Вы находитесь на странице: 1из 10

1

INFOSYS.110 BUSINESS SYSTEMS:


DELIVERABLE 2: BUSINESS SECTION
2014

Name Jagbir Singh
NetID jcha509
Group Number: 522
Website Link: http://infosys1102014s2group522.blogspot.co.nz/ /
Tutorial Details
Tutor: Day: Time:
Kayur Wednesday 4pm
Time Spent on
Assignment:
30 Hours Word Count: 1566

2


2
SECURITY COMPROMISE
INTRODUCTION
One of the biggest problems society faces in todays technologically advancing age is
the risk of your privacy being compromised with ever growing hacking, scamming,
identity thefts, Spyware etc. occurring amongst us. 70% of New Zealanders have
suffered and have been targets of some form of cybercrime. From here it is appropriate
to say that we require a tool that can actually protect us when performing a wide range of
actions on the web from protecting us in the less important areas such as, logging onto
Facebook, Email, YouTube to being able to protect us in the major aspects like online
banking, and online transactions when buying or selling etc. This is an issue that is a
threat to our reputation and safety. There must be a system in place to combat this
breach of security, so this product is what is called The Security Skin, an available
means to prevent identity theft and secure your presence when on the internet.
3. BUSINESS SECTION
3.1 Vision
To provide security to people so they can rest easy that their sensitive information will not
be compromised. (unisyssecurityindex, 2014)
3.2 Industry Analysis: Security Software industry
Industry: The Security Software industry is security that is applied to computing devices,
and provides protection of information assets through the use of technology and processes.
Force: High/Low: Justification:
Buyer power: High Other options to choose from, however still quite
different to them.
Supplier power: Low Industry suppliers such programmers and server
providers do not offer an exclusive product, and

3


3
there are many choices of suppliers from around
the world, servers can be built from anyone.
Therefore, supplier power is low.
Threat of new entrants: low Barriers to entry are high the infrustructure costs
and finding the right kind of labour to produce
such code, is very difficult to establish and
maintain.
Threat of substitutes: low The only real substitue is antivirus software, and
even this is incapable of providing security to
such a veriety of things such as your operating
system.
Rivalry among existing
competitors:
Low As there are not many.
Overall attractiveness of the industry: Therefore, the industry is attractive overall, despite
high buyer power, due to the other 4 forces being low.
3.3 Customers and Thei r Needs
The customers are almost everyone and anyone with electronic devices. Nearly every device
will have an internet connection or will be connected to some other kind of network, thus
making it vunerable to attacks by hackers etc. around the world. So In order to securitise
their information they need something which will enable them to protect themselves from
the world. Something reliable that once applied to their device will block and not allow any
unwanted business. Unauthorised access to or misuse of personal data was the top security
concern for New Zealanders aged 18-34 years with 70% being extremely or very concerned
about this issue.


4


4

3.4 The Product and Service
The customers are being acknowlegged and are being listened to and understood. The stats
clearly indicate the need for protection. Our Skin will provide this cover and advanced
authentication to proactively protect against attacks on sensitive data and information.
Once this comprehensive yet simple software is installed into your system it will immidiatly
take over and begin its protection procedures. The software and codes will automatically
update regularly in order to keep taclking with the new hacking techniques being developed.
Compatable with any device be it Smart phone or PC, its complex code is scalable and will
efficiently lock around any system code.
3.5 Suppliers and Partners
One of our partners will be the android team from Google. In order to implement the skin
onto different platforms, we need the root access within Android's sub-system. Our
application requires administrator level permissions, to operations that are otherwise
inaccessible to a normal android application. These special permissions are needed
implement the skin around the source code of the operating system and the applications
which are pre-installed onto the system or which will be installed in the future.
Our other partners will be Application monitoring engines like New Relic these tools will
help us build high-performance software. These monitoring engines will help us monitor
Skin real-time as skin performs on different systems in different situations. Partnership with
these monitoring engines and their services will allow us to identify if there are any
performance issues caused by skin and find any missing loopholes where the performance
skin is affected
Our suppliers will be the developers and designers. Developers will write and manage the
software.






5


5
3.6 Strategy: Overall Cost Leadership Strategy
Our competitive scope is the broad market. We aim to capture the wider audience anyone
who wishes to stay protected from elements that may cause damage to your data or
privacy. As we are aiming and targeting such a wide audience we also see that for the
competitive advatage we are based on the low cost as once the software is made it can
simply be duplicated further so it is appropriate to be in this low cost area. We are
increasing profits by reducing costs, while charging industry-average prices. We are
increasing market share through charging lower prices, while still making a reasonable profit
on each sale because we have minimal costs after we have made the software.
Therefore this is a Cost Leadership Strategy.
3.7 Value Chain Activity: Technology Development
We must develop and engineer unique features and a user friendly interface in order to
differentiate from our potential competition so that The Skin can never slow the system
down and will never cause lag or lead the system to crash. Research and development
means we can carefully analyse our customers needs and develop that meets those needs
while we also examine new techniques of hackers etc. and how to develop The Skin to
combat that.
3.8 Business Processes
3.8.1. SOFTWARE DEVELOPMENT PROCESS
The process begins by the employment of developers who can handle the job of creating
such software that the vision describes. Experienced staff is employed to design and prepare
an intuitive design. Designers then create a mockup interface allowing for later assessment
if it has fails then the design is sent for improvements and then once again enters the
normal process of assessment. If yes then the design is passed on to the developers who will
then create a full working model of the software, the software goes through a bug
assessment to check and inspect of any problems that may cause the software to crash or
give-in to cyber-attacks if there are problems then they those issues are solved and then
goes back to the bug assessment. Once the software is running efficiently and as it should it
is then published to different platforms, so the process ends.

6


6


7


7
3.8.2. SOFTWARE USAGE PROCESS - The process begins where the user will install the
software, as soon as it is installed The Skin is activated and encryption is implemented across
the whole system. When the user downloads a new application, skin simultaneously starts
scanning the application for threats, which my upload personal data to unsecure servers. If
any threats are detected, the application is terminated and the system is secured from
threats. If the application does not possess any threats then the application is successfully
installed. The application also gets encrypted by skin which prevents it from unwanted
internet access or access to other networks.



8


8
3.9 Functionalities
3.9.1. SOFTWARE DEVELOPMENT PROCESS
Creating a software scuccessfully protecting users.
Testing for issues and so making improvements.
3.9.2. SOFTWARE USAGE PROCESS
Prevents and defends against cyber atacks.
Creates a cyber Skin and scans and checks for threats when downloading.
3.10 Systems

3.10. 1. DATA MANAGEMENT SYSTEM (TPS) The data already available to us, should be used
so that we can understand the different threats that are posed to device users around the
world. Once we have this knowledge we are able to then observe how some of these
established viruses etc. can be stopped. These stopping and prevention mmethods can be
implemented to our Skin. This will help us to regularly update our software.
3.10. 2. SOFTWARE USAGE SYSTEM -
3.10. 3. CRASH REPORT MANAGEMENT SYSTEM When ever there is a crash in our software in
the users device, this sytem must be in place in order to inform us as to why this has
happened, which will help us to answer the question Was the crash due to our own system
faliour? or was the crash due to the device being shut down unexpectedly. It is important
that we can get answers to these questions as it allows our software for continuous
deveopment.

9


9
3.11. Summary Table: Value Chain to Systems

Value Chain
Activity
Processes Functionalities Specific Information
System(s)
Broad Information
System(s)

Bavarian
bergkase
fromage
queso
1. Software
Developmen
t Process
1. Creating a software scuccessfully
protecting users.

2. Testing for issues and so making
improvements.
DATA MANAGEMENT
SYSTEM


TPS


2. Software
usage
process
1. Prevents and defends against cyber
atacks

2. Creates a cyber Skin and scans and
checks for threats when downloading.

CRASH REPORT
MANAGEMENT SYSTEM


10

10
CONCLUSION
It is obvious that ever growing hacking, scamming, identity thefts is big problem and must
be dealt with. Skin is a simple solution to put an end to this problem, by completely securing
the users system skin makes online banking, and online transactions very unproblematic.
While protecting the users identity, skin secures the users system from unauthorized
breaches.
REFERENCES

1. Baltzan, P. Blakey, P. Lynch,K. Business Driven Information Systems 2
nd
edition,
McGraw-Hill Austalia Pty Limited, 2013

2. University of Auckand, Infosys 110 business systems couse book, 2014

3. Projectauditors, (2014), projectauditors, Retrived from www.projectauditors.com

4. Unisyssecurityindex, (2014), unisyssecurityindex, Retrived from
www.unisyssecurityindex.com

5. Impactlearning, (2014), retrieved from http://www.impactlearning.com/how-
to-satisfy-customer-needs

Вам также может понравиться