You are on page 1of 10

COMPUTER INFORMATION SYSTEMS

MIS – 107
MID Term – 2
Name: Ferdaus Shabab Hossain
Student ID: 2031219630
Contact number: 01883501289
E-mail: ferdaus.hossain@northsouth.edu

Contents
Answer to question number 1:....................................................................................................................2
Answer to question number 2.....................................................................................................................4
Answer to question number 3.....................................................................................................................6
Answer to question number 4:....................................................................................................................8
Answer to question number 5:....................................................................................................................9
References.................................................................................................................................................10

1
Answer to question number 1:
Customer identification tool is that the means that to make a portrait of your customers to assist you create style
choices regarding your service.

Advantages of customer profiling:

 Targeted Content
 Cheaper ads
 Customer loyalty

Tools I’ll be using in my business to profile my customers:

 HubSpot CRM - is completely free, and it aims at serving to sales and promoting groups manage their
pipeline, alter mundane tasks, and speed up the sales method.
 Clearbit - a promoting information engine that helps a business perceive current customers, determine
prospects, and individualize each interaction.
 UpLead - a lead-generation platform that gives targeted sales leads, the platform conjointly permits
businesses to quickly notice, connect, and have interaction with qualified prospects.

Below are some of the benefits of using servers:


- Reliable
- Scalable
- Adds seamless connectivity
- Improves collaboration
- Helps to expand faster

 A server is a software or hardware device that accepts and responds to requests made over the network.
The client that makes the request and receives the response from the server is called the client.

They manage network resources. For example, a user can configure a server to control access to a network, send /
receive email, manage print jobs, or host a website. You can also perform intensive calculations. Some servers
are dedicated to a specific task, often referred to as dedicated. However, many servers today are shared servers.

They square measure normally wont to deliver services that are perpetually needed, most servers square measure
ne'er turned off. Consequently, once servers fail, they'll cause the network users and company several issues. to
mend these problems, servers square measure normally came upon to be fault tolerant or a back server is about to
serve the aim throughout the failure of one.

Types of servers:

1. Web Server: an internet server could be a computer virus that serves requested hypertext markup
language pages or files. During this case, an internet browser acts because the consumer.
2. Proxy Server: A proxy server is software package that acts as Associate in Nursing mediator between
Associate in Nursing end point device, like a pc, and another server from that a user or consumer is
requesting a service.
3. Application Server: An application worker is a program in a PC in a disseminated network that gives the
business rationale to an application program.

2
4. Policy Server: A policy server could be a security part of a policy-based network that has authorization
services and facilitates following and management of files.
5. Database Server: A database server is accountable for hosting one or additional databases. Shopper
applications perform info queries that retrieve knowledge from or write knowledge to the info that's
hosted on the server.
6. Communication Server: Maintains Associate in nursing atmosphere required for one communication end
(user or devices) to search out different endpoints and communicate with them. It’s going to or might not
embrace a directory of communication endpoints and a presence detection service, counting on the
openness and security parameters of the network.
7. Computing server: Shares immense amounts of computing resources, particularly mainframe and
random-access memory, over a network.

3
Answer to question number 2

Packet switching is comparable to message change victimization short messages. Any message surpassing a
network-defined maximum length is variable into shorter units, known as packets, for transmission; the packets,
each with an associated header, square measure then transmitted on an individual basis through the network.

Packet switching breaks information into a number of elements which might be packaged in specifically formatted
units called packets. Those are usually routed from the source to the destination the use of community switches
and routers, then the facts is reassembled on the destination. Every packet consists of cope with data that
identifies the sending computer and supposed recipient. Using those addresses, network switches and routers
decide how first-class to transfer the packet between hops at the path to its vacation spot. There are free apps
including Wireshark that capture and think about the records if important. Some examples of packet switching are:

 Ethernet: Ethernet that means could be a system that's wont to connect variety of computers to create a
(local area network). This technique uses protocols for dominant information transmission by avoiding
immediate transmission employing a range of systems. For its association, the quantity of conductors is
critical to produce the information transmission framework.
 Internet Protocol (IP): It is a collection of rules that dictate however information ought to be delivered
over the general public network (Internet). typically works in conjunction with the transmission
management protocol (TCP), that divides traffic into packets for economical transport through the
Internet; along they're stated as TCP/IP.
 The User Datagram Protocol (UDP): It could be a communication protocol used across the web for
particularly time-sensitive transmissions like video playback or DNS lookups. It hurries up

4
communications by not formally establishing an affiliation before information is transferred. This enables
information to be transferred terribly quickly, however it also can cause packets to become lost in transit
— and build opportunities for exploitation within the kind of DDoS attacks.

The four layers of TCP/IP model:

 Internet Layer: This layer defines the protocols that square measure chargeable for logical transmission of
information over the complete network.
 Network Access Layer: It is the link layer appearance out for hardware addressing. It permits for the
physical transmission of information
 Transport Layer: It is conjointly called host to host layer. It is answerable for end-to-end communication
and error-free delivery of knowledge.
 Application Layer: It is additionally called method layer chargeable for node-to-node communication and
controls user-interface specifications. A number of the protocols gift during this layer are; hypertext
transfer protocol, HTTPS, FTP, TFTP, Telnet, SSH, NTP, DNS etc.

To get IP to their destination, the packets are liberated to take any path of transmission and arrive in any order. As
a result of the routers on the means don't guarantee that everyone science packets are going to be delivered. TCP
may be a transport layer between information science and net applications that guarantees that knowledge
transferred between 2 computers won't be lost and ensures that packets square measure received within the
correct order. If bound packets in a very transmission square measure lost or broken, protocol sends messages
back to the supply machine, requesting it to resend the knowledge.

5
Answer to question number 3
Website chosen: McDonald’s

Information they collect:

 Personal details like name and address


 Transaction information like products a customer buys and methods of payment
 Account information like username and password
 Profile information like products or services a customer prefers

How they share it:

They do not share any information, except for personal information. They provide the information to vendors who
provide services to them, like fulfilling orders, providing data processing and other IT services, carrying our
researches etc.  They also share the personal information with vendors and partners who use the information to
detect or prevent fraud for McDonald’s.

How they protect it:

McDonald's is committed to taking acceptable measures designed to stay your personal info secure. Their
technical, structure and physical procedures area unit designed to safeguard personal info from accidental,
unlawful or unauthorized loss, access, disclosure, use, alteration, or destruction. Whereas they create efforts to
safeguard the customers' info systems, no website, mobile application, automatic data processing system, or
transmission of data over the net or the other public network is sure to be 100% secure.

FTC FIP: It represents government exchange commission's cheap knowledge observe approaches. These area unit
the rules that area unit utilized to form the client's knowledge ensured.

There are a unit 5 center standards of security that address these standards they are:
1.Notice/Awareness
2.Choice/Assent
3.Access/Participation
4.Integrity/Security
5.Enforcement/Redress

As per the higher inquiry I’m utilizing Google protection strategy connect with lightweight the independent agency
FIP standards.

(i) The first rule of independent agency FIP is Notice/Awareness. Shoppers ought to be force out of a
substance's knowledge rehearses before any near to home knowledge is gathered from them. The
organizations need to explicitly inform many or all of the attendant. Distinguishing proof of the
substance gathering the knowledge. Distinguishing proof of the utilizations to that the knowledge are

6
going to be place. Distinguishing proof of any expected beneficiaries of the knowledge. The idea of
the knowledge gathered and also the ways by that it's gathered. Regardless of whether or not the
arrangement of knowledge is willful or needed.
(ii) The second guideline of independent agency FIP is Choice/Assent: Decision and assent in an online
gathering knowledge implies offer the purchasers the choice to manage however their data is
employed. Google offers an alternate to manage however their data is employed. We can do likewise
by utilizing google action to envision and management what information it ought to utilize. Client
need to have the facility to concede the consent to utilize their data.
(iii) The third guideline of independent agency FIP IS Access/Participation. Not simply the consumers’
capability to envision the knowledge gathered. Nevertheless to boot to examine if the knowledge is
employed within the correct manner or not. This should be low-cost and convenient to be useful to
the client.
(iv) The fourth guideline of independent agency FIP IS Integrity/Security. The organization need to sustain
the trustiness and security .The information of shopper ought to be created certain concerning and at
any price it ought not to be spilled to the outsider. It’s the duty of the organization. The organization
need to have its own to confirm that the knowledge is secured. If there ought to be a happening of
google however google secure our data is because the data shopper created moves between our
gadgets, Google Services and their server farms. So, it's ensured by created certain concerning
innovation like https and transport layer security. It to boot follows bound conventions to maneuver
data one spot to successive. Here HTTPS implies hyper content exchange convention. Google utilizes
treats and that they likewise scramble the knowledge and what is more inscribe character treats as a
matter in fact.
(v) The last rule of independent agency FIP IS Enforcement/Redress: To guarantee that organizations
follow the cheap knowledge observe ways there ought to be authorization measures. The
independent agency distinguished 3 sorts of implementation measures: self-guideline by the info
authorities or a delegated controller body. Personal cures that offers reason for activity for person
whose knowledge has been abused to sue violators and government authorization that may
incorporate common and criminal penalties leveled by the government.

7
Answer to question number 4:
Two kinds of threats that may damage a business organization. They’re external and internal threats.

External Threats
External threats square measure from outside the organization, that square measure have an effect on the
performance of the organization.

Some examples of external threats:

1. Laws and legal liability

2. Competitors

3. New technologies

4. Political systems

5. Economic uncertainty

Internal Threats
Internal threats square measure from within the organizations. Internal threats square measure violate the
elemental principles of the organization.

Some examples of internal threats:

 Unauthorized employees
 Theft of company devices
 Loss of data

Internal threats square measure tougher to spot and harmful to the organizations. As a result of external threats
square measure acquainted to each organization. And additionally it's straightforward to handle by the
organization. However encase of internal threats it's troublesome to spot. As a result of it's a fast attack from
within the organization.

For example, if associate degree worker access knowledge, on the far side his privileges. It’s harmful to the
organization and conjointly rough to spot as a result of it's a sharp attack from within organization.

8
Answer to question number 5:
Yes, in today's fast-paced world of cybercrime and information breaches, it is important for companies to invest
not only in physical security, but also in protecting their data and information.

Investing in safety and controls has some advantages: - Safety solutions can help stop an accident and


minimize the impact after any unnecessary event occurs. It also provides some taxes and facilitates you with
security solutions for intrusion or accident insurance leisure forecasting.

Business Information System Protection Tools:

1. Firewall: Helps the business prevent unauthorized connections, malware, and other security threats.


2. Endpoint assurance like antivirus: These tolls makes a
difference in securing frameworks from different infection and malware attacks. For example: Avast.
3. Data loss prevention: These tools can be used to protect sensitive data, they monitor network traffic
and are the best tools to detect any hacker activity. Interference and alert tools such as
interference alarms and camera systems help improve security controls as they can also be
monitored remotely.

9
References
 Privacy Policy. (2020, September 8). McDonald’s. https://www.mcdonalds.com/us/en-us/privacy.html

 Laudon, K., & Laudon, J. (2017). Management Information Systems: Managing the Digital Firm (15th ed.).

Pearson.

 Packet Switching. (n.d.). Techopedia. https://www.techopedia.com/definition/5603/packet-switching

 Packet Switching. (2019, July 18). Lifewire. https://www.lifewire.com/packet-switching-on-computer-networks-

817938

 TCP/IP. (n.d.). TechTarget. https://searchnetworking.techtarget.com/definition/TCP-IP

 Fountain, Thomas. Introduction to Computer Consulting. 1999.

 Taschek, James. "Unclogging the Pipes" Internet Business 2 Nov. 1998. 

 Yanowitz, Jason. "Under the hood of the Internet: An overview of the TCP/IP Protocol Suite." ACM Crossroads 1994. 

 Internet Protocol.(n.d.).Tutorialspoint.

https://www.tutorialspoint.com/internet_technologies/internet_protocols.htm

 Customer Profiling. (2020, July 21). OBERLO. https://www.oberlo.com/blog/customer-profile#:~:text=A%20customer

%20profile%20(sometimes%20referred,characteristics%20of%20a%20company’s%20customers.&text=Building%20a

%20customer%20profile%20can,in%20turn%2C%20increase%20your%20profits.

 Customer Profiling. (2020b, July 24). Quora. https://www.quora.com/What-customer-profiling-tools-are-available-in-

the-market

10

You might also like