Managing Information Systems Case Study
The delivery of various hardware and software services via the internet and distant servers is known as cloud computing. Security is a significant problem in cloud computing because one cannot see the precise place where their data is being stored or processed. The hazards that can develop throughout the implementation or management process are increased. The company is responsible for user identification and authorization, identity management, data encryption, and access control, even if the cloud service provider guarantees data integrity (Kumari & Singh, 2021). Identity theft, data breaches, malware infections, and other security issues on the cloud all lead to a decline in user confidence in your applications.
Enterprises now rely on numerous cloud service providers in addition to using a single cloud because there are more options available to them. Most of these businesses employ hybrid cloud strategies. The infrastructure team frequently finds that managing this is hindered. Because of the variations between various cloud providers, the process usually ends up being extremely complicated for the IT staff. It gets vulnerable as more users have access to your cloud account. Managing Information Systems Case Study An organization’s private data will be accessible to anyone who learns your password or breaks into their cloud (Ahmad, 2017). The company should employ multiple levels of authentication and make sure that credentials are kept secure. Additionally, passwords need to be changed frequently, particularly once an individual quits and leaves the company. It’s wise to use discretion when granting access rights to usernames and passwords.
A business performance starts to depend on your provider when you shift your business apps to the cloud or a third-party vendor. Choosing the best cloud service provider is yet another significant issue with cloud computing. One should search for providers with cutting-edge technologies before making an investment. The performance of the BI and other cloud-based systems is also connected to those of the provider. Make sure the service has processes in place to address problems as they develop in real time before picking them.
Cloud security, often referred to as cloud computing security, is a group of security controls intended to safeguard data, programs, and infrastructure that are hosted in the cloud. These steps guarantee device and user authentication, data and resource access control, and data privacy protection. They assist with regulatory compliance as well. Businesses that keep a lot of personally identifiable information (PII) or other sensitive data are at danger of becoming targets for cybercriminals (Tabrizchi & Kuchaki 2020). As a result, IT must put up a cloud system with more than simply the fundamental configurations, pre-configured credentials, and access restrictions.
Cloud storage’s intrinsic accessibility means that breaking into a poorly setup system doesn’t always require a high level of technical understanding. Criminals are undoubtedly a problem, but human error is a much more prevalent one. Staff who are not properly trained or who have poorly set access restrictions may treat secure information carelessly. Security personnel must therefore make sure the system is as secure as possible against all of their attempts, whether malicious or not.
Law enforcement organizations require qualified investigators, modern computer forensic examiners, and prosecutors with experience in cybercrime in order to investigate and prosecute cybercrime. Federal and state law enforcement officials claim that there is a shortage of qualified applicants because those who look into or investigate cybercrime must be highly trained specialists with a combination of detective and technical skills, including an understanding of different IT hardware and software and forensic tools (Majumdar et al., 2018). Few departments have staff members who are able or willing to undertake investigations involving computers and very sophisticated technological systems. Even departments that are able to recruit willing investigators must contend with the financing crisis that most law enforcement organizations are always fighting.
This case study assesses Mr. Macharia’s (the CEO) upcoming steps regarding the B1 system upgrade. It entails determining if the improvement should enhance the B1 or upgrading to a newer version of SAP. Following the discussion, Mr. Macharia will assess the efficiency and capacity of the current B1 system to resolve his concerns. Notably. It is important to take Abbas’ concerns regarding RedLock’s past inefficiencies, particularly the failures with customizing, seriously (Acosta & Acosta, 2014). Making a wise choice requires thorough research on the B1 system’s potential and existing limitations. This suggests that a B1 audit system is necessary before choosing to upgrade to SAP. The effectiveness of RedLock’s system upgrade efforts is a crucial evaluation as well. It is clear from the case study that RedLock’s internal inefficiencies have prevented Zaidi from reaping the full benefits of the B1 system.
After careful consideration, it is possible to conclude that Zaidi Oil Group operations have developed beyond the capabilities of its B1 SAP system. According to the case study’s data, the B1 system has served the company well because it has been continuously upgraded to meet the needs of a growing business. The benefits of Macharia pursuing an upgrade to a more recent version of SAP will be examined in three categories, since the advantages clearly outweigh the disadvantages.
A corporation must balance initiatives with its readiness for SAP upgrades as it creates its technology road plan. Performance, compatibility, and affordability are the three key factors used to assess the A1 SAP system update. According to Abbass’ account of the state of the business’ operations at the moment, the B1 system is currently a hindrance to success. It would be fair to say that the performance of Zaidi Oil Group depends on the decision to upgrade the SAP to the A1 system after an empirical analysis of the provided evidence. An overhaul will expand into unexplored markets, reduce operating expenses, and boost revenue.
Acosta, F. R., & Acosta, A. S. (2014). Zaidi Oil: the SAP ERP dilemma. Emerald Emerging Markets Case Studies. https://doi.org/10.1108/EEMCS-01-2014-0023
Ahmad, N. (2017). Cloud computing: Technology, security issues and solutions. In 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) (pp. 30-35). IEEE.
Kumari, P., & Singh, M. (2021). Cloud Security Challenges and Issues. Review of International Geographical Education Online, 11(8).
Majumdar, S., Madi, T., Jarraya, Y., Pourzandi, M., Wang, L., & Debbabi, M. (2018). Cloud security auditing: major approaches and existing challenges. In International Symposium on Foundations and Practice of Security (pp. 61-77). Springer, Cham.
Tabrizchi, H., & Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing, 76(12), 9493-9532.