data, financial reports, business strategy documents and others (Kolkowska Dhillon, 2013). Securing of the all these data will not have been possible without the digital media. Methodology and Discussion Methodology For this assignment, the methodology followed is Soft Systems Methodology (SSM). This methodology helped to analyze the business related problems and their relations with information system of the company. Moreover, the works on information system by reputed researchers have been analyzed and used as reference for conducting the research on this particular case study. Discussion Problems Identified The main problem identified with the business system of the company is the security of its servers and confidential information. It has been reported that the information stored by the company is vulnerable to major security risks that may result in the breach of security and loss of vital information of the company as well as its companies (Jouini et al., 2014). According to a study conducted recently, the information system of eBay can easily be hacked and compromised by unethical hackers by insertion of malicious codes and viruses. The target of hackers might be retrieval of companys business strategy documents or even personal information of the customers. Cause The main cause of this possible security threat is the lack of proper security measures taken by the company. The company has subscribed to its own online cloud server client but has failed to implement security softwares and hence, the information stored in the cloud server is vulnerable to malicious attacks. Consequences The consequences of these attacks will be severe for the company as well as its clients. The malicious attacks will not only access confidential business information but also the personal details of the clients (Crossler et al., 2013). All these can easily be misused by the unethical hackers. This will also result in significant financial loss and reputation of the company. Potential Solutions There are several potential solutions for the issue. Firstly, the company has to install security firewall softwares in all the systems used by the employees. Secondly, the company has to employ security experts to secure the cloud servers where the majority of the information is stored (Zissis Lekkas, 2012). Finally, the information system of the company should be upgraded further to make it more resistant to virus and other malicious attacks. Analysis of Findings From the analysis of the problems, the question comes regarding the possible costs that might have to be spent by the company in order to mitigate the issues identified with the information system. The estimated costs are as follows. Process Estimated Cost Estimated Time of Implementation Hardware Upgradation $150,000 3 Months Basic Firewall Software $25,000 1 Month Anti-virus Software $50,000 1 Month Cloud Security Solution $100,000 2 Months Back Up Storage Server $50,000 15 Days Data Encryption Software $50,000 2 Months TOTAL $425,000 Around 10 Months Conclusion From the case study analysis, it can be concluded that due to the success of eBay in the e-commerce system, many unethical hackers will target to hack its servers and compromise confidential business and customer information. The information system of the company is very much vulnerable to malicious attacks. Hence, the company must take immediate steps in order to prevent any such malicious attack that may result in loss of information as well as money. Recommendations The recommendations for the company are as follows: The company has to install security firewall softwares in all the systems used by the employees. The company has to employ security experts to secure the cloud servers where the majority of the information is stored. The information system of the company should be upgraded further to make it more resistant to virus and other malicious attacks. References Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., Baskerville, R. (2013). Future directions for behavioral information security research.computers security,32, 90-101. International Business Times (2016). All 160 Million eBay Users Can Be Hacked: Fake Sales Listings Make Users Vulnerable To Infection. Retrieved 29 August 2016, from https://www.ibtimes.com/all-160-million-ebay-users-can-be-hacked-fake-sales-listings-make-users-vulnerable-2293820. Jouini, M., Rabai, L. B. A., Aissa, A. B. (2014). Classification of security threats in information systems.Procedia Computer Science,32, 489-496. Kolkowska, E., Dhillon, G. (2013). Organizational power and information security rule compliance.Computers Security,33, 3-11. Peltier, T. R. (2013).Information security fundamentals. CRC Press. Zissis, D., Lekkas, D. (2012). Addressing cloud computing security issues.Future Generation computer systems,28(3), 583-592.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.