What are the security issues that should be addressed

Assignment Help Computer Network Security
Reference no: EM131114104

Online golf shop

Overview

For the final project in this course, you are being asked to apply the concepts learned throughout the course to assist a small business owner in improving his business through the use of technology. Milestone One will be the first step in creating your report and recommendations to the business owner. The objective of this milestone is to further explore course concepts and incorporate additional perspectives and source material to analyze real world scenarios. Leverage both the textbook and external sources to complete the internship assignment.

Prompt

Harrison Kirby runs a local golf course with a shop of around 150 products. He wants to have a website that will facilitate e-business for his golf course. He wants online scheduling of tee times (including coordination of group play), online shopping, and social network integration. One difficulty of moving a small business from a traditional retail store to an online store is channel complications. Everything must be reconsidered. For example, how will he communicate with his customers? How will they find product information? How will he accept orders? How will he manage payments and shipping? These questions and many more have kept Kirby from making the e-commerce plunge.

Below you will find a letter from Kirby explaining what he would like you to do:

Dear Intern,

I have an interesting project for you. I am interested in an online presence for my golf shop. Specifically, I want to offer a few (less than 150) products online for in-store pickup or delivery. I would also like online scheduling of tee times.

I want you to research the web for companies that provide this type of product. Ultimately, you may recommend a combination of providers to accomplish all that I am trying to do. For example, your final recommendation may include a web hosting solution, logistics provider, and a CRM (Customer Relationship Management) tool. Or, perhaps you will find a product that can be customized to provide all the functionality in one piece.

Keep in mind that my shop is a small business, and I do not have resources to manage a complicated system. I need something that is fairly easy to implement, use, and manage. I have heard of online, cloud, as-a-service platforms that do not require local hardware. I think that this type of setup would be most useful to me, but I have no idea what type of software I should use to support my business.

Overview

The final project for this course is the creation of a research paper based on Internship Activities from the text.

The final paper should demonstrate an understanding of the materials in this course, as well as the implications of new knowledge gained.The 3-4-page paper should integrate new learning into thetarget company example and internship work.It may include explanations and examples from previous cases and activities.

The purpose of the final paper is for you to synthesize the learning achieved in this course by describing your understanding and application of knowledge in the area of business systems and the critical thinking process that has evolved.For this assignment you should choose any two of the concepts discussed throughout the course and integrate your research onthese concepts into your case proposal for thetarget company.

The project is divided into two milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Four and Six.The final submission will occur inModule Seven.

Prompt

In this final case study, you will synthesize the concepts learned throughout the coursebased on a series of Internship Activities that are thefirst two milestones.Through the two assignments outlined in Milestones One and Two, you will recommend solutions to Harrison Kirby, while also incorporating additional perspectives and source material to analyze real world scenarios and provide him with options to consider as part of his strategy to increase revenue and influence customer interactions and experiences in his small business. You will leverage both the textbook and external sources to complete the final project.

From the milestone assignments, you will find that Kirby is interested in improving his business through the use of technology.As you learned in the first two cases you worked for Kirby, he isfocused on revenue through e-commerce and customer experience through intelligent systems incorporated with his web presence. Take the opportunity to provide Kirby with some other technology opportunities to consider that would support his business venture in e-commerce and intelligent systems. Within your final paper, choose two of the concepts below drawn from course readings.Provide detail and an explanation for each concept, which will demonstrate how each can be leveraged to support business growth and/or create a streamlined operation for Kirby. Make sure to leverage sound examples, products, and references where appropriate to further substantiate your findings.

Course Concepts:

• Big data andknowledge management
• Wireless, mobile computing, and mobile commerce
• Social computing
• Cloud computing
• Business analytics and business intelligence solutions

Your final product should answer this question: How will technology position Harrison Kirby's business for future growth and forthe enhancement of both customer alignment and efficiency?

Specifically, the following critical elements must be addressed:

1. Case Synthesis

a) What is the purpose in Harrison Kirby asking you to collect this data and how will it impact his business?Start the assignment with 2-3 paragraphs providing adescription of Kirby's business and the industry in which he operates.In this type of contemporary business organization, what is the central role that IT is playing for Harrison Kirby?

b) Find a complementary or competing company in the same industry as Mr. Kirby's.Take time to research the company and provide supported evidence to communicate how IT may be playing a strategic role for that company in order to maintain or gain a competitive advantage.

2. Security and Ethics

a) What are the security or control issues that should be addressed as part of the technology selection process for Kirby's business?

b) Propose how you would address ethics or information security issues as part of the technology selection process for Kirby's business.

3. Findings and Recommendations

a) As the technical liaison for Kirby, you are providing him with critical information that he will use in making decisions on expanding the use of technology to improve his practice.It is important that you write your response with conviction through well-developed recommendations based on sound reasoning and evidence.

b) Include an embedded Excel objectinyour final Word document submission that includes a matrix of technical options that Kirby should consider in his decision making process.The Excel file should include the columns below in an example based on cloud computing.Make sure that you communicate to Mr. Kirby the challenges he should expect to face when introducing new technology into his business.

Technology Concept

Product/Service Name

Product/Service Name

Solution Type

Solution Type

Solution Type

Cloud Computing

Amazon AWS

https://aws.amazon.com/

Storage - Amazon EBS

30GB Free

Business continuity
Due to the sensitive nature of transaction and customer data for Kirby, he should consider a backup/storage solution where he can quickly recover from a potential catastrophe and retain customers to minimize loss and get back to business quickly.

 

c) Comment and provide examples of how Mr. Kirby can use this new technology to make better management decisions for his business in the future.

Articulation of Response

• Always include a title page with your name, the date, the course name/number, the title of the assignment or paper, and the revision (if applicable).

• In the body of the paper, use headings and sub-headings. Do not jump from subject to subject without providing some type of heading beforehand.

• Use correct grammar and punctuation. Capitalize the first word of a sentence.

• Make the presentation as professional as possible. Think, "If someone were to look at this paper, what would they think?" Sloppy papers may have correct answers, but they still leave an overall "messy" feeling when read.

• Make sure you understand how to cite reference material within the text of your submission (e.g.,according to John, "citing in text is a key concept in this course"[Doe, 2013]).

Reference no: EM131114104

Questions Cloud

Explain advantages of promoting social tolerance : Using a child development theory of your choice, explain the advantages and disadvantages of promoting social tolerance among children under the age of 10.
Determining the company stock today : Schiiller Corp will pay a $2.94 per share dividend next year, The company pledges to increase its dividend by 4.5 percent per year, indefinitely, If you require a return of 12 percent on your investment, how much will you pay for the company's sto..
Question regarding the value of the bond today : Two years ago, you bought a fifteen year bond at its face value of $1,000. The coupon rate on this bond is 9%, payable annually. Today (just after receiving the second annual coupon payment), the current yield on the bond is 7.5%. What is the valu..
What is the npv of the project : What is the NPV of the project? Round your answer to the nearest cent. What is the NPV of the project? Round your answer to the nearest cent.
What are the security issues that should be addressed : What are the security or control issues that should be addressed as part of the technology selection process for Kirby's business? Propose how you would address ethics or information security issues as part of the technology selection process..
Propose an alternate way of doing research : Can you propose an alternate way of doing research on willing human subjects which would protect the dignity of the individually and at the same time yield the necessary information we need to advance medical science?
Component cost of debt : The firm recently paid a dividend of $2 per share on its common stock, and investors expect the dividend to grow indefinitely at a constant rate of 10 percent per year.  Assume the firm has sufficient retained earnings to fund the equity portion o..
Determination of the appropriate crime prevention strategy : A determination of the appropriate crime prevention strategy for the jurisdiction based on this analysis. A review of academic literature and studies on the various crime prevention programs to address the needs of the community
Compute cost of goods sold assuming periodic inventory : Compute cost of goods sold assuming periodic inventory procedures and inventory priced at FIFO.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Maintain an online reflective blog

Maintain an online reflective blog/journal and write blog posts/entries based on academic articles and conduct a research of the Internet on the topics as listed at the top of this assessment detail.

  Describe what is special about the default user account sap

creates a number of default accounts which deserve special attention. Describe what is special about the default user account SAP*.

  Beat the hacker

A honeypot can be a useful for discovering some of the hacking trends occurring within an organization. Of course, there have to be certain measures placed upon its operation, maintenance, and the reconnaissance information obtained as a result.

  How do clients receive updates in the absence of wsus

Why might READ WRITE and READ CREATE rights pose a security threat? How do clients receive updates in the absence of WSUS

  Protection of transmitted information-sensitive data stored

You must include in your investigation protection of both transmitted information also sensitive data stored locally in computer databases.

  Information systems security policy

From the e-Activity, discuss how the National Security Telecommunications and Information Systems Security Policy (NSTISSP) national policies facilitate the confidentiality, integrity, authentication, and non-repudiation of computing security

  Cyber security triad

Choose a threat that targets one of three categories of the cyber security triad: Confidentiality, Integrity or  Availability. Using the posted instructions for writing a white paper

  Case study incident-response policy

Case Study Incident-Response Policy

  Write a 2- to 3-page paper describing your companys

write a 2- to 3-page paper describing your companys intranet.include how the information is laid out and what security

  What might be your three most important concerns

Many hackers claim to believe that "access to computers should be unlimited and total" and that "all information should be free." Do you agree with these statements? Why or why not?

  Determine the level of necessary controls to mitigate risks

Describe how an organization determines the level of necessary controls to mitigate the risks while considering the value of its assets.

  Determine what the risk to an organisation is

Determine what the risk to an organisation is, you need to know what the problems could be - how it performs its attack and the mitigation strategies. The risk to an organisation using vulnerable systems should also be determined.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd