Hewlett Packard
Hewlett Packard
Contents
Q1. Three ways to approach systems security risk:..............................................3
Q2. Four international business strategies in the digital world by Valacich:..........4
Q3: Knowledge Worker in terms of todays business environment:.......................4
Q4. Reviewing:....................................................................................................... 5
www.informationweek.com................................................................................. 5
www.itwire.com.................................................................................................. 5
www.delimiter.com.au........................................................................................ 5
www.computerworld.com.au..............................................................................5
Q. 5 Primary and secondary storage:....................................................................5
Q.6 Four services available from a network:..........................................................5
Q.7 List and explain three benefits of using extranets:.........................................6
Q.8 List and describe the five typical revenue models for e-commerce................6
Q.9 What are the advantages of storing information in a relational database
using a database management system (DBMS)?..................................................7
Q.10 Contrast technological safeguards and human safeguards in information
systems security.................................................................................................... 7
2. Quantitative Approach:
where estimation of risk worth is joined with application of numerical
measures estimation of assets is characterized in sums, the recurrence of
danger event in the quantity of cases, and vulnerability by the estimation of
likelihood of its misfortune, those strategies present results fit as a fiddle of
marker (Rot, 2008)
3. Qualitative Approach:
Which don't work on numerical information, displaying results as depictions,
proposals. (Rot, 2008)
Q4. Reviewing:
www.informationweek.com
www.itwire.com
www.delimiter.com.au
www.computerworld.com.au
According to the website http://www.informationweek.com/ Cyber security seems to be the topic
of most discussions, whether it be on computers, mobiles, tablets or even cloud computing.
(http://www.informationweek.com/)
On http://www.itwire.com/ I was personally most intrigued by the launch of Windows 10
operating system, they will have a live preview of it.(http://www.itwire.com/)
The most important announcement on http://delimiter.com.au/ would have to be its closure. After
a successful stint online, the website seems to have run its course and has decided to shut shop.
(http://delimiter.com.au/)
Virtual Reality, especially the use of glasses seemed to be the burning topic in the case of
http://www.computerworld.com.au/ after Google had announced its virtual reality glasses, it
seems Microsoft is going to beat Google at this game, as it has announced its soon to be launched
HoloLens.( http://www.computerworld.com.au/)
Primary memory storages are speedier, where as secondary storages are slower.
(Sagar, 2009)
Primary memory storages are associated through information transports to CPU,
where as the secondary storages are join through information links to CPU (Sagar,
2009)
and telephone tag, and it eliminates the expenses connected with in-individual data trades. Case
in point, an extranet may permit you to give client administration data outside of general business
hours. (AllBusiness, n.d)
Q.8 List and describe the five typical revenue models for
e-commerce
value recommendation - how an organization's item or administration satisfies the needs of
clients. Ordinary e-trade quality recommendations incorporate personalization, customization,
accommodation, and decrease of item pursuit and value conveyance costs.
revenue model - how the organization arrangements to profit from its operations. Real ebusiness income models incorporate the publicizing model, membership model, exchange
expense model, deals model, and subsidiary model.
market opportunity - the income potential inside an organization's expected marketspace.
competitive environment-the immediate and aberrant contenders working together in the same
marketspace, including what number of there are and how beneficial they are.
competitive point of interest - the elements that separate the business from its rival, empowering
it to give a predominant item.
Technological safeguards are the steps implemented by associations to secure equipment and
programming parts of data frameworks. There are three noteworthy levels where this
protection is connected and this is distinguishing proof and verification, malware security and
encryption and firewalls. Recognizable proof and confirmation includes systems, for
example, utilization of biometric information, single sign-on and utilization of smartcards.
These are technological developments which are connected to secure data security in
associations. An illustration is the utilization of biometric information where human body
parts, for example, fingerprints and retina are utilized to validate clients.
Human safeguards are steps implemented by associations to protect the data framework
security, and they include control of individuals who access the data framework. Human
safeguards include different levels of managing the human asset and they incorporate
procuring and screening, position definition, scattering and implementation and end. Position
definition permits clients to have employment titles with comparing security rights while
spread and implementation guarantees that all staff are mindful of strategies took after when
getting to the framework. End includes change in representatives obligations while
contracting and screening distinguishes workers who represent a danger to the association.
Screening of workers through record verifications against law requirement organizations
when procuring is an illustration of human protect in data security.
References:
AllBusiness (n.d) Benefits of Extranets, [Online], Available:
http://www.allbusiness.com/technology/computer-networking/1283-1.html [22
January 2015].
McCrimmon, M. (2010) A NEW ROLE FOR MANAGEMENT IN TODAYS POSTINDUSTRIAL ORGANIZATION , August, [Online], Available:
http://iveybusinessjournal.com/topics/leadership/a-new-role-for-management-intodays-post-industrial-organization#.VMCnTC6pfQE [22 January 2015].
nrttechnology (n.d) DBMS, [Online], Available:
http://www.nrtechnology.com/education/database/lecture%201/lecture%201.htm
[22 January 2015].
Rot, A. (2008) 'IT Risk Assessment: Quantitative and Qualitative Approach', World
Congress on Engineering and Computer Science, San Francisco, USA.
Sagar, V. (2009) Difference between Primary storage and secondary storage, 30
September, [Online], Available: http://www.careerride.com/os-primary-storageand-secondary-storage.aspx [22 January 2015].
Valacich and Schneider (2010) Information Systems Today: Managing in the
Digital World, 4th edition, Prentice Hall.