"Secure It Systems For An Airline Company"

2375 words - 10 pages

IntroductionThe report is based on the assumption that the company is a budget airline which has online booking facilities and a call centre, these being the basic requirements for this type of organisation. There are various elements that can be seen as contributing to profitability and competitiveness in the e-business paradigm. For example, the company should inspire confidence from the supplier to the customer, be more easily available than would be possible in the physical world, and have the ability to protect data integrity in order to ensure future growth.There are various ways in which these objectives can be achieved. For instance using the e-business model removes ticket and travel agencies from the chain of supply, which enables the company to create a direct personal link with the customer. Selling directly to the customer in this way means that profitability can be increased: at the same time the price to the customer can be reduced, thereby increasing competitiveness in the market as a whole. Overheads are also reduced, thus increasing efficiency and providing a faster service response. However, this does not mean that the e-commerce model is automatically superior to any other, since it introduces additional overheads and concerns which must be addressed regarding security and customer confidence. Reduced prices and quicker response time will obviously be severely undermined if security issues mean that customers do not have confidence that their transactions will be safe, and this is an increasing concern as more and more businesses adopt the e-commerce model, with concomitant reports of security breaches in their technological systems.Customer confidence is the foundation of business survival and should therefore be seen as paramount. When looking at security issues in terms of coding for the system, as Simes (2003) points out, one must follow the principle of 'least privilege'. Different users have different requirements from the system: administrators require full access whereas those who are ordinary users do not. As Simes states, "the code should run as the least powerful user which is able to do the task required" (Simes, 2003, PG).Rose (2003) makes the point that one of the most important elements of an information security is system is the ability to back-up: if there is a fault in the system then the user must be able to get back to the original point as quickly as possible and restore the data which has been lost. The factors which need to be taken into account are assessing what data requires back-up, how often this should be done, what is the most efficient medium to use and whether or not data can be retrieved even if the back-up software has been lost. There are various solutions which might be implemented: for example, one could use CDs for back-up, or parallel servers which have different geographical locations, or managed servers over an internet connection.Rose also points out that anti-virus protection is...

Find Another Essay On "Secure IT systems for an airline company"

Human cloning, what it is. An information based on the first ever human cloning company,

606 words - 2 pages . It gives life for a new human being. This type of cloning IS banned, but Clonaid said that it will help infertile couples (who cannot have children even after years of infertility treatments), homosexuals (they cannot have a child today that is 100% related to them genetically), and families who lost a beloved relative (human cloning can give life a second time to the same genetic code who has died at an early age for example); and Clonaid will

What It Takes for a Company to Succeed: Strategy or Luck

1644 words - 7 pages This issue is aimed at corporate level managers, who oversee the development of strategies for the whole organization; and business level of managers, who’s strategic role is to transmute the general statements of direction and intent that come from the corporate level into tangible strategies for individual businesses (Hill & Jones, 2010); and will be addressing the question of what it takes for a company to succeed, whether it be strategy or

BlueSuitMom.com Was it immoral for Mary Bailey to represent her company as she did?

1431 words - 6 pages Mary Bailey had been in business more than 20 years before dreaming up and executing the idea of creating a website (BlueSuitMom.com) that would provide information to help female professionals juggle their busy lives. Based on her experience in business, she made a decision to misrepresent her company and make it larger than what it actually was to attract sponsors and customers for her start-up business. Her decision to misrepresent her

An analysis of strategic role of information systems, specific social, ethical and legal issues, IT infrastructure and emerging technologies, and information systems security within FedEx Corporation

5469 words - 22 pages implementation and use of information systems at FedEx is based on this guideline.Information rights and obligationsAs mentioned above, customers can order delivery services and track their packages conveniently through FedEx's virtual order system and Extranet (an on-line tracking system). Although FedEx has designed this system for customers' convenience, it may raise the privacy problem as customers' personal information can be easily recorded by

Inadequate Support Systems for an African American Adult with Breast Cancer

2643 words - 11 pages of inadequate support systems. Peer support groups for African American women with cancer are designed to provide members with “culturally responsive opportunities and a safe haven to share their needs” (Ashing-Giwa et al., 2012). This method helps reduce feelings of isolation in the patients since each individual is in the company of others who share the same diagnosis and symptoms. The members share common experiences and, consequently, are

IDENTFYING AN ORGANISATION LOOKING FOR IT SYSTEM THAT USED IN AND GIVE RECCOMANDATION ABOUT IT.

2944 words - 12 pages Technology systems contribute to the efficient running of organisations. An integrated system such as the one outlined above enables all of the separate parts of the organisation to pull in the same direction.(Business case studies)Near to structure that Digicom telecom have in company they have to setup an IT division with in the company for survelliance efficient running of organisation. They can easily access to hardware and software because

"Email Exigency": Risks involed for the employer when he/she allows company email access to an employee.

1269 words - 5 pages fines if they fail to produce email documents for evidence. All of these potentially dangerous consequences from employee email force an important question. Which companies are at risk?Some could argue that the level of risk varies depending on the size and type of company. The facts are pretty clear, however, that it really matters very little what type of company it is or how many people they employ. Almost every company in today's fast-paced

This project is proving an online solution for the consultant company to change the process that they are currently have

5806 words - 23 pages having. This website will contain the supplier information, order form for supply and with the requirements that the company specified.2.0 Project Management2.1 Project ApproachesThere are three types of approaches that are commonly used. Each of which carry its pros and cons. It is difficult to say which is the best one. Before this, we need to gain an understanding of the principle underlying them.Type 1: Waterfall Model with

In the role of a marketing consultant provide an integrated marketing communications plan for a company of your choice.

742 words - 3 pages planning system will be used in this report as an initial framework to develop a communication plan for Google Nexus 5. It is one of several ways to develop a marketing communication campaign which consist of all essential elements that any plans must have. The SOSTAC system includes situation analysis (or context analysis), objectives, strategy, tactics, action and control (Smith and Taylor, 2004). With a simple structure made up from series of simple

The essay is about the Bayer case study. It is for analyze the company for business development, financial and all the information about the business.

3968 words - 16 pages selling these products and services at a very low and affordable price. Only then would Bayer let the whole world know that indeed it is a company with an exemplary work culture and high value for the customers' money.Word count: 3997Bibliography1.JOHNSON, G. & SCHOLES, K. 2002. Exploring Corporate Strategy. UK: Financial Times Prentice-Hall.2.KOTLER, P. 1997. Marketing Management Analysis, Planning, Implementation, and Control. New Jersey

Market Analysis for Juice in Singapore This is Market Analysis for a potential entry of an Australian juice company called "Nudie" into the Singaporean Market.

1211 words - 5 pages economy with signs of continuous prosperity which will allow for consumers to purchase Nudie in the future (CIA 2008).Consumer trends in Singapore has seen an opening for Nudie to enter the market by the 'growing health awareness encouraged by public health bodies', in addition to 'being one of the key trends influencing the soft drinks industry in Singapore' (Euromonitor 2008).The current competitors operating in Singapore have recognized the change

Similar Essays

Systems For Ensuring Secure Electronic Transactions (Set)

819 words - 3 pages Systems for Ensuring Secure Electronic Transactions (SET) Attacks earlier in the year on major e-commerce sites, including E*Trade; Amazon.com, the leading e-tailer; eBay, the online auction house; CNN, the news service; Yahoo!; Buy.com; and Zdnet, a technology news and information web site, have heightened the awareness of securing e-commerce sites (“E-Commerce Sites,” 2000, p.106). This is just the first example of a rampant problem that

Bpr And Information Systems It As An Enabler.

1142 words - 5 pages Information technology is considered the major enabler for spanning processes over functional and organizational boundaries and supporting process driven organizations. However, the point is not to use IT as an improver for existing activities, as which it often has been conceived, but as enabler for the organization.Some of the ways that IT changes business processes include: process automation and speed; virtual presence and distance

Should A Company Select Proprietary, Open Source, Or Free Software For It’s Most Important Information Systems?

1434 words - 6 pages Untitled Should a company select proprietary, open source, or free software for it's most important information systems? Open source software is the type of software that companies should elect for all their most important information systems. For starters, it is one of the most cost effective types of software. It's customized

Should A Company Select Proprietary, Open Source, Or Free Software For Its Most Important Business Information Systems?

838 words - 3 pages contribute to their projects. Big projects such as OpenOffice (an open source competitor to Microsoft's Office suite) took open source to a whole new level, releasing a complete suite of applications designed for the Linux operating system. It wasn't long after that when developers began "porting" these open source applications to the Microsoft Windows platform. Currently, there are over 333,000 open source software projects listed on SourceForge