Report On WholeWorldBand | Building Information System
8 Pages967 Words375 Views
Added on 2020-02-24
Report On WholeWorldBand | Building Information System
Added on 2020-02-24
BookmarkShareRelated Documents
Running head: INFORMATION OF THE BUSINESS SYSTEMInformation of the business systemName of the StudentName of the UniversityAuthor’s noteTable of Contents
1INFORMATION OF THE BUSINESS SYSTEM1. Introduction............................................................................................................................22. The challenges associated with building information system architecture............................23. WholeWorldBand should employ SQL for their business activities.....................................34. The measures to protect the unauthorized access of the copyrighted materials....................35. Conclusion..............................................................................................................................46. References..............................................................................................................................5
2INFORMATION OF THE BUSINESS SYSTEM1. IntroductionWholeWorldBand (Refer to Appendix A) provides an online platform for video andmusic enthusiasts. Anyone who is interested in creating personalized music videos and isseeking to share the video with everyone all over the world must register withWholeWorldBand. They have planned to enhance the information system architecture fortheir business (Galliers and Leidner 2014). This report will highlight the various challengesthey can face and the probable measures that should be taken.2. The challenges associated with building information system architecture i. Vulnerable to DDoS attack: The users who are registered with WholeWorldBandmay be the targets. The intruders can hack the database and can the misuse the registeredusers’ data (Buttyán 2016). The robots or the automation machine can infect the WholeWorldBand’s system.ii. System Hijacking: The WholeWorldBand database can be vulnerable to threatsand risks. The malware, virus attack can lead to a leak of personal information, the securitybreach can affect the company’s reputation and the loss of data (Galliers and Leidner 2014).iii. Securing web applications: The WholeWorldBand’s apps can also be the target ofa security breach. Thus security questions arise with the apps too. The users registered withthe email id, the password can get into trouble as there is a chance that information can behacked.If WholeWorldBand adopts the cloud database architecture like Amazon AWS,Microsoft Azure, that can be beneficial for both the companies (Wu 2014). Amazon orMicrosoft spends a lot of money on the security. WholeWorldBand by taking the IaaSapproach of cloud computing can enhance as well as secure their company.
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Legal Obligations of Investigators in Ethical Hackinglg...
|4
|898
|193
Securing Cloud Databases using Bastion Host and SSH Agent Forwardinglg...
|4
|1202
|138
Computer Crime and Digital Forensic : Reportlg...
|15
|3299
|123
IS Department and CIO’s Rolelg...
|4
|720
|428
(Solved) Assignment on Cloud Computinglg...
|13
|2925
|208
Reasons for MetaSoft to Move to Cloud Computinglg...