Friday, May 1, 2020

Information Security Management Assignment Case Study of Solar IQ

Question: Discuss about theInformation Security Management Assignmentfor Case Study of Solar IQ. Answer: Preparation of the Policy Statement for BCM at SIQ The organization specializes in production installation and maintenance of photoelectric solar panel solution for home appliances all over Australia. The main purpose of the organization is to develop solar panel inverters and monitoring system. The inverter will convert the solar energy to household electricity and the monitor is the software device which will track the entire system. The DC electricity is converted into AC electricity in order to match the efficiency of other competitive organizations (Schmidt and Prado 2013). The inversion and monitoring approach needs certain business continuity management planning for overall development of the organization. The policies for business continuity management planning are as follows: Policy statement: Different ranges of products and services that can meet the requirements of education and community are developed by the development department of Solar IQ, they are committed to do this. The organization is maintaining the risk management system for the organization that might create threats by external and internal attacks. The products and service that interrupts the business continuity is initially identified by Solar IQ and then the identified problem are fixed by the risk management department of the organization (Studnia et al. 2013). Moreover the protection and precaution technologies are completely dependent on IT risk recovery strategies. Additionally many other objectives of the policies are identified (Lee 2012). If any sort of information system interruption occurs then, the risk management department will identify the risks and recover those by re establishing the services. Basically in order to protect the data and entire information system advanced and wider range of risk management system is identified (Schmidt and Prado 2013). It provides offer and advanced frame work with proper configuration to the managers of Solar IQ to identify the main risks that threaten the organizational management system. The employees working for Solar IQ have the potentials to prevent the exploitation of the confidential information stored in the data base system of the organization. Apart from this, it is also having the capability to protect the resource (Kapeliushnikov et al. 2013). The broad range of risk identification capacity minimizes the cost by implementing different business actions. The main thing is this that BCM for Solar IQ is a system which is maintained in a regular basis such as implementation, regular testing, development and appropriate update of the system (Zissis and Lekkas 2012). As the business is facing environmental threats, thus disaster recovery management system is also developed for risks detection and recovery. Even the policies are applicable for all entities and all critical business functionalities. Most of the BCM system leads by standard BCM guidelines. The presence of intranet supervises the overall management system of Solar IQ. Evaluation of Preliminary Risks SIQ and Rables the Most Likely Disruption Scenarios for the Risks While evaluating the risks associated with Solar IQ it has been found that, there are many preliminary risks that might hamper the over system. The inverter and monitoring system develops the entire management system by adopting business intelligence (Schmidt and Prado 2013). By adopting the new generation wireless technology, in the year between 2007 and 2011 the organization had inaugurated solar powered buildings. As, Solar IQ is maintaining the manufacture based supply chain thus most of the orders are managing by electronic mail. Special kind of design component needed technology based benchmarks and these are conquered for some of the selected suppliers (Lee 2012). From the customers perspectives it has been found that, the data warehouse performs faster than any other processing system. The dynamic reporting system will allow the clients of Solar IQ to undertake the technological uses. The resources provides opportunity to big data analysis and tough competition to other power saving and converting organizations. The HR management system is based on cloud computing and many new initiatives and the enterprise system is exploring all the information stored in the database management system of Solar IQ (Kapeliushnikov et al. 2013). Many core business functionalities are integrating to the existing system of Solar IQ based on SaaS platform. Without establishing any business policies Solar IQ is developing their business relationships in terms of partnership with salesforce.com. Though, during assessment period it has been found that, some incidents took place within the organization that changed the overall business operation of Solar IQ (Studnia, et al. 2013). In the year between 2013 and 2016 much number of virus attacks was detected in the email attachment scanned (Kapeliushnikov, et al. 2013). The virus attack was detected by the IT department of Solar IQ. The distributed denial of service was another kind of attack detected by the IT department of the organization and it has been defined that, DDOS has the ability to change the content of the resource and the link of the resource (Schmidt and Prado 2013). From different analysis the deliberate, accidental and the environmental threat are ranked. The ranking is as followed: Risks Mitigation planning Long term solution Risk ranking Legacy enterprise system Insecurity and unstable enterprise system requires proper monitoring mechanism. Inventory management system will help to ensure the long term solution of the system. 1 Subcontractor and BYOD use of SIQ Systems Expert team is needed to be hired so that the monitoring team will be able to manage the entire system. Data integrity can ensure the solution. 3 Email compromise Monitoring each email and other online transaction carefully can resolve these issues. Supplant current Enterprise System with another powerful ES which can deal with various exchange stacks and with modules and modules that can without much of a stretch be included, redesigned and expelled. 2 Offshore data storage of customer data Protected data storage will secure the communication between the service provider and the users. Find and hire a proper Australian based company for cloud hosting. 5 Physical security Request email secret word to be changed at regular intervals and connections secret word protected Secure cloud based capacity of classified plans requiring sharing alternatives utilizing certifications ought to be actualized. 4 References Kapeliushnikov, R., Kuznetsov, A., Demina, N. and Kuznetsova, O., 2013. Threats to security of property rights in a transition economy: An empirical perspective.Journal of Comparative Economics,41(1), pp.245-264. Lee, K., 2012. Security threats in cloud computing environments.International Journal of Security and Its Applications,6(4), pp.25-32. Schmidt, S.O. and Prado, E.P.V., 2013. IT Architecture and Information Quality in Data Warehouse and Business Intelligence Environments.Information Quality and Governance for Business Intelligence, p.112. Studnia, I., Nicomette, V., Alata, E., Deswarte, Y., Kaniche, M. and Laarouchi, Y., 2013, June. Survey on security threats and protection mechanisms in embedded automotive networks. InDependable Systems and Networks Workshop (DSN-W), 2013 43rd Annual IEEE/IFIP Conference on(pp. 1-12). IEEE. Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues.Future Generation computer systems,28(3), pp.583-592.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.