FMGT 2701 - Assignment 6
docx
keyboard_arrow_up
School
British Columbia Institute of Technology *
*We aren’t endorsed by this school
Course
2701
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
2
Uploaded by EarlZebra3851
a.
Name and describe three authentication methods.
A token is a physical device to prove the identity of the user. My friend
uses YubiKey to identify himself in his company. A smart card shaped
like a credit card with a chip in it will give access to a specific person.
One of my friends gets into his office by tapping his card. Biometric
authentication is designed to read unique human physical
characteristics such as fingerprints, face, or voice to allow the user to
access. Nowadays, I use my face or fingerprint to unblock my mobile
phone. Two-factor authentication means that the user needs to provide
an alternative form of authentication other than a single-layered
security check (such as a password) to identify him/herself. BCIT is
using two-factor authentication to log in to its domain account via the
Microsoft Authentication tool.
b. Distinguish between disaster recovery planning and business
continuity planning.
Disaster recovery planning mainly focuses on technical issues (IT
infrastructure) while business continuity planning mainly focuses on
how to recover the business operation. The goal of disaster recovery
planning is to decrease downtime and data loss but for business
continuity planning, its goal is to recover the operational process as
soon as possible. Business continuity planning encompasses disaster
recovery planning, and it emphasizes all the processes to promote the
continuity of the operation while disaster recovery planning
emphasizes the IT and the critical issue. Both plans should be worked
together after the system is down. Management of the company
should also identify which component is critical to restore the business
after the disaster.
c. Explain and provide an example of each one of the following concepts
related to identity theft, protection, mitigation, and correction.
Identity mainly means the imposter's unauthorized use of other
people’s personal information leads to fraud crime. Protection asks
people to protect their information from being stolen. For example,
BCIT recently asked students to use multi-factor authentication to
improve the security of their identity. Mitigation means trying to
decrease the impact of identity theft after it occurs. For example, I
always review my credit card transactions to check if there are
unrecognized transactions and when I find them, I will immediately
report them to my credit card company to do further investigation.
Correction means taking action to recover from identity theft. For
example, after noticing I was the victim of fraud, I informed my credit
card company to put a fraud alert on my account and report it to the
police. I also report it to the credit company to correct my credit score.
d. Identify and describe the security problems cloud computing poses.
When data are stored in the cloud, it is easier for data privacy to be
breached. If it happens, it may lead to negative legal consequences and
harm customer trust. Besides, the data loss could also result in financial and
reputation damage. It is difficult to ensure that only authorized users have
access to relevant data, which increases the risk of data breaches.
Addressing these security problems requires collaborative efforts between
the cloud service providers and clients.
e. Describe measures for improving software quality and reliability.
There are several ways to improve software quality and reliability. For
example, the company could do risk assessments on the potential issues
that could impact the quality of the software. The company could also train
specialists in the development departments to encourage them to keep
updated with the newest technology. The company could ask for feedback
from the end users on the functionality of the software and improve it.
Having a team to be responsible for the quality of the software by doing tests
before releasing the software. Keep a record of the aspects of the software
since documentation could help its future development.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help