0% found this document useful (0 votes)
19 views

Information-System-for-Managers 6

The document discusses implementing a cloud solution strategy to help manage the operations of an educational institute with multiple branches across the country. It describes the key benefits of cloud computing like flexibility, cost savings, automatic updates, disaster recovery and security. It also discusses business process automation and its benefits like increased efficiency, freeing up time for creative work, and improved accuracy.

Uploaded by

harminder kaur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Information-System-for-Managers 6

The document discusses implementing a cloud solution strategy to help manage the operations of an educational institute with multiple branches across the country. It describes the key benefits of cloud computing like flexibility, cost savings, automatic updates, disaster recovery and security. It also discusses business process automation and its benefits like increased efficiency, freeing up time for creative work, and improved accuracy.

Uploaded by

harminder kaur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Information System for Managers

June 2023 Examination

Q.1) COMPT_PREP is an Educational Institute which helps the aspirants to prepare for
Engineering and Medical Exams. They have around 20 branches across the country. The
aspirant’s base is exploding on a Year-on-Year basis. Suggest a Cloud Solution strategy
to help manage the entire operations of COMPT_PREP. Also, detail out the features &
benefits of this Cloud Solution Strategy. (10 marks)

Answer 1

Introduction

COMPT PREP, an instructive organization, can assist candidates with seeking after designing and
logical vocations. Moving to the cloud is empowering associations to move quicker, be more spry, and
advance their organizations. The shift to distributed computing has totally changed how we work,
impart, and team up — and is quick turning into a need to remain cutthroat in the present
computerized world. Distributed computing is becoming famous step by step. Consistent business
extension and development requires enormous computational power and huge scope information
capacity frameworks. Distributed computing can help associations expand and safely move
information from actual areas to the 'cloud' that can be gotten to anyplace.

Distributed computing has many elements that make it one of the quickest developing enterprises as
of now. The adaptability presented by cloud administrations as their developing arrangement of
instruments and advances has sped up its sending across ventures. This blog will educate you
regarding the fundamental elements of distributed computing.

Concept and Application

Highlights of Distributed computing

Following are the qualities of Distributed computing:

1. Assets Pooling
It implies that the Cloud supplier pulled the processing assets to offer types of assistance to numerous
clients with the assistance of a multi-occupant model. There are different physical and virtual assets
appointed and reassigned which relies upon the demand of the client.

The client by and large has no control or data over the area of the gave assets however can indicate
area at a more elevated level of reflection

2. On-Demand Self-Administration

It is one of the significant and important highlights of Distributed computing as the client can
persistently screen the server uptime, abilities, and dispensed network capacity. With this element,
the client can likewise screen the registering capacities.

3. Simple Upkeep

The servers are effortlessly kept up with and the personal time is exceptionally low and even now and
again, there is no free time. Distributed computing concocts an update each time by steadily improving
it.

The updates are more viable with the gadgets and perform quicker than more established ones
alongside the bugs which are fixed.

4. Enormous Organization Access

The client can get to the information of the cloud or transfer the information to the cloud from
anyplace with the assistance of a gadget and a web association. These abilities are accessible all
around the organization and got to with the assistance of web.

5. Accessibility

The capacities of the Cloud can be changed according to the utilization and can be broadened a great
deal. It dissects the capacity use and permits the client to purchase additional Distributed storage if
necessary for a tiny sum.

6. Programmed Framework

Distributed computing naturally dissects the information required and upholds a metering capacity at
some degree of administrations. We can screen, control, and report the utilization. It will give
straightforwardness to the host as well as the client.

7. Practical
It is the one-time venture as the organization (have) needs to purchase the capacity and a little piece
of it tends to be given to the many organizations which save the host from month to month or yearly
expenses. Just the sum which is spent is on the fundamental upkeep and a couple of additional costs
which are exceptionally less.

8. Security

Cloud Security, is one of the most amazing highlights of distributed computing. It makes a preview of
the information put away so the information may not get lost regardless of whether one of the servers
gets harmed.

The information is put away inside the capacity gadgets, which can't be hacked and used by some
other individual. The capacity administration is fast and dependable.

Advantages of Cloud Administrations

Cloud administrations have many advantages, so we should investigate probably the main ones.

Adaptability

Distributed computing allows clients to get to records utilizing web-empowered gadgets, for example,
cell phones and PCs. The capacity to at the same time share records and different documents over the
Web can work with joint effort between representatives. Cloud administrations are effectively
versatile, so your IT needs can be expanded or diminished relying upon the necessities of your
business.

Work from anyplace

Clients of cloud frameworks can work from any area as long as you have a Web association. The
greater part of the significant cloud administrations offer portable applications, so there are no
limitations on what kind of gadget you're utilizing.

It permits clients to be more useful by changing the framework to their plans for getting work done.

Cost reserve funds

Utilizing electronic administrations kills the requirement for huge uses on carrying out and keeping up
with the equipment. Cloud administrations work on a pay-more only as costs arise membership
model.

Programmed refreshes
With distributed computing, your servers are off-premises and are the obligation of the specialist co-
op. Suppliers update frameworks consequently, including security refreshes. This saves your business
time and cash from doing it without anyone's help, which could be better spent zeroing in on different
parts of your association.

Calamity recuperation

Cloud-based reinforcement and recuperation guarantee that your information is secure. Executing
vigorous fiasco recuperation was once an issue for independent companies, yet cloud arrangements
presently give these associations the financially savvy arrangements with the mastery they need.
Cloud administrations save time, keep away from huge ventures and give an outsider encounter to
your organization.

Conclusion

Different elements of distributed computing are helping both the host and the client. A host likewise
enjoys different benefits, which benefit the clients. Nowadays, the association is needing information
stockpiling. The recently referenced elements of distributed computing pursue it a well known
decision among different associations across ventures.

Q.2) You are the owner of a start-up Manufacturing company in Pune and have a total
of around 100 employees. To streamline the operations of various departments of your
organization, which particular System you will use to automate the various inter-
processes of your organization. State the benefits of its implementation and the challenges
faced while implementing it. (10 marks)
Answer 2

Introduction

With around 100 representatives, an owner of a recently set up creation organization in Pune.
A particular BPA gadget could mechanize the association's various between cycles to smooth
out the different offices' tasks. BPA utilizes innovation to smooth out and enhance business
processes, saving time, cash, and further developing client experience. By decreasing jobs and
wiping out manual errands, BPA empowers organizations to be more light-footed and effective
while opening up staff to handle more mind boggling client issues. With better documentation
of cycles, quicker reaction times can be accomplished, as well as further developed consistence
standards. Associations looking for an upper hand ought to investigate how BPA can assist
them with decreasing expenses, increment efficiency, and reinforce client connections.

Concept and Application

On the off chance that you're presenting the defense for business process mechanization at your
association, or assessing expanded utilization of it, understanding the full scope of advantages
is pivotal. Maybe you're attempting to understand how BPA could further develop
collaborations with clients or accomplices or assist you with meeting explicit objectives. We
should investigate a portion of the likely advantages of business process robotization.

1. Increment process proficiency to save time and decrease costs.

This one tops the rundown on purpose: each business and IT pioneer needs to accelerate their
association's capacity to change. Uncovering shortcomings in business processes saves staff
time, though manual and redundant undertakings channel investment from your group.
Allocating these undertakings to machines frequently prompts the speediest successes in
mechanization projects.

2. Save additional opportunity for imaginative work.


When individuals can pass off tedious work, they have additional opportunity to chip away at
vital difficulties, cross-useful tasks, and coordinated efforts that prod genuine development.
Ponder the shrewd thoughts that went on the whiteboards at your last offsite meeting however
didn't advance toward fruition — was that on the grounds that your group's bandwidth is pushed
to the limit? Business process computerization can assist you with free increasing group time
to enhance on essential needs.

Additionally, further developing the manners in which you access and orchestrate your
association's information assists you with surfacing bits of knowledge that center your
advancement endeavors where they make the biggest difference.

3. Further develop exactness.

We have all associated with business processes that include manual advances that can present
mistake. Especially when an association has numerous information storehouses, individuals
will step by step make their own hacks and workarounds to save time. Machines don't make
reorder mistakes from calculation sheets and dashboards. This assists groups with
understanding extra time investment funds, since they're not going through hours pursuing
down the wellsprings of information botches . . . or on the other hand managing the
consequences of those missteps.

4. Smooth out client assistance.

During the pandemic, client assumptions for online associations with organizations rose.
Changing business cycles to further develop client experience — whether you're working with
clients, constituents, accomplices, or other outside parties — can give genuine cutthroat
separation.

Contemplate factors, for example, decreasing stand by times, conveying and assembling data
rapidly, and giving computerized announcements on requests. These can all further develop
client assistance and increment client devotion altogether.

5. Further develop administration and consistence endeavors.


Consistence processes address a region where associations would rather not leave the entryway
open to human blunder. Computerizing consistence errands lessens wiggle room as well as
makes a computerized, completely auditable record of movement logs.

Adding robotization to consistence cycles can assist associations with meeting rigid
administrative necessities and industry standards and keep away from fines. Computerization
likewise takes into consideration nonstop checking, which upholds misrepresentation
anticipation endeavors.

6. Ability maintenance and enlistment.

Ability maintenance stays a top worry for associations across numerous enterprises. And
business process robotization can help here, as well. To start with, manual assignments can
adversely influence representative commitment and fulfillment. These errands can likewise
impede professional success for representatives, adversely influencing degrees of consistency.
Second, an association that can flaunt mechanization skill has a selecting advantage. IT experts,
for instance, need to work where they can foster a significant innovation range of abilities — a
spot that is forward-looking versus one supporting lots of specialized obligation and manual
cycles.

Challenges

In spite of its many advantages, there are a few difficulties that accompany far reaching
reception of BPA best practices. Think about these three models:

Coordination of different frameworks and devices can be troublesome. Computerization that


happens across numerous frameworks is extremely useful, yet it represents a huge test. Work
with an accomplished IT consultancy that can direct you on picking the right arrangements that
"talk" to one another and will permit you to amplify the advantages of BPA.
Computerization brings fears of occupation cuts. While some mechanization can bring about
the deficiency of occupations for laborers who just perform monotonous and effectively
robotized errands, BPA really opens up open doors for some specialists. It gives them an
opportunity to zero in on satisfying the client, creating deals, working on the item, or
participating in different undertakings that straightforwardly influence the main concern.

BPA needs observing. While rolling out clearing improvements to processes, it's vital to
perform genuine audits of the expense and efficiency benefits. This implies laying out
benchmarks of pre-robotization work contrasted with representative errands and the business
acquires after computerization. Once more, an IT consultancy is a significant accomplice for
directing you on picking the right cycles for BPA, the ones that will deliver clear long haul
gains.

Conclusion

Robotizing your center business processes is perhaps of the most ideal course of action for your
organization. With such countless advantages from business process robotization (BPA),
choosing to computerize is quite simple.

Q.3) You are a Personal Blogger and you are much keen on penning down your thoughts
in the form of blogs. The Blogging Platform used by you can be any depending on your
choice.

A) What could be the possible vulnerabilities and threats related to Blogging Platforms?
Explain any 5 vulnerabilities/threats in detail. (5 marks)

B) Suggest and describe at least any 2 protective measures to overcome these


vulnerabilities/ threats related to Blogging Platforms. (5 marks)
Answer 3 (A)

Introduction

Online journals work to introduce new satisfied - content that is refreshed often. In the
interim, customary sites give static data about an individual, gathering, or subject.

Concept and Application

The five weaknesses/dangers are:

The 5 Normal Site Security Dangers

1. Ransomware

The ransomware assault is among the top security dangers to online journals and web
applications. Ransomware is malware that use encryption to assume command over
frameworks/applications/gadgets and hold the casualty's data/documents/information at
emancipate. The aggressor demands a payoff to decode the records and empower
admittance to the frameworks/applications/gadgets.

Ransomware is spread utilizing multiple ways - phishing strategies, area parodying,


pernicious sites, email connections, malvertisements, and so forth. Ransomware could
likewise be dropped onto weak frameworks utilizing exploit packs.

There have been major ransomware episodes since the pandemic, with cybercriminals
focusing on monetary foundations, medical care associations, instructive establishments,
government organizations, and so on. This site security danger rose by 92.7% in 2021
contrasted with the 2020 figures. North America (53%) and Europe (30%) were the most
designated areas in 2021.

2. Production network Assaults

Lately another normal web application security danger is production network goes after
that happen when an aggressor invades your application through an outside accomplice,
for example, a SaaS organization, seller, and so on. These assaults focus on the most
vulnerable connections in the chain of trust of the association. By penetrating the
association's application/framework, the aggressor can think twice about of their clients.

One of the significant purposes behind the upsurge in these site security assaults is the
disturbances attributable to the Coronavirus pandemic. With the need to go remote,
embrace distributed computing, and immediately change their tech stack, associations
looked towards outsider specialist organizations for arrangements that weren't adequately
investigated and tried.

3. Cloud-Based Assaults

Over the recent years, associations have moved a lot of their foundation to the cloud to
guarantee business congruity in the midst of the pandemic and adjust to the half breed
work models. And these cloud models are developing at a sped up pace, making security
holes and weaknesses that aggressors can undoubtedly use.

A portion of the normal cloud-based web security assaults are:

SQL Infusions

XSS Assaults

DDoS

CSRF

Diversions

Spyware, and so forth.

4. Programming interface Dangers

With the blast of single-page, JAMstack applications and particular application


engineering in the time of composable business, APIs have become basic pieces of
applications. Considering that APIs have higher levels of admittance to information and
assets, there are a developing number of Programming interface dangers and security
gambles today. From unfortunate coding to unstable APIs, assailants have a few
weaknesses to take advantage of to get close enough to the mother lode of information.

5. Phishing Assaults

In a phishing assault, aggressors draw clueless casualties into visiting pernicious web
journals/tapping on joins/downloading connections/and sharing login qualifications.
When the client has done the aggressor's offering, the assailant accesses the site
information, and they proceed to make secondary passages to do anything that they please
without being recognized.
Conclusion

A digital assault alludes to an activity intended to focus on a PC or any component of a


mechanized data framework to change, obliterate, or take information, as well as exploit
or mischief an organization. Digital assaults have been on the ascent, in a state of harmony
with the digitization of business that has become an ever increasing number of well known
as of late.

Answer 3 (B)

Introduction

Network safety risk the executives is the method involved with making, carrying out and
keeping up with security strategies and systems that plan to decrease the general gamble
or mischief of an online protection danger.

However, before you can moderate a danger, you first need to recognize it, as well as any
weaknesses that danger entertainers would take advantage of to penetrate your frameworks
or organization. Furnished with this data, your association will be better situated to decide
the gamble different network protection dangers present.

Concept and Application

Programmers can take advantage of an interminable number of weaknesses. Indeed, even


the most reliable frameworks will unavoidably succumb to an effective cyberattack sooner
or later.

The recurrent course of weakness the executives - distinguishing weaknesses, focusing on


them, remediating them, and alleviating them - is basic to protecting your association
against cybercrime.

For instance, we should look at a weakness that is liable for most of compromises and
breaks for associations: unfortunate certification the board and absence of verification.

Powerless passwords, copy passwords, simple to-figure usernames and passwords - these
weaknesses can prompt unapproved access. And when programmers effectively get to your
frameworks and organizations, they can hoist honors, giving themselves more elevated
level consents to take secret information, run managerial controls, or even introduce
malware.

Conclusion

It's vital to take note of that little or medium-sized organizations can be particularly
wounded by a fruitful cyberattack. Without a doubt, private companies are bound to
succumb to a cyberattack, on the grounds that bigger associations as of now have complete
network safety risk the executives programs set up. Lawbreakers will normally go for the
most straightforward targets while executing a cyberattack, and organizations that aren't
safeguarded are the least demanding focuses around.

You might also like