What are the security issues that should be addressed

Assignment Help Computer Network Security
Reference no: EM131114104

Online golf shop

Overview

For the final project in this course, you are being asked to apply the concepts learned throughout the course to assist a small business owner in improving his business through the use of technology. Milestone One will be the first step in creating your report and recommendations to the business owner. The objective of this milestone is to further explore course concepts and incorporate additional perspectives and source material to analyze real world scenarios. Leverage both the textbook and external sources to complete the internship assignment.

Prompt

Harrison Kirby runs a local golf course with a shop of around 150 products. He wants to have a website that will facilitate e-business for his golf course. He wants online scheduling of tee times (including coordination of group play), online shopping, and social network integration. One difficulty of moving a small business from a traditional retail store to an online store is channel complications. Everything must be reconsidered. For example, how will he communicate with his customers? How will they find product information? How will he accept orders? How will he manage payments and shipping? These questions and many more have kept Kirby from making the e-commerce plunge.

Below you will find a letter from Kirby explaining what he would like you to do:

Dear Intern,

I have an interesting project for you. I am interested in an online presence for my golf shop. Specifically, I want to offer a few (less than 150) products online for in-store pickup or delivery. I would also like online scheduling of tee times.

I want you to research the web for companies that provide this type of product. Ultimately, you may recommend a combination of providers to accomplish all that I am trying to do. For example, your final recommendation may include a web hosting solution, logistics provider, and a CRM (Customer Relationship Management) tool. Or, perhaps you will find a product that can be customized to provide all the functionality in one piece.

Keep in mind that my shop is a small business, and I do not have resources to manage a complicated system. I need something that is fairly easy to implement, use, and manage. I have heard of online, cloud, as-a-service platforms that do not require local hardware. I think that this type of setup would be most useful to me, but I have no idea what type of software I should use to support my business.

Overview

The final project for this course is the creation of a research paper based on Internship Activities from the text.

The final paper should demonstrate an understanding of the materials in this course, as well as the implications of new knowledge gained.The 3-4-page paper should integrate new learning into thetarget company example and internship work.It may include explanations and examples from previous cases and activities.

The purpose of the final paper is for you to synthesize the learning achieved in this course by describing your understanding and application of knowledge in the area of business systems and the critical thinking process that has evolved.For this assignment you should choose any two of the concepts discussed throughout the course and integrate your research onthese concepts into your case proposal for thetarget company.

The project is divided into two milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Four and Six.The final submission will occur inModule Seven.

Prompt

In this final case study, you will synthesize the concepts learned throughout the coursebased on a series of Internship Activities that are thefirst two milestones.Through the two assignments outlined in Milestones One and Two, you will recommend solutions to Harrison Kirby, while also incorporating additional perspectives and source material to analyze real world scenarios and provide him with options to consider as part of his strategy to increase revenue and influence customer interactions and experiences in his small business. You will leverage both the textbook and external sources to complete the final project.

From the milestone assignments, you will find that Kirby is interested in improving his business through the use of technology.As you learned in the first two cases you worked for Kirby, he isfocused on revenue through e-commerce and customer experience through intelligent systems incorporated with his web presence. Take the opportunity to provide Kirby with some other technology opportunities to consider that would support his business venture in e-commerce and intelligent systems. Within your final paper, choose two of the concepts below drawn from course readings.Provide detail and an explanation for each concept, which will demonstrate how each can be leveraged to support business growth and/or create a streamlined operation for Kirby. Make sure to leverage sound examples, products, and references where appropriate to further substantiate your findings.

Course Concepts:

• Big data andknowledge management
• Wireless, mobile computing, and mobile commerce
• Social computing
• Cloud computing
• Business analytics and business intelligence solutions

Your final product should answer this question: How will technology position Harrison Kirby's business for future growth and forthe enhancement of both customer alignment and efficiency?

Specifically, the following critical elements must be addressed:

1. Case Synthesis

a) What is the purpose in Harrison Kirby asking you to collect this data and how will it impact his business?Start the assignment with 2-3 paragraphs providing adescription of Kirby's business and the industry in which he operates.In this type of contemporary business organization, what is the central role that IT is playing for Harrison Kirby?

b) Find a complementary or competing company in the same industry as Mr. Kirby's.Take time to research the company and provide supported evidence to communicate how IT may be playing a strategic role for that company in order to maintain or gain a competitive advantage.

2. Security and Ethics

a) What are the security or control issues that should be addressed as part of the technology selection process for Kirby's business?

b) Propose how you would address ethics or information security issues as part of the technology selection process for Kirby's business.

3. Findings and Recommendations

a) As the technical liaison for Kirby, you are providing him with critical information that he will use in making decisions on expanding the use of technology to improve his practice.It is important that you write your response with conviction through well-developed recommendations based on sound reasoning and evidence.

b) Include an embedded Excel objectinyour final Word document submission that includes a matrix of technical options that Kirby should consider in his decision making process.The Excel file should include the columns below in an example based on cloud computing.Make sure that you communicate to Mr. Kirby the challenges he should expect to face when introducing new technology into his business.

Technology Concept

Product/Service Name

Product/Service Name

Solution Type

Solution Type

Solution Type

Cloud Computing

Amazon AWS

https://aws.amazon.com/

Storage - Amazon EBS

30GB Free

Business continuity
Due to the sensitive nature of transaction and customer data for Kirby, he should consider a backup/storage solution where he can quickly recover from a potential catastrophe and retain customers to minimize loss and get back to business quickly.

 

c) Comment and provide examples of how Mr. Kirby can use this new technology to make better management decisions for his business in the future.

Articulation of Response

• Always include a title page with your name, the date, the course name/number, the title of the assignment or paper, and the revision (if applicable).

• In the body of the paper, use headings and sub-headings. Do not jump from subject to subject without providing some type of heading beforehand.

• Use correct grammar and punctuation. Capitalize the first word of a sentence.

• Make the presentation as professional as possible. Think, "If someone were to look at this paper, what would they think?" Sloppy papers may have correct answers, but they still leave an overall "messy" feeling when read.

• Make sure you understand how to cite reference material within the text of your submission (e.g.,according to John, "citing in text is a key concept in this course"[Doe, 2013]).

Reference no: EM131114104

Questions Cloud

Explain advantages of promoting social tolerance : Using a child development theory of your choice, explain the advantages and disadvantages of promoting social tolerance among children under the age of 10.
Determining the company stock today : Schiiller Corp will pay a $2.94 per share dividend next year, The company pledges to increase its dividend by 4.5 percent per year, indefinitely, If you require a return of 12 percent on your investment, how much will you pay for the company's sto..
Question regarding the value of the bond today : Two years ago, you bought a fifteen year bond at its face value of $1,000. The coupon rate on this bond is 9%, payable annually. Today (just after receiving the second annual coupon payment), the current yield on the bond is 7.5%. What is the valu..
What is the npv of the project : What is the NPV of the project? Round your answer to the nearest cent. What is the NPV of the project? Round your answer to the nearest cent.
What are the security issues that should be addressed : What are the security or control issues that should be addressed as part of the technology selection process for Kirby's business? Propose how you would address ethics or information security issues as part of the technology selection process..
Propose an alternate way of doing research : Can you propose an alternate way of doing research on willing human subjects which would protect the dignity of the individually and at the same time yield the necessary information we need to advance medical science?
Component cost of debt : The firm recently paid a dividend of $2 per share on its common stock, and investors expect the dividend to grow indefinitely at a constant rate of 10 percent per year.  Assume the firm has sufficient retained earnings to fund the equity portion o..
Determination of the appropriate crime prevention strategy : A determination of the appropriate crime prevention strategy for the jurisdiction based on this analysis. A review of academic literature and studies on the various crime prevention programs to address the needs of the community
Compute cost of goods sold assuming periodic inventory : Compute cost of goods sold assuming periodic inventory procedures and inventory priced at FIFO.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Introduction to network engineering

1. What was the main difference between 1G and 2G cellular systems? 2. Discuss the technological evolution from circuit switching to packet switching in cellular telephony.

  Develop a security policy document

Write a ten to sixteen (10-16) page paper in which you develop a security policy document for your mid-sized organization that will include measures to protect against breaches and act as a proactive defense

  Describe the four types of network testing

Describe the four types of network testing typically performed. What is regression testing? Why is regression testing usually an important part of network testing

  When applying cryptography determine why securing the key

when applying cryptography determine why securing the key is more important than securing plaintext or ciphertext.

  Is data hiding a valuable security consideration

Explain the term data hiding, which is used in object-oriented programming. Is data hiding a valuable security consideration. Why or why not

  Briefly describe the ict configuration of your company

Design suitable a security system for your company, clearly identifying the major security components of your design. Marks will be awarded on insight and elaboration.

  Access control list

DNS Cache Poisoning attack, Turtle Shell Architecture,

  Perform a business impact analysis for a provided scenario

Perform a business impact analysis for a provided scenario and create a business continuity plan (BCP) based on the findings of a given risk assessment for an organization.

  What is the resulting cipher

What is the resulting cipher - Given your answer, is security of the a!ne cipher with a given modulus m increased if one encryption is followed by a second encryption with a different key?

  How security can be configured and provide configuration

Describe how the security can be configured, and provide configuration examples (such as screen-shots and configuration files). Marks are based on demonstrating technical detail and understanding, and choice of examples.

  Write the net neutrality paper

Having read the "Transcending Net Neutrality: Ten Steps Toward an Open Internet" and "SOPA and PIPA What Went Wrong" papers, write the Net Neutrality paper.

  Identify the virus software running on your computer

Identify the Virus Software running on your computer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd