SlideShare a Scribd company logo
WELCOMEChapter 11Group: Anju, Ashok, Justin, Joe and Christina
Suppose your college or organization is considering a new project that would involve developing an information system that would allow all employees and students/customers to access and maintain their own human resources-related information, such as address, marital status, tax information, and so on.
Identify positive and negative risks and strategies for addressing each risk. Exercise #1
Negative Risk: Environmental threats such as a bursting pipe can quickly flood a computer room and cause damage to an organization’s IT assets and resources. Solution: Protect IT assets from fire damage (e.g., requirements and procedures for the use of fire extinguishers, tarpaulins, dry sprinkler systems, halon fire suppression system)Provide emergency power source (e.g., requirements for uninterruptible power supplies, on-site power generators)Positive Risk: Any sort of information is easily available on a single click via the various forms and built in software applications.Christina
Negative Risk:Not all stakeholders might be interested in managing their information. So, the new system might loose some potential data.Positive Risk:  Users will feel more secure because they themselves can update their private information.Ashok
Negative Risk:When a person is allowed to provide their information, it is not necessary they will provide there real information.Solution:Some sort of  authentication procedure should be implemented.Positive Risk: Most of the information are always updated.Anju
Negative Risks: One negative risk would be in people posing as others in order to obtain or alter their information, either in specific cases or on a much wider scale.  Solution: One method of tackling such a risk would be in establishing a method of authentication that can ensure people are who they say they are.Positive Risk: One positive risk would be that information would be the most accurate and up to date with people having control over it, yet this can be a problem if many individuals either choose or forget to maintain this information.Solution: As a solution, the company can notify people in a rigorous effort to keep their information current and up to date along with why it is important to do so.Justin
Positive Risks: All data for each individual in the organization would be kept in one central location and, if maliciously accessed, could destroy internal processes and hinder work flow.Solution:Create several security barriers and properly encrypt data. Create secure platform for users to access and add data.Positive Risk:All data would be kept in one location and easily accessible by the HR staff. Data would also be more updated and allow HR staff to concentrate on other areas of operation.Joe

More Related Content

DOC
Student information-system-project-outline
PDF
Online examination documentation
DOC
SRS on online auction system
PPTX
Harmfull mail scanning
PPTX
Quizz app By Raihan Sikdar
PDF
Design of a prototype web based students’ record management system – webstrems
PPT
DFD For E-learning Project
PPTX
ONLINE EXAMINATION on ASP.NET
Student information-system-project-outline
Online examination documentation
SRS on online auction system
Harmfull mail scanning
Quizz app By Raihan Sikdar
Design of a prototype web based students’ record management system – webstrems
DFD For E-learning Project
ONLINE EXAMINATION on ASP.NET

What's hot (20)

DOC
Learning Management System-SRS Modified(Semi-Final)
PPT
Online quiz by danish & sudhanshu techlites
PPTX
Online computer lab management system
PPTX
School Management System
PPTX
Medical Store Management System Software Engineering Project
PDF
Documentation project of college management [1]
PPTX
Foodies- An e-Food inventory Management Portal
PDF
Understanding the Problem Space and Conceptualizing in HCI
PDF
Online Examination System For Android AAD Report Akshay Kalapgar
PPTX
Software engineering - Topics and Research Areas
PPTX
Control Flow Testing
PPTX
Online examination system project ppt
PPSX
Course Registration System-Problem Statement, SRS,ERD, DFD, Structured Chart
DOCX
Job center
PDF
Online Shopping Cart Business Requirement Dcoument
PPTX
Online Examination System Presentation
PPT
Designing applications with multimedia capabilities
PPTX
University Management System
PDF
14.project online eamination system
Learning Management System-SRS Modified(Semi-Final)
Online quiz by danish & sudhanshu techlites
Online computer lab management system
School Management System
Medical Store Management System Software Engineering Project
Documentation project of college management [1]
Foodies- An e-Food inventory Management Portal
Understanding the Problem Space and Conceptualizing in HCI
Online Examination System For Android AAD Report Akshay Kalapgar
Software engineering - Topics and Research Areas
Control Flow Testing
Online examination system project ppt
Course Registration System-Problem Statement, SRS,ERD, DFD, Structured Chart
Job center
Online Shopping Cart Business Requirement Dcoument
Online Examination System Presentation
Designing applications with multimedia capabilities
University Management System
14.project online eamination system
Ad

Similar to Chapter 11 group assignment (20)

DOCX
Replies Required for below Posting 1 user security awarene.docx
PDF
Vskills Certified Network Security Professional Sample Material
PDF
7 Practices To Safeguard Your Business From Security Breaches!
PDF
Ijnsa050201
PDF
IRJET- Data Leak Prevention System: A Survey
PDF
Vulnerability Assessment ( Va )
PDF
Cultivate a stronger corporate culture to enhance cybersecurity
PPTX
PACE-IT, Security+ 2.5: Incident Response Concepts
DOCX
Posting 1 Reply required for belowBusiness costs or risks of p.docx
PDF
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)
PDF
Privacy Management System: Protect Data or Perish
DOCX
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
PPTX
Cyber Security and the CEO
PDF
Experion Data Breach Response Excerpts
DOCX
BBA 3551, Information Systems Management 1 Course Lea.docx
PDF
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
PDF
12 Proactive Steps to Handle a Data Breach Effectively
PDF
Cybersecurity risk assessments help organizations identify.pdf
PDF
CyberSecurityAwareness cyber_Awarenesscyber_Awareness.pdf
PDF
An Improved Method for Preventing Data Leakage in an Organization
Replies Required for below Posting 1 user security awarene.docx
Vskills Certified Network Security Professional Sample Material
7 Practices To Safeguard Your Business From Security Breaches!
Ijnsa050201
IRJET- Data Leak Prevention System: A Survey
Vulnerability Assessment ( Va )
Cultivate a stronger corporate culture to enhance cybersecurity
PACE-IT, Security+ 2.5: Incident Response Concepts
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)
Privacy Management System: Protect Data or Perish
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
Cyber Security and the CEO
Experion Data Breach Response Excerpts
BBA 3551, Information Systems Management 1 Course Lea.docx
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
12 Proactive Steps to Handle a Data Breach Effectively
Cybersecurity risk assessments help organizations identify.pdf
CyberSecurityAwareness cyber_Awarenesscyber_Awareness.pdf
An Improved Method for Preventing Data Leakage in an Organization
Ad

More from jandrewsxu (20)

DOCX
Resume
DOCX
Resume
DOCX
Chapter #11 lab
DOCX
Chapter #8 lab
DOCX
Chapter #4 lab
DOCX
Modulation schemes 8
DOCX
Modulation techniques 7
DOCX
Bluetooth wi fi wi max 2, 3
DOCX
Acsg 520 assignment #6 ---
DOCX
Acsg 520 assignment #4 --
DOCX
First hw assignment #1 --
DOC
Journal
DOC
Assumptions, applicable measures, er diagram
XLSX
Data dictionary
DOC
Assumptions, and applicable measures
PPTX
Final presentation(v5)
DOC
Database chapter 11 homework
DOC
Database chapter 10 questions
DOC
Essay #2 ethical considerations
DOC
Midterm paper medical records
Resume
Resume
Chapter #11 lab
Chapter #8 lab
Chapter #4 lab
Modulation schemes 8
Modulation techniques 7
Bluetooth wi fi wi max 2, 3
Acsg 520 assignment #6 ---
Acsg 520 assignment #4 --
First hw assignment #1 --
Journal
Assumptions, applicable measures, er diagram
Data dictionary
Assumptions, and applicable measures
Final presentation(v5)
Database chapter 11 homework
Database chapter 10 questions
Essay #2 ethical considerations
Midterm paper medical records

Chapter 11 group assignment

  • 1. WELCOMEChapter 11Group: Anju, Ashok, Justin, Joe and Christina
  • 2. Suppose your college or organization is considering a new project that would involve developing an information system that would allow all employees and students/customers to access and maintain their own human resources-related information, such as address, marital status, tax information, and so on.
  • 3. Identify positive and negative risks and strategies for addressing each risk. Exercise #1
  • 4. Negative Risk: Environmental threats such as a bursting pipe can quickly flood a computer room and cause damage to an organization’s IT assets and resources. Solution: Protect IT assets from fire damage (e.g., requirements and procedures for the use of fire extinguishers, tarpaulins, dry sprinkler systems, halon fire suppression system)Provide emergency power source (e.g., requirements for uninterruptible power supplies, on-site power generators)Positive Risk: Any sort of information is easily available on a single click via the various forms and built in software applications.Christina
  • 5. Negative Risk:Not all stakeholders might be interested in managing their information. So, the new system might loose some potential data.Positive Risk: Users will feel more secure because they themselves can update their private information.Ashok
  • 6. Negative Risk:When a person is allowed to provide their information, it is not necessary they will provide there real information.Solution:Some sort of authentication procedure should be implemented.Positive Risk: Most of the information are always updated.Anju
  • 7. Negative Risks: One negative risk would be in people posing as others in order to obtain or alter their information, either in specific cases or on a much wider scale.  Solution: One method of tackling such a risk would be in establishing a method of authentication that can ensure people are who they say they are.Positive Risk: One positive risk would be that information would be the most accurate and up to date with people having control over it, yet this can be a problem if many individuals either choose or forget to maintain this information.Solution: As a solution, the company can notify people in a rigorous effort to keep their information current and up to date along with why it is important to do so.Justin
  • 8. Positive Risks: All data for each individual in the organization would be kept in one central location and, if maliciously accessed, could destroy internal processes and hinder work flow.Solution:Create several security barriers and properly encrypt data. Create secure platform for users to access and add data.Positive Risk:All data would be kept in one location and easily accessible by the HR staff. Data would also be more updated and allow HR staff to concentrate on other areas of operation.Joe