You are on page 1of 10

Assignment No.

: 02

Semester: Summer 2020


Course Name: Computer Information Systems Assignment
Corse Code: BUS516, Section: 02

Submitted To:

Dr. Ummaha Hazra

Submitted From:

Biddut Kundo
Id. No.: 2016645060

Date: 05-Sep-2020

1|Page
Answer to the Question No.: 01

IT infrastructure is defined as the combined hardware, software, network resources and services
required for the survival, operation and management of an enterprise IT environment. IT
infrastructure allows an organization to deliver IT solutions and services to its employees,
partners and customers are usually internal to an organization and deployed within owned
facilities. It is a very critical investment of an organization. An organization has to have solid IT
infrastructure if an organization wants to gain competitive advantage.

IT infrastructures and services are supported by your business strategy, IT strategy, other
information technology and also business objectives. What of IT infrastructures have you
invested it’s depends on your business objectives. If the IT infrastructures and business
objectives are aline then you can see that better services to your customer and supplier as well as
internal employees.

IT Infrastructure Ecosystems are defined by the network of interactions among organization


and between organization and their environment. It is strong connection with each other of
computer hardware platforms, Operating system platforms, Enterprise and other software
applications, Data management and storage, Networking and telecommunications platforms,
Internet platforms, consulting and system integration services.

Technology drivers and infrastructures evolution as declining communication costs and


internet day by day, standard and network effects try to follow by similar kind of organization to
survive in the market.

Cloud computing is the delivery of different services through the Internet, including data
storage, servers, databases, networking, and software. Cloud Computing platform used to
provide computing services that connect employees, customers and suppliers into coherent
digital environment. Cloud-based storage makes it possible to save files to a remote database and
retrieve them on demand.

2|Page
WholeWorldBand is such as virtual recording studio. It is an online stage that provides the
options of collaborating with different artists and creating new videos and music. They generate
revenues with the registered users. It is a global platform. It is accessible via a Web-based app
available on the iPhone and iPad and on Windows and MacOS computers. It allows anyone to
easily make music and videos with or without their favorites artists and friends that can be shared
and enjoyed worldwide. It provides a platform that brings value to users, artists and brands in a
fair and transparent way.

The challenges associated with the design and developments of an information systems
infrastructure to support the new service are:

 Information system infrastructure complexity.


 Handling infrastructure management and governance.
 Uploading the video and audio files, streaming.
 The storage and programming challenges.
 Demands a high level of connectivity and networking.

The new service will require a more advanced and complex information system infrastructure
that would put up various items in the company. Maintaining such complex infrastructure needs
proper planning. The information system infrastructure should be implemented in such a way
that it has a scope for future development.

It is about creating an ecosystem and way of creating music in a fun, positive, engaging and
creative way that supports the musicians, artists and creators of music whether they be amateur
or professional.  

Cloud computing is an appropriate solution to these challenges because it offers a high capability
for the networking of remote servers making it possible to store, control and process data in an
efficient manner. In the Amazon cloud which is very scalable and secure. It handles serving the
video as well as managing the payments, rights management and social media functions.

3|Page
Answer to the Question No.: 02

Non-profits organization is created for many different purposes such as: cultural, economic,
politic, religious, educational, among others. These organizations are granted tax-exempt status
and all contributions made to them are tax deductible, as long as they are properly registered.
Examples of nonprofit organizations include hospitals, universities, national charities, churches,
and foundations.

Fundraising or fund-raising is the process of seeking and gathering voluntary financial


contributions by engaging individuals, businesses, charitable foundations, or governmental
agencies. The funds to start a not-for-profit organization come from their own founding members
or from a special contribution from a third party.

Efficiency level of an organization fundraising efforts depends on:

 Ensuring quality of data (Correctness, accuracy info about subject)


 Fundraising intelligence tool

An organization needs to ensuring quality of data by data quality audit or using data quality audit
software after specific period, which is a structured survey of the accuracy and level of
completeness of the data in an information system. If they find any missing data or there is
incomplete data, they have to fix it.

A fundraising intelligence tool will ensure you’re always acting on the best quality information
to find the best solutions. This detail, though small, can greatly increase an organization’s
fundraising efficiency.

To achieve to increase the efficiency a non-profit organization's fund raising efforts the
type of data is required:

 Total No. of donors.


 Record of donors’ name.
 Donated amount information about last few years.
 Contact details of donors.

4|Page
 Record of who are looking for donations.
 Demographic details of these people.
 Collect Online Donations information
 Data regarding their past donations.
 Make the list of data that are used currently in an organization.
 Make sure that the data collected from the other clients are efficient or right data.

Once all this information is collected, and then transfers all data into a data warehouse which is a
specialized type of database that aggregates data from transaction databases so it can be
analyzed.

The organization can use Business Intelligence (BI) tools to understand how to approach the
potential fund raisers.

An online analytical processing (OLAP) system is the Business Intelligence tools used to
increase the productivity by analyzing the data related to the organization. Online analytical
processing (OLAP) refers to a class of software programs that enable a knowledge worker to
easily and selectively extract and view data from analytical databases. The defining characteristic
of OLAP tools is that they are user driven. In other words, an analyst must issue a query that
specifies what data items the user is interested in. This tool gather the data of the key partnership
company and makes some analysis and review the data and it also applies some techniques to
enhance the data quality.

OLAP tools enable users to analyze multidimensional data interactively from multiple
perspectives and enabling users to view the same data in different ways using multiple
dimensions.

For example:

A non-profit organization can generate report each aspect of information— by using different
dimension like Total No. of donors, Online Donations data, and within specific time frame etc.

5|Page
Answer to the Question No.: 03

Security refers to the policies, procedures, and technical measures used to prevent unauthorized access,
alteration, theft, or physical damage to information systems. To ensure the security we have some control.
Controls are methods, policies, and organizational procedures that ensure the safety of the organization’s
assets, the accuracy and reliability of its records, and operational adherence to management standards.
Such controls protect the confidentiality, integrity and availability of information. It must be needed to
ensure Time to time organization and its member follows the policies, and procedures to protect the
organization.

A distributed denial-of-service (DDoS) attack involves multiple connected online devices,


collectively known as a botnet, which are used to overwhelm a target website with fake traffic. In
a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim
originates from many different sources. This effectively makes it impossible to stop the attack
simply by blocking a single source.

Basically what happened, the hacker plant some malware without notice of user of computer
system, like general people’s computer. Malware automatically run in backdoor of normal
people device and hijacked connected devices that are controlled remotely from a Command &
Control Center by hacker. The hacker sends malware to the target server through normal people
personal computers, mobile phones, and unsecured IT devices without their permission. .
Attackers use malware and other techniques to compromise a device, turning it into a zombie
PC. When the hacker send command from master PC to zombie PC then all together zombie PC
send request to the target server at the same time then the server become crushed. This
collection of zombie PC is called botnet.

 90% of the world’s spam and 80% of the world’s malware are delivered by botnets.

To protect the organization, a management needs to set up establishing a security framework,


have to information systems audit.

6|Page
A device that has been infected often has symptoms such as:

 Unusually slow or frozen system functionality


 Spam and pop-up ads
 Frequent system crashes
 Unknown icons on the desktop
 Redirection from a popular website to an unknown one
 New files or folders created without your permission

No, I think the owner of the zombie computer should not be punished. Because the owner of the
zombie computer is just lack of knowledge to protect him from the attack, which is not a crime.
They also become victim of this attract.

I think we need to provide basic training to them how to protect their personal devices from
hacker. And only social awareness will be the best solutions of this issue. We can follow
following types to protect our devices from hacker:

 Keep software and security patches up to date.


 Install a proactive security solution.
 Conduct screening and background checks.
 Avoid unknown email attachments.
 Think before clicking any link.
 Keep sensitive data out of the cloud. 

This space has been kept blank intentionally

7|Page
Answer to the Question No.: 04

A data breach is any incident where confidential or sensitive information has been accessed
without permission. Breaches are the result of a cyber attack where criminals gain unauthorized
access to a computer system or network and steal the private, sensitive, or confidential personal
and financial data of the customers or users contained within.

Following Data Collect from Identity Theft Resource Center (ITRC):

Banking/Credit/ Busines Educationa Government/Militar Medical/Healt


  Financial s l y h
2015 10% 40.30% 7.80% 7.30% 34.80%
2016 4.80% 45.30% 9% 6.60% 34.40%
2017 8.50% 55.10% 8% 4.70% 23.70%
2018 12.80% 43.70% 7.30% 8.40% 27.80%

8|Page
Data Breach From 2015 to 2018
60%

50%
Banking/Credit/Financial
40% Business
percentages

Educational
30% Government/Military
Medical/Health
20%

10%

0%
2015 2016 2017 2018

The graph shown that Business category data is the number of data breaches increasing fastest.

A data breach occurs when a cybercriminal occupies a data source and extracts confidential
information. This can be done by accessing a computer or network to steal local files or by
bypassing network security remotely. While most data breaches are attributed to hacking or
malware attacks, other breach methods include insider leaks, payment card fraud, loss or theft of
a physical hard drive of files and human error. The most common cyber attacks used in data
breaches. A data breach can damage a business’s reputation and ruin customer trust in a
company.

I think data breaches increasing fastest day by day in Business sector due to:

9|Page
 Weaknesses in the company’s security infrastructure.
 Security vulnerabilities go unfixed for long periods of time.
 Employees don’t know their basic data security measurement. (Human Fault and Error)

Some of the mistakes employees make that compromise data include using weak passwords,
falling for phishing scams, disclosing sensitive information to others, and accidentally sending
vital information to the wrong recipient.

 Don’t update their software and operating systems within regular interval.

Using malware, hackers can access the database of a company to get all the important details
they need.

  Improperly disposed of documents can cause data breaches in business area.

Sometimes hackers target specific company to lose their business, to see decreases in their
market value by decreasing their stock value, for declining a company’s reputation in market
etc. 

Data breaches are more common today than ever before. Companies must understand the
consequences of a data breach so they can take the necessary steps to mitigate their risk and
protect their company and customers. 

10 | P a g e

You might also like