logo

Analyzing the Modern Business Case

   

Added on  2022-12-05

16 Pages1603 Words258 Views
 | 
 | 
 | 
Running head: ANALYZING THE MODERN BUSINESS CASE
Analysis of the business case- iphone getting infected with Spyware
Name of the Student
Name of the University
Author Note
Analyzing the Modern Business Case_1

ANALYZING THE MODERN BUSINESS CASE1
Executive summary
The aim of the report is to analyze the challenges that is faced in the current business case. The
current business scenario that is selected for this assessment is from the current news “The
Sydney morning head”. From the newspaper it has been identified that due to some operations in
iphone the phones are getting infected with thousands of spywares. Thus in order to remove the
challenges faced by Apple industry it is important to implement proper information system that
will protect the data of iphone users from spyware. The developed software will protect the
system of iphone and ensure that all the data are encrypted within the information system. In
order to overcome the issues it is recommended to include encrypting software that will not
provide access towards unnecessary data.
Analyzing the Modern Business Case_2

ANALYZING THE MODERN BUSINESS CASE2
Table of Contents
Introduction......................................................................................................................................3
Strategy analysis..............................................................................................................................3
Elicitations and collaboration..........................................................................................................3
Requirement lifecycle management................................................................................................8
Requirements Analysis and Design Definition..............................................................................10
Use cases diagram......................................................................................................................10
Use case description..................................................................................................................10
Data flow diagrams....................................................................................................................12
Sequence diagram......................................................................................................................13
Conclusion.....................................................................................................................................13
Bibliography..................................................................................................................................14
Analyzing the Modern Business Case_3

ANALYZING THE MODERN BUSINESS CASE3
Introduction
The aim of the report is to discuss the emerging challenge that is faced by one of the
renowned company. The issue that has been identified in this report is the spyware attacks that
infected the iphone and impacted millions of data. In order to identify the issues the main source
that is taken is “The Sydney morning head” newspaper. The report has identified the challenges
along with the solution that can resolve the issues.
Strategy analysis
At present Apple organization focuses entirely on providing a better experience towards
the customers without any type of viruses. The aim is to deliver a high resolution phone that will
enhance the experience gained by the customers. However at present it has been observed that at
present the organization is getting infected with thousands of spyware. Thus it becomes essential
to implement a proper software that will protect the system from getting impacted by the
spyware. It has been observed that iphone is facing serious hacking incidents that has the chances
of impacting the data of the customers. This will ensure that proper support is being provided
towards the data stored within the iphone. Thus it becomes essential to implement proper
software that can protect the data from getting hacked or infected by any spyware viruses.
Analyzing the Modern Business Case_4

End of preview

Want to access all the pages? Upload your documents or become a member.