Applying Information Security and SDLC to Business

Total Page:16

File Type:pdf, Size:1020Kb

Applying Information Security and SDLC to Business

Applying Information Security and SDLC to Business 1 BIS/320 Version 2

University of Phoenix Material

Applying Information Security and SDLC to Business

Your team has been researching and discussing three bookstores throughout the course to apply the concepts presented. For this assignment, you will continue to apply those concepts in a final paper.

Write a paper of no more than 3,000 words in which you discuss one of the bookstores, use the SDLC method to implement a new technology into the bookstore, and detail a disaster recovery plan for the bookstore.

Discuss one of the three bookstores based on the research and evaluation in your Learning Team.

 Introduce your selected bookstore.

o Who and what is the bookstore? What is their mission? o What products do they sell? o Who are their customers? o Explain their website.

 Color  Navigation  Ease of using the tools; for example, using credit cards for purchases

 Discuss your selected bookstore.

o Include terms such as hardware, software, databases, data communications, Internet technologies, collaboration tools, and security.

o Include how they use hardware and software components.

o Discuss the types of database information used by the bookstore based on what you see on their website. Identify any additional information the bookstore could have added to enhance their database.

o Identify their data communication technologies.

o Discuss how they address security issues.

 Address the following questions in your analysis.

o What hardware, software, networks, and data does the organization have? o Who manages it? o Who uses it? o Who owns it? o Where is it located? o Where is it used? o Does the technology fulfill the business objectives? Applying Information Security and SDLC to Business 2 BIS/320 Version 2

Use the SDLC method to implement a new technology into your selected bookstore. Examples include a collaboration tool or the use of cloud computing.

 Research SDLC methodology.  Include the below five phases of the SDLC method:

o System definition o Requirements analysis o Component design o Implementation o Maintenance

Detail a disaster recovery plan for your selected bookstore and include the following:

 Types of disasters and threats  People involved and their roles  Assets to protect including information  Data policy definitions  Necessary response plans in case of a disaster

Cite at least five references in your paper.

Format your paper consistent with APA guidelines.

Recommended publications