Delivery in day(s): 3
MIS101 Business Information System Assignment
This assignment solution is related to business information system's security. Every business has uses Information Technology thus scholar requires to have knowledge of business information systems
Firewall and their business protection
Security is a term related with the safeguarding of the property and business information with the unethical access, unauthorized usage, illegitimate outcomes and making the availability to the restricted zone. It is primarily focused by the business to make the direction proper and adequate to make the industry viable and flexible with the data and other information which needs to be stored in such a way to make the proper dimensions and available traits to the business (Henmi, 2003).
For developing the security, Firewalls are used to ensure the protection of the data and the information with the above said threats and unauthorized usage. These are the systems and the software which are prepared for the protection of the business information with the probable causes and hence with the mechanism we are optimizing the process the organization is able to achieve the possible opportunities making the business efficient and effective (Al-Shaer, 1967).
They protect the business with the following techniques:
- Packet filter –These works on the user defined rules and guidelines which are set for the entering or leaving of the packets which requires acceptance if fair or reject if not adequate.
- Application gateway –This helps the business by applying the security mechanisms on the FTP and Telnet servers. This entails performance degradation and hence inefficient sometimes.
- Circuit – level gateway –This helps the business when the connection of TCP or UDP establishes and hence it applies the mechanism of security thus with the packets flowing between hosts and no checking on further level is entertained (Al-Shaer, 1967).
Phishing email & ways to avoid phishing scam
Phishing is the malicious intention to carry the username, password and other important details by fooling a program to make the benefits in the illegitimate ways.
The intent of the phishing emails is related with the malicious intentions and generally they masquerading the information by presenting as an entity based on the trust to the electronic communication. These spoofing may be related with the payment gateways, IT websites, surveys websites and other e-commerce portals. There are few types of basic level of phishing done in the markets which are spear phishing, clone phishing and whaling. All the activities are centred with the proper intention of the frauds and forgery (Lininger, 1976).
The four basic steps which can be used to avoid phishing scams are as follows:
- Spam control:There should be a proper guard of the SPAM and hence the mail which are not relevant and are doubted by the other users should directly go to the spam box.
- Communication of the personal information:We should never communicate the personal information to anybody via emails even if they are very close to us as in case we require on the basis of urgency then one should use the mobile devices of the secured website channels.
- Prohibition of the information sharing:We should never share the personal information via email as it can create a challenge of the phishing attack and a hacker can easily access the personal data where fraud and forgery can recorded.
- Limit the usage of the emails on public desktops or laptops:The usage of the emails should be restricted to the personal use and on the personal computers to avoid the duplication of the details and phishing attacks on the verge of the technology (Hadnagy & Fincher, 2015).
Relationship between surveillance and privacy with safeguards
There is a great relationship exist between the surveillance and privacy. In the basic terms the surveillance is generally a violation of the privacy. It is the further most step of the privacy which entails the surveillance and hence with the development of the threats in the privacy the surveillance has been started. In other words we can assume that for maintaining the decorum of the privacy, surveillance is used. There is a great need for the usage of the surveillance to make the business and individual protected with the ill activities performed with or without intentions (Hier & Greenberg, 2009).
With the surveillance activities the privacy is surrounded by several threats which can be in the order of the unauthorized spy video surveillance, systems of the identity, commerce dealt with electronics, fraud and forgery, bugging of the audio etc (NSW, 2001).
Safeguards which exist to protect the individuals are as follows:
- Visual Surveillance: Person can watch the activities around them with the visual surveillance (Dowding, 2011).
- Electronic Surveillance:They can monitor the performances and circumstances by the electronic surveillances (NSW, 2001).
- Data Surveillance:They can record the data and gather the conclusion of the forgery and frauds if detected (Wacks, 1946).
- Identification:They can identify the probable root causes of the ill activities and attentively remove them.
- Person location and tracking:With the proper sensors they can locate the persons and can get the knowledge of the activities.
- Behaviour Manipulation and Repression:They can also count on the behaviour manipulation with the equipments and facial expressions and causes the repression feelings if the person has falsified intentions (Hier & Greenberg, 2009).
‘social commerce’ and there potential benefits to customers and as well to the business.
Social Commerce: To do the online trading, a part of e-commerce which uses the social interaction and user support is known as social commerce. Online transactions are promoted by social commerce. The concept of social commerce came in November ,2005 By Yahoo (Belch & Belch, 1951).
Potential benefits to the customers: There are end number of benefits to the customers and the consumers with the social commerce as it is the latest and modern technology to help the customers with the different varieties of the products, promotions with the real reviews and feedbacks and responses on the performance of the products and services.
- Social connectivity:The customers get their new friends and well wisher with the social commerce medium without any efforts whom they can contact for other advice and thoughts also (Belch & Belch, 1951).
- Feedbacks and responses:They are benefitted in the feedbacks and responses shared by the people on the social content based on the performance and reviews of the products and services helps to draw decisions related with the purchases.
- Significant information’s:They are provided with the significant information which is helpful in the context of the products and services (Belch & Belch, 1951).
- Potential benefits to the business:Social commerce benefits the business with the endless opportunities in the ways of the segmentation of the targeted audience based on their taste, nature and preferences. The benefits are listed as we follow further:
- Customer Loyalty:The business is available with the customer loyalty which is faithful for the business (Solis, 2012).
- Purchase repeat and consistent:The business is available with the consistent purchases and hence they are profitable with the social commerce usage.
- Mouth advertising:They are benefitted with the free and developed mouth advertising which gives the result of the potential client and customer base in zero cost (Solis, 2012).
- Al-Shaer, E., (1967). Automated firewall analytics : design, configuration and optimization.s.l.:Springer. http://eds.a.ebscohost.com/eds/detail/detail?vid=24&sid=cd4f05bd-4cf1-43d8-b61a-2f504fcd7723%40sessionmgr4002&hid=4202&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d#AN=deakin.b3176613&db=cat00097a
- Belch, G. E. & Belch, M. A., (1951). Advertising and promotion : an integrated marketing communications perspective.10 ed. (s.l).:McGraw-Hill. http://eds.a.ebscohost.com/eds/detail/detail?vid=1&sid=cd4f05bd-4cf1-43d8-b61a-2f504fcd7723%40sessionmgr4002&hid=4202&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d#AN=deakin.b3051162&db=cat00097a
- Dowding, M. R., 2011. Privacy : defending an illusion.s.l.:Scarecrow Press. http://eds.a.ebscohost.com/eds/detail/detail?vid=3&sid=cd4f05bd-4cf1-43d8-b61a-2f504fcd7723%40sessionmgr4002&hid=4202&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d#AN=deakin.b2557383&db=cat00097a
- Hadnagy, C. & Fincher, M., 2015. Phishing dark waters : the offensive and defensive sides of malicious e-mails.s.l.:John Wiley & Sons. http://eds.a.ebscohost.com/eds/detail/detail?vid=5&sid=e2ed649a-c62f-4309-9fc5-d5b6cb23dfc5%40sessionmgr4005&hid=4202&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d
- Henmi, A. C., 2003. Firewall : period, best damn book.s.l.:Syngress Publishing. http://eds.a.ebscohost.com/eds/detail/detail?vid=2&sid=e2ed649a-c62f-4309-9fc5-d5b6cb23dfc5%40sessionmgr4005&hid=4202&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d#AN=deakin.b2471827&db=cat00097a
- Hier, S. P. & Greenberg, J., 2009. Surveillance : power, problems, and politics.s.l.:UBC Press. http://eds.a.ebscohost.com/eds/detail/detail?vid=14&sid=cd4f05bd-4cf1-43d8-b61a-2f504fcd7723%40sessionmgr4002&hid=4202&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d#AN=deakin.b2539746&db=cat00097a
- Lininger, R., 1976. Phishing : cutting the identity theft line / Rachael Lininger and Russell Dean Vines.s.l.:Wiley Pub. http://eds.a.ebscohost.com/eds/detail/detail?vid=16&sid=cd4f05bd-4cf1-43d8-b61a-2f504fcd7723%40sessionmgr4002&hid=4202&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d#AN=deakin.b2201962&db=cat00097a