Walden University
Executive Summary
Though there were many topics discussed throughout this course that improved my understanding of managing business information systems within Amazon. The topics of information systems impact communication, how information systems safeguard their information, as well as how legal, privacy, security, and ethical issues of business information systems. All these issues and more are serious issues that affect all businesses and must be addresses. Since all of these issues are serious concerns, it is important for businesses to make sure that their systems, which can contain customer, vendor, and employee information, is safe.
There is no excuse for not knowing something. There is a wide range of research that can be done in the library, newspapers, magazines, articles, and even on the World Wide Web, better known as the internet. There is amazing amount of information that can be found on the internet with all types of information. Because of the internet, more and more criminals are able to have access to business information systems. A simple password may deter a small criminal however more advanced criminals are able to break through firewalls to get to peoples’ information. By gaining education, you gain the value of business information for a business. Since a better understanding of business information system is needed and learning by doing research allows me to better understand and has changed the way I think about managing business information systems. Understanding the different types of storage devices and how they are best suited for each company and their needs.
The Back-up Plan
What would happen if a power outage eliminated power for an hour, a day, a week, a month, or more? What if a hurricane brought flood waters up to over 20 feet and flooded the entire company? What if a tornado destroyed the entire building that the company was housed in? What if someone “hacked” into the company mainframe and stole company information
These are just some of the questions that need to be asked in order to come up with a plan as to how to protect data from being lost. Several types of back-up storage devices can be utilized. These devices include but are not limited to online back-up systems, portable storage devices, and even offsite storage facilities.
An online back-up system is a system that copies your files to another company. This online back-up system transfers all files over the internet where information can still be vulnerable to hackers. Online back-up companies such as Carbonite, Cloud, Mozy, SOS, and CrashPlan are just some of the companies that offer online back-up plans.
Portable storage devices are just like it sounds – they are portable. Portable storage devices come in all shapes and size from small USB (Universal Storage Bus) to devices the size of a laptop. These devices are good for storing small files or backing up small computers/files. However this device can not be used for large files due to their size limitations.
Off site locations are good for larger businesses to store their files away from the main location in case of loss. One site transfers all information to the off site location through an internet connection. Internet connections can be vulnerable to hackers if and when these transfers happen.
Data Recovery Plan
What if a power outage eliminated power for an hour, a day, a week, a month, or more? What if a hurricane brought flood waters up to over 20 feet and flooded the entire company? What if a tornado destroyed the entire building that the company was housed in? What if someone “hacked” into the company mainframe and stole company information?
These are just some of the questions that need to be asked if something were to already happen to the company. A disaster recovery plan is a procedures manual/plan that includes