Uploaded by RAFSUN ISLAM

Technology in organization

advertisement
5/12/2022
Technology in
organization
Contents
Answer to the question no .1 ................................................................................................................... 2
A ) .................................................................................................................................................................. 2
B) ................................................................................................................................................................... 3
Answer to the question no. 2.................................................................................................................... 4
Answer to the question no.3 .................................................................................................................... 7
A) ................................................................................................................................................................... 7
B) ................................................................................................................................................................... 8
References .............................................................................................................................................. 10
Answer to the question no .1
A ) Cloud computing's importance in modern organizations is expanding since it offers a variety
of advantages for businesses to store data and use it in processes at all levels.
Because cloud computing has numerous restrictions on organizational levels and storing large
data sets, its application has developed over time. Nonetheless, as technology progressed, cloud
computing requirements and capabilities grew.
The evolution of cloud computing can be observed through the lens of the cloud computing
service model.
1. From the perspective of infrastructure as a service, the first cloud computing service providers
supply clients with these services based on pay-as-you-go access to cloud storage, networking,
servers, and other computer resources. Then, as technology advanced, additional characteristics
and capability were added to storage and processing resources, resulting in exceptional data
handling breakthroughs.
Platform as a service (PaaS):
Then, in service businesses, cloud computing is deployed, which provides access to a cloud-based
environment where employees may design and deliver applications. Some tools are designed to
allow you to test, develop, and host apps all in the same place. It allows businesses to concentrate
on their core competencies while outsourcing the management of security, operating systems,
server software, and backups. Even on cloud computing, it makes collaborative work easier.
B) Cloud computing provides Amazon and other businesses with various advantages after they
adopt it.
1. It is beneficial to improve customer service by assuring the success of any organization and
providing great customer experience and competitive advantage for customers by increasing
their purchasing experience.
2. It also saves money in an organization's procedures because on-premise solutions are often
pricey and require many expenditures to be added up.
Most cloud solutions allow businesses to pay for only the services they require, eliminating the
cost of paying for services that aren't used.
3. It provides greater flexibility and shorter implementation cycles: With cloud solutions,
businesses benefit from a faster implementation period, with products typically being online in
weeks rather than months. Cloud technology facilitates team collaboration by allowing your team
to access, modify, and share documents and data from any location at any time.
4. Cloud computing promotes scalability in the workplace, and cloud solutions can effortlessly
accommodate and respond to such changes.
Cloud computing also improves the scalability of existing businesses and helps them to expand
to meet new demands.
5. Lower IT costs: Using cloud computing lowers the costs of operating and maintaining your IT
systems. Scalability, business continuity, collaboration efficiency, work practice flexibility and
access to automatic updates for the company, and a higher level of flexibility afforded by cloud
computing for the company and customers
Overall, the component benefits the business by increasing the value of the business and the
efficiency of the business processes.
Answer to the question no. 2
Frameworks serve as a beginning point for building information security management processes,
policies, and administrative operations.
Because security requirements sometimes overlap, "crosswalks" can be used to verify
compliance with several regulatory standards. For example, information security policy is defined
in Portion 5 of ISO 27002; it is defined in the "Align, Plan, and Organize" section of COBIT; and it
is defined as "Internal Environment" in the Committee of Sponsoring Organizations of the
Treadway Commission (COSO) framework. It's referred to as "Assigned Security Responsibility"
in HIPAA and "Maintain an Information Security Policy" in PCI DSS.
An organization can construct crosswalks to demonstrate compliance with several legislation,
including HIPAA, Sarbanes-Oxley, PCI DSS, and Graham-Leach-Bliley, by using a common
framework, such as ISO 27002.
There are three requirements for putting a framework in place.
Confidentiality: One of the five pillars of Information Assurance is confidentiality (IA).
Authentication, availability, integrity, and nonrepudiation are the other four.
Only authorized people should have access to sensitive information or data. In IA, a classification
system enforces confidentiality. For example, depending on the data requirements of a position,
a US government or military employee must get a specific clearance level, such as classified,
secret, or top secret. Top secret material is not accessible to those with secret clearances.
The following are the best practices for maintaining confidentiality:



Authorized users are assigned confidential user identity and passwords through an
authentication process. Biometrics is another method of authentication.
To assure user or viewer authorization, role-based security mechanisms may be used.
Data access levels, for example, could be assigned to certain department employees.
User actions are kept within their roles thanks to access controls. If a user is only allowed
to access data but not write it, specific system restrictions could be integrated.
Integrity: Integrity, in the context of computer systems, refers to methods of ensuring that data
is real, accurate and safeguarded from unauthorized user modification.
One of the five pillars of information assurance is integrity (IA). Authentication, availability,
confidentiality, and nonrepudiation are the other four.
Data integrity is required for information security. Integrity is an essential IA component because
users must be able to trust information. Data that isn't reliable lacks integrity. Data must remain
intact within an information system (IS) and throughout data transmission.
Data alterations can be caused by things like storage erosion, errors, and purposeful data or
system damage. Hackers, for example, might harm systems by entering them with malware such
as Trojan horses, which take over computers, as well as worms and viruses. By purposefully
entering inaccurate data, an employee may do harm to the organization.
Checksums and data comparisons are two methods for ensuring data integrity.
Availability: In the context of a computer system, availability refers to a user's ability to access
information or resources in a specific location and format.
One of the five pillars of Information Assurance is availability (IA). Integrity, authentication,
confidentiality, and nonrepudiation are the other four.
When a system is regularly down, information availability suffers, which has a substantial impact
on users. Furthermore, information security, such as top secret security clearances, is
compromised when data is not secure and easily accessible. Time is another aspect that affects
availability. If a computer system cannot efficiently send information, its availability is
jeopardized.
Storage, whether on-site or off-site, is required to assure data availability. When using an offsite
facility, a business continuity strategy should specify the availability of this data in the event that
onsite data is unavailable. Information must always be available to those having clearance.
In different applications, these three requirements may be stressed differently.
Example: System security requirements differ from application to application, even within a
same application. As a result, in order to achieve the proper level of security, businesses must
both understand their applications and think through the applicable options.
Personal identifying numbers (PINs) must be kept confidential in an automated teller system,
both in the host system and during transaction transmission. It is required to safeguard the
accuracy of account records and individual transactions. Privacy protection is vital, but not
critical. The host system's availability is critical to the bank's economic survival, but not to its
fiduciary responsibilities. Individual teller machine availability is less of a concern than the
availability of the host system.
A telephone switching system, on the other hand, does not place high demands on transaction
integrity because losing a call or billing record will not result in long-term consequences. Control
programs and configuration records, on the other hand, must be accurate. The switching function
would be rendered useless without these, and the most crucial feature of all—availability—would
be jeopardized. Individual calls must be kept private via a telephone switching mechanism, which
prevents one caller from hearing another.
What a system is used for determines security requirements more than what it is. If a typesetting
system is used to publish corporate proprietary material, it must ensure secrecy, integrity if it is
used to publish legislation, and availability if it is used to publish a daily newspaper. If it is used
as a development environment for software or engineering designs, a general-purpose timesharing system should ensure confidentiality, integrity, and availability to the extent that no
single user may monopolize the service and lost files can be recovered.
Answer to the question no.3
A)
I would like to discuss about amazon web service networking infrastructure.
Some key infrastructure they use are given below.
Security
At AWS, security begins with our core infrastructure. Our infrastructure, which is custom-built
for the cloud and engineered to fulfill the world's most demanding security requirements, is
monitored 24 hours a day, seven days a week to help maintain the confidentiality, integrity, and
availability of your data. Before leaving our secure facilities, all data passing across the AWS
global network that connects our datacenters and Regions is automatically encrypted at the
physical layer. You can develop on the world's most secure infrastructure, knowing that you
always have complete control over your data, including the ability to encrypt, migrate, and
manage retention at any moment.
Global Footprint
AWS has the greatest worldwide infrastructure footprint of any provider, and it is rapidly
expanding. When you move your apps and workloads to the cloud, you have the freedom to
choose a technological infrastructure that is closest to your major user base. You can run your
workloads on the cloud, which provides the finest support for the widest range of applications,
including those requiring the fastest throughput and lowest latency. If your data is stored on
another planet, you can use AWS Ground Station, which places satellite antennas near AWS
infrastructure Regions.
Flexibility
The AWS Global Infrastructure allows you the freedom to operate your workloads how and
where you want, while still using the same network, control plane, APIs, and AWS services. You
can run your applications in any of the AWS Regions and AZs if you want to go global. You can
utilize AWS Local Zones or AWS Wavelength to execute your applications with single-digit
millisecond latency to mobile devices and end-users. You can also use AWS Outposts if you want
to execute your applications locally.
B) The calculation can be done in Excel using functions or commands.
1. =SUM(Range) can be used to calculate the total of all countries' quarter totals, as seen in
=sum(j9;j15) which provides 835,000.
2. =MIN(Range) can be used to find the minimum value of a range, such as =MIN(J9:J15), which
provides 38,000.
3. =Max(Range) can be used to find the maximum value of a range; for example, =Max(J9:J15)
returns 215,000.
4. For the mean value of a group of observations, =AVERAGE(Range) =AVERAGE(J9:J15) provides
119,285.71 in this case.
5 =MEDIAN(Range) =MEDIAN(J9:J15) returns a value of 113,000 for the Median of a set of
observations.
ii) We utilize to find the number of identities in a set of observations whose value is greater than
or equal to a certain value.
=COUNTSIFS(RANGE,:" or >VALUE") is a function that counts the number of times a variable is
true.
So =COUNTIFS(G9:G15,">27000") is used to identify the number of nations with a projected value
of.2700 in Q2.
GIVING A 4TH VALUE
So there are 4 countries in Q 2 with a predicted value larger than 27000.
iii) Similarly, =COUNTIFS(I9:I15,"15000") GIVES a result of 1 for the number of nations with a
projected value of 15,000 in Q4.
As a result, the number of countries with a predicted value of less than 15,000 in Q4 has increased
to 1.
References
Amazon(2011) AWS provided over the world.
available at: aws.amazon.com (may 12,2022)
Goleniewski, L. (2006) Telecommunications Essentials, Addison Wesley Professional.
Mir, N.F. (2006) Computer and Communication Networks, Prentice Hall.
Tanenbaum, A.S. (2002) Computer Networks, Prentice Hall.
Spurgeon, Charles E. (2000) Ethernet: The Definitive Guide, O'Reilly Media, Inc.
Download