Applying Information Security and SDLC to Business

Applying Information Security and SDLC to Business

<p> Applying Information Security and SDLC to Business 1 BIS/320 Version 2</p><p>University of Phoenix Material</p><p>Applying Information Security and SDLC to Business</p><p>Your team has been researching and discussing three bookstores throughout the course to apply the concepts presented. For this assignment, you will continue to apply those concepts in a final paper. </p><p>Write a paper of no more than 3,000 words in which you discuss one of the bookstores, use the SDLC method to implement a new technology into the bookstore, and detail a disaster recovery plan for the bookstore. </p><p>Discuss one of the three bookstores based on the research and evaluation in your Learning Team.</p><p> Introduce your selected bookstore.</p><p> o Who and what is the bookstore? What is their mission? o What products do they sell? o Who are their customers? o Explain their website.</p><p> Color  Navigation  Ease of using the tools; for example, using credit cards for purchases</p><p> Discuss your selected bookstore.</p><p> o Include terms such as hardware, software, databases, data communications, Internet technologies, collaboration tools, and security. </p><p> o Include how they use hardware and software components.</p><p> o Discuss the types of database information used by the bookstore based on what you see on their website. Identify any additional information the bookstore could have added to enhance their database.</p><p> o Identify their data communication technologies. </p><p> o Discuss how they address security issues.</p><p> Address the following questions in your analysis.</p><p> o What hardware, software, networks, and data does the organization have? o Who manages it? o Who uses it? o Who owns it? o Where is it located? o Where is it used? o Does the technology fulfill the business objectives? Applying Information Security and SDLC to Business 2 BIS/320 Version 2</p><p>Use the SDLC method to implement a new technology into your selected bookstore. Examples include a collaboration tool or the use of cloud computing.</p><p> Research SDLC methodology.  Include the below five phases of the SDLC method:</p><p> o System definition o Requirements analysis o Component design o Implementation o Maintenance</p><p>Detail a disaster recovery plan for your selected bookstore and include the following:</p><p> Types of disasters and threats  People involved and their roles  Assets to protect including information  Data policy definitions  Necessary response plans in case of a disaster</p><p>Cite at least five references in your paper.</p><p>Format your paper consistent with APA guidelines.</p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us