You are on page 1of 5

Name :Rai M.

Ibtisam

ID 18U00036

Case study 1
A . This exercise represents the problem of vulnerabilities of information system to social engineering. In
fact to manage the access administration process, it needs to be controlled by skilled, trained and
expensive technical resources. Every employee has different a different type and magnitude of access
into an organization’s information system depending on the where they are in an organizations
hierarchy or their department. People in upper management like the board of directors would have
access to every file or data of an organization where someone like an intern would have very limited
access to only certain relevant data. Since some organizations are so big the administrators haven’t met
every employee and hackers take advantage of the gap in communication. The hacker puts in effort to
get orientated by the organization and learns about its structure and that who’s responsible for what.
Organizations even post this information online in the form of employee directories which facilitates the
hackers. The hacker knows who, Administrators to talk to and engages in identity theft by pretending to
be an employee in the organization. The hackers are able to bluff the administrators by impersonating
an employee through emails and calls and is able to gain access to the companies IS. The main business
problem is that there is a lack of authentication in an organization to grant access to their IS systems.
Anyone with proper research and a strategy can gain this access which could be detrimental for the
company.

b.. Malicious intruders seeking system access sometimes trick employees into revealing their passwords
and employees have access to privileged information Several ways in which employees can be tricked by
hackers are the following:

Identity theft: Hackers obtains key pieces of personal information and pretend to be someone else such
as in this case study. Someone could pretend to be an employee who’s above the administrator
hierarchy wise that could pressurize the administrator to fall into the trap.

Phishing: Involves setting up fake Web sites or sending e-mail or text messages that look like those of
legitimate businesses to ask employees for confidential personal data. The hacker could send emails
pretending to be an employee to other employees to as confidential information.

Pharming: Redirects users to a wrong Web page. Employees can be redirected to a fake employee portal
and can get the passwords for the legitimate portal.

Spoofing and Sniffing: Hackers can eavesdrop through a program that monitors information traveling
over a network and can get access to passwords and Log in ID’s.
c. There are technologies and tools for protecting information resources and reduce an organization’s
exposure to social engineering and hacking.

Intrusion Detection Systems & Unified Threat Management Systems: Monitoring tools placed at the
most vulnerable touch points and A combination of security tools, including firewalls, virtual private
networks, intrusion detection systems, and Web content filtering and Antivirus and Antispyware
Software.

Identity Management and Authentication: Confirmation that a person is the same person they are
claiming to be. Biometric authentication and cards with chips must be used

Firewalls, Intrusion Detection Systems, and Antivirus Software: Prevent unauthorized users from
accessing private networks. The firewall identifies names, IP addresses, applications, and other
characteristics of incoming traffic and blocks out any request that is against the access rules.

Encryption and Public Key Infrastructure: Messages between employees are end to end encrypted and
decrypted when received

Case study 2
a. There are different business models being used in this case study such as
Portal: Frist model discussed in this case is the portal model. This provides the initial points of
web along with a specialized content. Like in this case Microsoft MSN Auto Web site as well as
the auto giants sites are portal that provides us a specialized content we want.

E-taller : In this case study they have also discussed about E-taller who directly sell the car to the
consumer such as the consumer buying directly from the Ford, GM or any car site .This helps the
cut the middle person which is dealer in this situation

Market Creator: in this case study they also have discussed market creator .For example
Autobytel.com in this case is a site that creates a digital environment for the consumers and
local car dealers .This site refers to both new as well as old cars .So from this site the local
dealers and consumer get connected with each other .

Service Provider: In this case they also have discussed the service provider. The service is
provided with the purchase of the car like in this case CarBuyingTips.com provides the service to
customize the a car, van, truck etc. .They provide different services related to your car
beforehand you make your purchase

b. The reasons there is a growth in the e-commerce sites is that it provides all the information from
the world .If you want to buy a car you can physically go to limited dealers or car showrooms
but using e-commerce it makes you more ubiquitous means that it provides you information
from all around the world by just sitting at a place. One of the reasons for the growth is that of
richness .On e-commerce sites here is a lot more information about a specified car you want
.There a virtual world of videos picture and audios from which you can select the car. Another
reason is the information density is more on the e-commerce sites because you can reviews
about the quality of car and material of car so it provides a lot of options from which you can
compare .One of the best feature of e-commerce is the price and cost transparency .From price
transparency you can know the exact price of the car which helps to make a better decision for
purchase .Similarly from cost transparency you can know the cost at which dealers have buried
the cars and know the expenses and stuff made of that car. E- commerce sites also helps to cut
the middle dealers which make the desired car less expensive too
One of the biggest limitations of e-commerce is facing is of security. People are reluctant to
provide there personal and finical information’s because of stealing of the data and
information .Product suitability is also a limitation faced by the e-commerce because the sum
the car or product delivered is not up to the expectation or there si some faults in that desired
product. Legal issues is also a limitation of the e commerce because due to cyber laws are
sometimes different fro different country so it become difficult to send buy products which
always require some legalities like car

C There are different features of internet to make the e-commerce websites like internet helps
to increase the diversity and help the increase the reach of a e-commerce site .Web and internet
help them to connect to worldwide and help them to reach large number of the audience by
increasing the reach. The internet and web also help them to advertise the product through
different social media platforms
The one way car dealers can market their product through e-commerce is Adverting revenue
model, through which they promote their product through adverting to different sites and
different social media platforms .This model will help the dealer to increase the reach.
Case study 3
a. Business intelligence system is providing many solution to the problems being faced the
Montgomery Country School in this case. Frist of all the school district office of shared
accountability is using business intelligence to get the data of all the students who take algebra
in middle school or read below grade level. Also the strict Edline and M-Stat systems alert the
principal about the students who are failing so that he can make decision on the choice of the
solutions he have and implement it like after school tutoring and etc. . Business intelligence also
helped the school to weigh down the school, district between the green and red zone. They
have initiated a plan which collects data regarding student scores, grades and identifying the
learning problem he is facing which will help them to increase the learning performance. Using
business intelligence they are getting information about the problems faced by the students. If a
student id having hard time in studies like poor grades then both the school administration and
parents gets informed .In this way principal can analyze the students’ performance over a
course and make decision regarding the solution to that problem.
• The inputs of the system is that a connection between all the schools should be made so that
there is a proper infrastructure of business intelligence system. Infrastructure is used as
warehousing, integrating, reporting, and analysing data that comes from school. This will help
the BI to find the different academic problems and design a program to find out solutions to
these problems and choose best possible option for that and then implement in that
• The BI solves the decision which require the data collection and make a solution oriented
decision according to that .The decision are can be un structured, semi structured or
structured .This helps level of management senior middle as well as operational management.
The decision which will help school administration to make better decision.
• BI decisions solutions are not limited to one or two levels in a organizational infrastructure .It
helps all the way from upper to lower management to make decision which provide solutions .It
helps to solve different type of decision like those in which the decision maker must provide
judgment and insight to solve the problem. Also structured decision which involve a definite
procedure for handling them and also semi structured decisions which is involves these both
type of decision

B The decision making process for this BI involves:

Intelligence: In this the developer identify the problems which the students are facing .the academic
problem like poor grades or learning difficulty is included in it .All the different problem students are
facing are found in this process then comes

Design: In this a program is design a program to find the solutions to the problem. The program is design
in which they can get school administration as well as the parents involve to get the information about
the problems that students are facing then comes

Choice: It is to choose the best possible solution .The solution that will help the students’ school
administration as well as the parents’ .A solution which will a long term and also cost benefit then
comes

Implantation :The most important process is to implement a solution that have been found .This is
where the school administration make sure that they are working as they needed to or not
C. There are different business intelligence element that can be implemented in educational sector.
Frist identifying the requirements of this system the funds must be calculated for the potential
implementation of this system and its hardware and software into the educational sector .A combined
data warehouse would be needed for collection of data from the business environment in this case
schools. Business intelligence infrastructure such as the data warehouse, hardware and software all
must be used and must be compatible with each other since multiple schools will be linked to the
system therefore standardization is a must. Business analytics toolset will be needed to arrange student
data statistically. Managerial users and methods will forecast student performance so student can be
provided with help before it’s too late. Student performance reports and delivered through delivery
platforms to support decision making. Lastly a user interface would be used which could be something
like an online portal or an app to facilitate parents into seeing the reports of their children. A lot of the
schools already have apps for these purposes. Combination of these business intelligence tools can be
implemented in the schools

You might also like