MITS4001 Business Information Systems: SSL Company Analysis
VerifiedAdded on 2023/06/04
|11
|2734
|157
Report
AI Summary
This report provides an analysis of Security Services Limited (SSL), focusing on the value derived from its information systems and the techniques used to evaluate IS investments. It examines the IS strategy supporting the business strategy and the benefits derived. The report further analyzes IT and IS at SSL from both company-wide and divisional perspectives, justifying business process re-engineering to maximize IS and IT potential. Finally, it assesses the current location of the IS function and recommends the best location for future IT service delivery, considering the divisional nature of SSL and its operational activities.

Running head: SECURITY SERVICES LIMITED (SSL)
Security Services Limited (SSL)
Name of student
Name of University
Author’s Note
Security Services Limited (SSL)
Name of student
Name of University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1SECURITY SERVICES LIMITED (SSL)
Executive summary
The report had a case study about SSL Company and it analyze the value which was obtained
from the information systems and had some techniques to be evaluated which were used to
assess the IS investments. In the second section, it had provide an analysis for the IS strategy
which would support the business strategy and had also provide the benefits provided by it. The
third section had IT and IS at SSL based on the company-wide and divisional perspective. A
justification had been provided for business process re-engineering which maximize the IS and
IT potential. Finally, it had provided the current location of the IS function and recommended
with the best location with future IT service.
Executive summary
The report had a case study about SSL Company and it analyze the value which was obtained
from the information systems and had some techniques to be evaluated which were used to
assess the IS investments. In the second section, it had provide an analysis for the IS strategy
which would support the business strategy and had also provide the benefits provided by it. The
third section had IT and IS at SSL based on the company-wide and divisional perspective. A
justification had been provided for business process re-engineering which maximize the IS and
IT potential. Finally, it had provided the current location of the IS function and recommended
with the best location with future IT service.

2SECURITY SERVICES LIMITED (SSL)
Table of Contents
1. Analysis of SSL value and Evaluation of the techniques.........................................................3
2. Analysis of IS strategy and Benefits derived...........................................................................4
3. Analysis of Strategic potential and Justification of Business Process Re-engineering............6
4. Recommendation......................................................................................................................7
References........................................................................................................................................9
Table of Contents
1. Analysis of SSL value and Evaluation of the techniques.........................................................3
2. Analysis of IS strategy and Benefits derived...........................................................................4
3. Analysis of Strategic potential and Justification of Business Process Re-engineering............6
4. Recommendation......................................................................................................................7
References........................................................................................................................................9

3SECURITY SERVICES LIMITED (SSL)
1. Analysis of SSL value and Evaluation of the techniques
The paper has analyzed the case study and found SSL has identified the value from the
current portfolio of the information systems that contains the techniques used for the evaluation
of IS investments. SSL provide services to individuals, public sectors and companies that are
available in wide range (Puckett, 2016). SSL is the main provider for the private security
services. In April 1995, the turnover of the SSL for the financial year was 17% that is £98.4
million. The profit that they were receiving had remain steady for three consecutive financial
years. The SSL offers some range of services which include provision of businesses security
services along with security guard and also install and analyze the security devices (Reybok et
al., 2018). The security also sweeps over the business premises. Another is provisions to security
services that are domestic were domestic security needs are analyzed and install through some
appropriate security devices. The recent services that they have provided is the transfer of
prisoners between the courts, prison and police cells. It has a Home Office sanctioned by the
contracted-out service and a Home Office standards has carried out (Sanchez-Iborra & Cano,
2016). The Armoured transport was included as an offer that could convey the substantial
amount of cash and cheques in between the banks and the businesses, for wages cash flow from
the banks to the businesses and from various parties a high-value items is provided for
conveyance.
SSL Company usually used for encryption of information between two points namely
client and server. At some time, there is a need of client to client and server to server encryption.
Millions of business that run online use SSL protocol to protect the confidential information.
When it is expected to submit the data that are confidential in that case the web page should be
1. Analysis of SSL value and Evaluation of the techniques
The paper has analyzed the case study and found SSL has identified the value from the
current portfolio of the information systems that contains the techniques used for the evaluation
of IS investments. SSL provide services to individuals, public sectors and companies that are
available in wide range (Puckett, 2016). SSL is the main provider for the private security
services. In April 1995, the turnover of the SSL for the financial year was 17% that is £98.4
million. The profit that they were receiving had remain steady for three consecutive financial
years. The SSL offers some range of services which include provision of businesses security
services along with security guard and also install and analyze the security devices (Reybok et
al., 2018). The security also sweeps over the business premises. Another is provisions to security
services that are domestic were domestic security needs are analyzed and install through some
appropriate security devices. The recent services that they have provided is the transfer of
prisoners between the courts, prison and police cells. It has a Home Office sanctioned by the
contracted-out service and a Home Office standards has carried out (Sanchez-Iborra & Cano,
2016). The Armoured transport was included as an offer that could convey the substantial
amount of cash and cheques in between the banks and the businesses, for wages cash flow from
the banks to the businesses and from various parties a high-value items is provided for
conveyance.
SSL Company usually used for encryption of information between two points namely
client and server. At some time, there is a need of client to client and server to server encryption.
Millions of business that run online use SSL protocol to protect the confidential information.
When it is expected to submit the data that are confidential in that case the web page should be
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4SECURITY SERVICES LIMITED (SSL)
encrypted which include credit card details, password or personal information (Lopez, Mihelich
& Hepburn, 2016). A site’s certificate is used by a trusted CA, to make the web browsers interact
with a secure sites. To make the SSL Certificate works on the website, the end-user need to make
a secure connection with the website. The site IP address is obtained by the browser from a DNS
server. Later, a secure connection is requested and initiated to the website. The server than
identify itself when a copy of the SSL certificate is send to the browser. The certificate that are in
the browser are check whether signed by the trusted CA, is valid and not expired or revoked. The
security standards are confirmed on the lengths and other items. The user has requested for the
domain to match it with the domain that are listed on the certificate (Fernandes et al., 2017). A
symmetric session key is created when the browser confirms that the website is trusted were the
public key is encrypted in the website’s certificate. The web server then receive the symmetric
session key which is decrypted with the private key. Thus, securing and encrypting all the
browser and server that has data transmitted between them.
2. Analysis of IS strategy and Benefits derived
In this section, it has been clear that there is no coherent IS strategy of SSL. However, in
the case study an analysis would be done to construct an IS strategy that would support the
business strategy (Fernandes, Jung & Prakash, 2016). The paper also provide the benefits that
would be derive from the use of SSL certificate that the company provide. The set of business
strategy is created to achieve a specific business goal. For any new product to release a range of
strategies being provided from annual budgets to individual marketing. There is no road map in
the absence of a coherent strategy for running the daily operations and pursuing the opportunities
(Louk, Lim & Lee, 2014). It could be severe of not having a comprehensive business strategy.
The business objectives could not be identified without a coherent strategy. There is a lack of
encrypted which include credit card details, password or personal information (Lopez, Mihelich
& Hepburn, 2016). A site’s certificate is used by a trusted CA, to make the web browsers interact
with a secure sites. To make the SSL Certificate works on the website, the end-user need to make
a secure connection with the website. The site IP address is obtained by the browser from a DNS
server. Later, a secure connection is requested and initiated to the website. The server than
identify itself when a copy of the SSL certificate is send to the browser. The certificate that are in
the browser are check whether signed by the trusted CA, is valid and not expired or revoked. The
security standards are confirmed on the lengths and other items. The user has requested for the
domain to match it with the domain that are listed on the certificate (Fernandes et al., 2017). A
symmetric session key is created when the browser confirms that the website is trusted were the
public key is encrypted in the website’s certificate. The web server then receive the symmetric
session key which is decrypted with the private key. Thus, securing and encrypting all the
browser and server that has data transmitted between them.
2. Analysis of IS strategy and Benefits derived
In this section, it has been clear that there is no coherent IS strategy of SSL. However, in
the case study an analysis would be done to construct an IS strategy that would support the
business strategy (Fernandes, Jung & Prakash, 2016). The paper also provide the benefits that
would be derive from the use of SSL certificate that the company provide. The set of business
strategy is created to achieve a specific business goal. For any new product to release a range of
strategies being provided from annual budgets to individual marketing. There is no road map in
the absence of a coherent strategy for running the daily operations and pursuing the opportunities
(Louk, Lim & Lee, 2014). It could be severe of not having a comprehensive business strategy.
The business objectives could not be identified without a coherent strategy. There is a lack of

5SECURITY SERVICES LIMITED (SSL)
focus needed to achieve the goals for the corporate and have plans to develop and move the
company forward. If there is a lack in the objectives the tasks is not specific. It is competent and
had no future vision (Dwarakish & Salim, 2015). There is a long-term growth and productivity
plans that are used for the objectives. Corporate resources are used to allocate the strategies and
plan needed for the business. Creating a budget is difficult without having a coherent business
strategy.
The SSL Company provide certificate that would leverage the HTTPS protocol and
securely transfer the information between the computers to the site that are encrypted and
securely transmitted (Loosemore & Cheung, 2015). It becomes very crucial when credit card
data is used to transfer sensitive information on the checkout pages and have PII on contact and
login forms. The use of websites by the SSL Company is better as it improve the performance
with the use of HTTP. In the website, SSL is added to offer the host a free SSL with a one-click
options. Some host even offer paid SSL for implementation (Toscani, Tosin & Zanella, 2018). A
free SSL certificate could even be generated by some intermediate users. The reason to use IT
and IS system by the SSL Company is to increase the security of the site. It will protect the
website data that are sensitive. The connection would be encrypted with the use of SSL
Certificates and help protect the data of the visitors from being misused. The bank and the
businesses use the services for the payment through the payroll process as it carried out in-
housing. It has a Pegasus payroll package with a stand-alone PC.
Now a days all the online information are confidential. The benefit of SSL certificate into
the website eliminate the chances of falling of confidential information into the hand of a wrong
person. SSL provides better security for website. It boost up the ranking of the search engine. It
ensures secure payments, helps to increase the trust for the website user and improves the
focus needed to achieve the goals for the corporate and have plans to develop and move the
company forward. If there is a lack in the objectives the tasks is not specific. It is competent and
had no future vision (Dwarakish & Salim, 2015). There is a long-term growth and productivity
plans that are used for the objectives. Corporate resources are used to allocate the strategies and
plan needed for the business. Creating a budget is difficult without having a coherent business
strategy.
The SSL Company provide certificate that would leverage the HTTPS protocol and
securely transfer the information between the computers to the site that are encrypted and
securely transmitted (Loosemore & Cheung, 2015). It becomes very crucial when credit card
data is used to transfer sensitive information on the checkout pages and have PII on contact and
login forms. The use of websites by the SSL Company is better as it improve the performance
with the use of HTTP. In the website, SSL is added to offer the host a free SSL with a one-click
options. Some host even offer paid SSL for implementation (Toscani, Tosin & Zanella, 2018). A
free SSL certificate could even be generated by some intermediate users. The reason to use IT
and IS system by the SSL Company is to increase the security of the site. It will protect the
website data that are sensitive. The connection would be encrypted with the use of SSL
Certificates and help protect the data of the visitors from being misused. The bank and the
businesses use the services for the payment through the payroll process as it carried out in-
housing. It has a Pegasus payroll package with a stand-alone PC.
Now a days all the online information are confidential. The benefit of SSL certificate into
the website eliminate the chances of falling of confidential information into the hand of a wrong
person. SSL provides better security for website. It boost up the ranking of the search engine. It
ensures secure payments, helps to increase the trust for the website user and improves the

6SECURITY SERVICES LIMITED (SSL)
conversion rate. It encrypt the communication between the internal systems. It has GDPR
compliance that protect organizational and technical measures. The price varies for SSL
certifications from cost-free to premium packages. The cheaper packages are less trustworthy in
comparison to the premium one.
3. Analysis of Strategic potential and Justification of Business Process Re-engineering
The SSL Company has four discrete divisions which represents the key business areas.
This are the geographical headquarter which is separate from the corporate headquarters. This
section provide the investment done on the Private Transport Divisions. It also provide the
business process re-engineering.
The private transport division has a sales section that are charged in two ways. The first
way is the contract sales that are negotiated and are related to transport having specific items that
have more than two locations (Nishikawa et al., 2017). The second way is the one-off sales that
is basically for single transportation tasks which the customers arrange in an ad-hoc basis. This
division has the IS function which is manage by an ex-policeman. The ex-policeman is not an IT
specialist but however had gained some experience in IT while they are in the force.
The tool for business process re-engineering helps the organization to improve the Quality
of customer services. Business process re-engineering is a strategic tool to gain competitive
advantage for the SSL Company. The costs reduces and improve the productivity through more
efficient processes (Järvinen & Taiminen, 2016). The adverse effects of the company making a
decision is to reengineer the employees. The aspect of business process re-engineering would
need to keep in mind that could help in making the decision go through with the activity. The
Business process reengineering is the redesign and analysis of the workflow to make a more
conversion rate. It encrypt the communication between the internal systems. It has GDPR
compliance that protect organizational and technical measures. The price varies for SSL
certifications from cost-free to premium packages. The cheaper packages are less trustworthy in
comparison to the premium one.
3. Analysis of Strategic potential and Justification of Business Process Re-engineering
The SSL Company has four discrete divisions which represents the key business areas.
This are the geographical headquarter which is separate from the corporate headquarters. This
section provide the investment done on the Private Transport Divisions. It also provide the
business process re-engineering.
The private transport division has a sales section that are charged in two ways. The first
way is the contract sales that are negotiated and are related to transport having specific items that
have more than two locations (Nishikawa et al., 2017). The second way is the one-off sales that
is basically for single transportation tasks which the customers arrange in an ad-hoc basis. This
division has the IS function which is manage by an ex-policeman. The ex-policeman is not an IT
specialist but however had gained some experience in IT while they are in the force.
The tool for business process re-engineering helps the organization to improve the Quality
of customer services. Business process re-engineering is a strategic tool to gain competitive
advantage for the SSL Company. The costs reduces and improve the productivity through more
efficient processes (Järvinen & Taiminen, 2016). The adverse effects of the company making a
decision is to reengineer the employees. The aspect of business process re-engineering would
need to keep in mind that could help in making the decision go through with the activity. The
Business process reengineering is the redesign and analysis of the workflow to make a more
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7SECURITY SERVICES LIMITED (SSL)
efficient effort. The company could redesign and reorganize the costs and improve the quality of
services. For reengineering all the processes are identified in an organization and the redesign
urgency of the process is then prioritize. The information processing work could be integrated
into the real work were the information are produce. The workflow link parallel activities that
could integrated the results. Dispersed resources are treated geographically, the activities that
have parallel link integrate their results. The work is performed and build control into the
process.
The business process reengineering could be implemented by reducing the cost, increasing
the efficiency, improving the quality of product and deciding the framework that need to be
achieved. The processes would clash with the company’s mission. There is a clear identification
between the BPR success and failure. If the IT system are relevant and efficient than the BPR is
essential. In the absence of the IT system, there is no possibility that BPR activity is vital to set
in place for the information system and deal with the change in magnitude (DeLong & Elbeck,
2018). There may occur that the SSL need to test the prototype and when there occurs any failure
in the testing stage then. Thus, by this it is proved that business process re-engineering could be a
useful tool to maximize the potential of IS and IT for the SSL company.
4. Recommendation
This section provides the current location within the SSL having the IS function. Currently
the SSL is located in the headquarters of Milton Keynes, Buckinghamshire. Further, it has four
discrete divisions which has key business area. Geographically the divisions are separate from
the corporate headquarters which are mentioned below:
efficient effort. The company could redesign and reorganize the costs and improve the quality of
services. For reengineering all the processes are identified in an organization and the redesign
urgency of the process is then prioritize. The information processing work could be integrated
into the real work were the information are produce. The workflow link parallel activities that
could integrated the results. Dispersed resources are treated geographically, the activities that
have parallel link integrate their results. The work is performed and build control into the
process.
The business process reengineering could be implemented by reducing the cost, increasing
the efficiency, improving the quality of product and deciding the framework that need to be
achieved. The processes would clash with the company’s mission. There is a clear identification
between the BPR success and failure. If the IT system are relevant and efficient than the BPR is
essential. In the absence of the IT system, there is no possibility that BPR activity is vital to set
in place for the information system and deal with the change in magnitude (DeLong & Elbeck,
2018). There may occur that the SSL need to test the prototype and when there occurs any failure
in the testing stage then. Thus, by this it is proved that business process re-engineering could be a
useful tool to maximize the potential of IS and IT for the SSL company.
4. Recommendation
This section provides the current location within the SSL having the IS function. Currently
the SSL is located in the headquarters of Milton Keynes, Buckinghamshire. Further, it has four
discrete divisions which has key business area. Geographically the divisions are separate from
the corporate headquarters which are mentioned below:

8SECURITY SERVICES LIMITED (SSL)
The Business Security Division (BSD): The BSD is located in Leicester and in the county
town of England and Wales.
The Domestic Security Division (DSD): The DSD is located in Newcastle-upon-Tyne
and in the county town of England and Wales.
The Private Transport Division (PTD): The PTD is located in Bedford and in the county
town of England and Wales.
The Home Office Services Division (HOSD): The HOSD is located in Central London.
As the nature of BSD, PTD and DSD is autonomous, thus, the carriers are effected along
with associated activities that has individual business. Each divisions carries out their own
business activities that varies from one division to another division.
The Central London would be best recommended for the SSL to have a business operation
as London is the main city of the country. The SSL has a divisional nature with activities at
headquarters are financial and general management orientated. Over the WAN, this particular
region would have AS/400 financial systems. There are further analysis to the PCS data. The
Hybrid manager would handle both the financial and IT expertise.
The Business Security Division (BSD): The BSD is located in Leicester and in the county
town of England and Wales.
The Domestic Security Division (DSD): The DSD is located in Newcastle-upon-Tyne
and in the county town of England and Wales.
The Private Transport Division (PTD): The PTD is located in Bedford and in the county
town of England and Wales.
The Home Office Services Division (HOSD): The HOSD is located in Central London.
As the nature of BSD, PTD and DSD is autonomous, thus, the carriers are effected along
with associated activities that has individual business. Each divisions carries out their own
business activities that varies from one division to another division.
The Central London would be best recommended for the SSL to have a business operation
as London is the main city of the country. The SSL has a divisional nature with activities at
headquarters are financial and general management orientated. Over the WAN, this particular
region would have AS/400 financial systems. There are further analysis to the PCS data. The
Hybrid manager would handle both the financial and IT expertise.

9SECURITY SERVICES LIMITED (SSL)
References
DeLong, D., & Elbeck, M. (2018). An Exploratory Study of the Influence of Soft and Hard Skills
on Entry Level Marketing Position Interviews. Marketing Education Review, 28(3), 159-169.
Dwarakish, G. S., & Salim, A. M. (2015). Review on the Role of Ports in the Development of a
Nation. Aquatic Procedia, 4, 295-301.
Fernandes, E., Jung, J., & Prakash, A. (2016, May). Security analysis of emerging smart home
applications. In 2016 IEEE Symposium on Security and Privacy (SP) (pp. 636-654). IEEE.
Fernandes, E., Rahmati, A., Jung, J., & Prakash, A. (2017). Security implications of permission
models in smart-home application frameworks. IEEE Security & Privacy, 15(2), 24-30.
Järvinen, J., & Taiminen, H. (2016). Harnessing marketing automation for B2B content
marketing. Industrial Marketing Management, 54, 164-175.
Loosemore, M., & Cheung, E. (2015). Implementing systems thinking to manage risk in public
private partnership projects. International Journal of Project Management, 33(6), 1325-1334.
Lopez, E., Mihelich, J., & Hepburn, M. F. (2016). U.S. Patent No. 9,270,639. Washington, DC:
U.S. Patent and Trademark Office.
Louk, M., Lim, H., & Lee, H. (2014). An analysis of security system for intrusion in smartphone
environment. The Scientific World Journal, 2014.
Nishikawa, H., Schreier, M., Fuchs, C., & Ogawa, S. (2017). The value of marketing
crowdsourced new products as such: Evidence from two randomized field experiments. Journal
of Marketing Research, 54(4), 525-539.
References
DeLong, D., & Elbeck, M. (2018). An Exploratory Study of the Influence of Soft and Hard Skills
on Entry Level Marketing Position Interviews. Marketing Education Review, 28(3), 159-169.
Dwarakish, G. S., & Salim, A. M. (2015). Review on the Role of Ports in the Development of a
Nation. Aquatic Procedia, 4, 295-301.
Fernandes, E., Jung, J., & Prakash, A. (2016, May). Security analysis of emerging smart home
applications. In 2016 IEEE Symposium on Security and Privacy (SP) (pp. 636-654). IEEE.
Fernandes, E., Rahmati, A., Jung, J., & Prakash, A. (2017). Security implications of permission
models in smart-home application frameworks. IEEE Security & Privacy, 15(2), 24-30.
Järvinen, J., & Taiminen, H. (2016). Harnessing marketing automation for B2B content
marketing. Industrial Marketing Management, 54, 164-175.
Loosemore, M., & Cheung, E. (2015). Implementing systems thinking to manage risk in public
private partnership projects. International Journal of Project Management, 33(6), 1325-1334.
Lopez, E., Mihelich, J., & Hepburn, M. F. (2016). U.S. Patent No. 9,270,639. Washington, DC:
U.S. Patent and Trademark Office.
Louk, M., Lim, H., & Lee, H. (2014). An analysis of security system for intrusion in smartphone
environment. The Scientific World Journal, 2014.
Nishikawa, H., Schreier, M., Fuchs, C., & Ogawa, S. (2017). The value of marketing
crowdsourced new products as such: Evidence from two randomized field experiments. Journal
of Marketing Research, 54(4), 525-539.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10SECURITY SERVICES LIMITED (SSL)
Puckett, M., 2016. Providers for the Provision of Armored Carrier Services on an Annual
Contract with four (4) one year renewal options for the Department of Financial Services.
Reybok, R., Haugsnes, A. S., Kurt, J. Z. I., Rhines, J., Geddes, H., Osypov, V., ... & Manning,
M. (2018). U.S. Patent Application No. 10/032,020.
Sanchez-Iborra, R., & Cano, M. D. (2016). State of the art in LP-WAN solutions for industrial
IoT services. Sensors, 16(5), 708.
Toscani, G., Tosin, A., & Zanella, M. (2018). Opinion modeling on social media and marketing
aspects. arXiv preprint arXiv:1805.01892.
Puckett, M., 2016. Providers for the Provision of Armored Carrier Services on an Annual
Contract with four (4) one year renewal options for the Department of Financial Services.
Reybok, R., Haugsnes, A. S., Kurt, J. Z. I., Rhines, J., Geddes, H., Osypov, V., ... & Manning,
M. (2018). U.S. Patent Application No. 10/032,020.
Sanchez-Iborra, R., & Cano, M. D. (2016). State of the art in LP-WAN solutions for industrial
IoT services. Sensors, 16(5), 708.
Toscani, G., Tosin, A., & Zanella, M. (2018). Opinion modeling on social media and marketing
aspects. arXiv preprint arXiv:1805.01892.
1 out of 11
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.