Friday, May 24, 2019

Week 3 Bis/320 Weekly Reflection Outline

University of Phoenix Material Applying Information Security and SDLC to Business Your team has been researching and plowing iii bookstores throughout the passage to apply the concepts presented. For this assignment, you will continue to apply those concepts in a final paper. Write a paper of no more than 3,000 words in which you discuss one of the bookstores, use the SDLC method to implement a new technology into the bookstore, and detail a disaster recovery plan for the bookstore. Discuss one of the three bookstores based on the research and evaluation in your Learning Team. Introduce your selected bookstore. oWho and what is the bookstore? What is their mission? oWhat products do they sell? oWho are their customers? oExplain their website. Color Navigation residuum of using the tools for example, using credit cards for purchases Discuss your selected bookstore. oInclude terms such as hardware, software, databases, data confabulations, Internet technologies, collaboration too ls, and security. oInclude how they use hardware and software components. oDiscuss the types of database breeding used by the bookstore based on what you see on their website.Identify any additional information the bookstore could have added to enhance their database. oIdentify their data communication technologies. oDiscuss how they address security issues. Address the following questions in your analysis. oWhat hardware, software, networks, and data does the organization have? oWho manages it? oWho uses it? oWho owns it? oWhere is it located? oWhere is it used? oDoes the technology fulfill the business objectives? Use the SDLC method to implement a new technology into your selected bookstore.Examples include a collaboration tool or the use of cloud computing. Research SDLC methodology. Include the below louver phases of the SDLC method oSystem definition oRequirements analysis oComponent design oImplementation oMaintenance Detail a disaster recovery plan for your selected bookst ore and include the following Types of disasters and threats People involved and their roles Assets to protect including information Data policy definitions Necessary response plans in case of a disaster Cite at least five references in your paper. formatting your paper consistent with APA guidelines

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.