Preview

APPLYING INFORMATION SECURITY AND SDLC TO BUSINESS

Better Essays
Open Document
Open Document
2427 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
APPLYING INFORMATION SECURITY AND SDLC TO BUSINESS
Applying Information Security and SDLC to Business
Anthony Goss, James Leehan, Nicole Rossano, Roxie Carter
BIS 320
September 1, 2014
Cynthia Pryke

Applying Information Security and SDLC to Business There are several things a manager has to consider when running a business. He or she must ensure that the company does what it needs to meet the needs of the customer, the employees, and protect all personal information. One way is to ensure that there are proper security measures to protect all data by making sure the employees are trained and understand the security protocols. Another way is by using the Systems Development Life Cycle (SDLC) method to help maintain the systems they have or need to conduct business. Businesses that follow the steps in the SDLC method and maintain a good information security system will keep the trust of its customers ensuring it remains profitable. Use the SDLC method to implement a new technology into the bookstore Systems development life cycle (SDLC) is the traditional process used to develop information systems. There is a five stage process for SDLC and they are as follows: 1.) System definition, 2.) Requirements analysis, 3.) Component design, 4.) Implementation, 5.) Maintenance (Kroenke, 2014). Having an online business can be a lot of work. There are some ways to make it easier to run the business and to get some new customers. One way is to use collaboration tools. There are many different collaboration tools that you could use for a business. One website that I went to talks about four different ones. According to The Four Best Web Collaboration Tools (2012), “Most online collaboration tools are simple, easy to use and inexpensive.” The first example is Basecamp. It is an extremely powerful and useful online project collaboration system designed for entrepreneurs, small businesses, freelancers and business groups. The most used online project management application in the world. The application allows you



References: Cashman, S. (2000). Types of Information Systems. Retrieved from http://bisom.uncc.edu/courses/info2130/Topics/istypes.htm Kroenke, D.M. (2014). MIS Essentials (3rd ed.). Retrieved from The University of Phoenix eBook Collection database. Leonard-Barton, D., & Kraus, W. A. (1985, November). Implementing New Technology. Harvard Business Review. Retrieved from http://hbr.org/1985/11/implementing-new-technology/ar/8 Rehani, N. (n. d. ). Using SDLC Methodology to Implement HIT. Retrieved from http://www.leidoshealth.com/images/uploads/maxIT-VCS_Using_SDLC_Methodology_ to_Implement_HIT_vF.pdf Rouse, M. (2006). TechTarget. Retrieved from http://searchsoftwarequality.techtarget.com/definition/systems-development-life-cycle The Four Best Web Collaboration Tools. (2012). Retrieved from http://www.foxbusiness.com/technology/2012/02/06/four-best-web-collaboration-tools/

You May Also Find These Documents Helpful

  • Good Essays

    There are many ways to accomplish this project. Before it can be started, we must determine what type of project plan we are going to utilize. In this area, there are many choices. Choices range from the Waterfall process to Incremental processes to Open-source. Each process has risks as well as things that make them stand out.…

    • 1239 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Xacc/210 Final Project

    • 522 Words
    • 3 Pages

    The system development life cycle, known as the SDLC, consist of six stages. A project team works through the stages of conceptualize, analyze, design, construct and implement a new information technology system. By using the system development life cycle it increases the accuracy and efficiency, also decreasing the odds of product failure.…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    • Your summary should be written in a concise and clear manner that summarizes your policy for readers.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    1. Information Systems Manager. The objective of this project is to develop an integrated system to improve day-to-day operations of Spa Works as well as to offer better reporting in the accounting and human resources. As a result, the IS manager of Spa Works has been chosen to serve on the committee to ensure the strategic IS planning is aligned with the company’s overall strategy. IS manager will advise on the hardware and software (software upgrades) that must be purchased to ensure smooth functionality of the system applications. The IS manager will also endorse an effective and efficient system design so that everyone across the organization is able to use it trouble-free. Being on the advisory board, IS manager will facilitate proper security and recovery software and will develop strategies for training the existing and new personnel if required. Spa Works’ IS manager will also ensure that a set of adequate IT policies is in place and the new system complies with…

    • 1046 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Is3230 Project Description

    • 2573 Words
    • 19 Pages

    and management of an information systems security framework. To be able to do so, you need to be able…

    • 2573 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Online SharePoint Site Access|Project Manager|Monthly|Project Sponsor,Senior Leadership, Project Team,Business Units|C|Website access to documentation and status documents.|…

    • 768 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    ITMG624

    • 4112 Words
    • 21 Pages

    This course explores successful project management for information technology projects. The System Development Life Cycle (SDLC) models are defined including the waterfall, spiral, incremental release, and prototyping models. Students will differentiate between these models and apply corresponding project management methods to identify critical checkpoints and reviews. Risk management, as applied to technology projects, is examined. Key project indicators are discussed, and students will explore defining measurement criteria for determining critical success factors on a project. The course defines the application of knowledge, skills, tools, and techniques to project activities and includes a tutorial for Microsoft Project. Emphasis is placed on the three dimensions of the information technology project constraints: scope, time, and cost. Students are recommended to have access to Microsoft Project. Course software requirements with the appropriate versions are listed under the Resources.…

    • 4112 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    * Britain’s policy of Salutary Neglect guided the American Society in Legislative assemblies, commerce, and religion; it is because of these factors that made the Americas a thriving world source for trade and many other things.…

    • 430 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    appropriate to manage these risks. IT managers then present this information to the senior management.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Having the proper security measures is very critical when running a business. It can be very expensive for an organization to keep an updated security system but in the end, it is well worth the money. No manager should want to even take the risk of letting hackers or viruses into the organizations information system. To fully understand why it is critical to have security measures, you first need to understand the different threats a network can face. Having a good secure network can prevent things such as malware, social engineering attacks, spam, and phishing. All of these can be very dangerous and damaging to your network. As a manager it is also very important to have a thorough security policy that states the precautions and also the steps to take in case of a security breach. When choosing security controls for your business you must consider three things; what security controls does your business need to safeguard the information systems, the safety and protection that security controls should provide, and existing security controls and how they have been implemented.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The information systems that are used in the office I work at include an office information system and a transaction processing system. Everything in my office is performed electronically. I submit all claim forms through EDI on a daily basis. EDI (electronic data interchange) is used for the electronic exchange of text, graphics, audio and video. Submitting my claim forms this way creates less waste, as with the paper and mail format. It also saves money. The hardware that is used includes my computer, copy machine, and a facsimile. All of these things used make the process a lot easier, rather than having to send and receive everything through snail mail. When submitting through an EDI, I can receive my payments back within two weeks. If I were to send through the mail, I would have to wait up to 6 weeks to receive something back from an insurance company.…

    • 288 Words
    • 1 Page
    Satisfactory Essays