FMGT 2701 - Assignment 6

docx

School

British Columbia Institute of Technology *

*We aren’t endorsed by this school

Course

2701

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

2

Uploaded by EarlZebra3851

Report
a. Name and describe three authentication methods. A token is a physical device to prove the identity of the user. My friend uses YubiKey to identify himself in his company. A smart card shaped like a credit card with a chip in it will give access to a specific person. One of my friends gets into his office by tapping his card. Biometric authentication is designed to read unique human physical characteristics such as fingerprints, face, or voice to allow the user to access. Nowadays, I use my face or fingerprint to unblock my mobile phone. Two-factor authentication means that the user needs to provide an alternative form of authentication other than a single-layered security check (such as a password) to identify him/herself. BCIT is using two-factor authentication to log in to its domain account via the Microsoft Authentication tool. b. Distinguish between disaster recovery planning and business continuity planning. Disaster recovery planning mainly focuses on technical issues (IT infrastructure) while business continuity planning mainly focuses on how to recover the business operation. The goal of disaster recovery planning is to decrease downtime and data loss but for business continuity planning, its goal is to recover the operational process as soon as possible. Business continuity planning encompasses disaster recovery planning, and it emphasizes all the processes to promote the continuity of the operation while disaster recovery planning emphasizes the IT and the critical issue. Both plans should be worked together after the system is down. Management of the company should also identify which component is critical to restore the business after the disaster. c. Explain and provide an example of each one of the following concepts related to identity theft, protection, mitigation, and correction. Identity mainly means the imposter's unauthorized use of other people’s personal information leads to fraud crime. Protection asks people to protect their information from being stolen. For example, BCIT recently asked students to use multi-factor authentication to improve the security of their identity. Mitigation means trying to decrease the impact of identity theft after it occurs. For example, I always review my credit card transactions to check if there are
unrecognized transactions and when I find them, I will immediately report them to my credit card company to do further investigation. Correction means taking action to recover from identity theft. For example, after noticing I was the victim of fraud, I informed my credit card company to put a fraud alert on my account and report it to the police. I also report it to the credit company to correct my credit score. d. Identify and describe the security problems cloud computing poses. When data are stored in the cloud, it is easier for data privacy to be breached. If it happens, it may lead to negative legal consequences and harm customer trust. Besides, the data loss could also result in financial and reputation damage. It is difficult to ensure that only authorized users have access to relevant data, which increases the risk of data breaches. Addressing these security problems requires collaborative efforts between the cloud service providers and clients. e. Describe measures for improving software quality and reliability. There are several ways to improve software quality and reliability. For example, the company could do risk assessments on the potential issues that could impact the quality of the software. The company could also train specialists in the development departments to encourage them to keep updated with the newest technology. The company could ask for feedback from the end users on the functionality of the software and improve it. Having a team to be responsible for the quality of the software by doing tests before releasing the software. Keep a record of the aspects of the software since documentation could help its future development.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help