Need a perfect paper? Place your first order and save 5% with this code:   SAVE5NOW

Managing Information Systems Case Study

Question 1

Challenges cloud computing is facing.

The delivery of various hardware and software services via the internet and distant servers is known as cloud computing. Security is a significant problem in cloud computing because one cannot see the precise place where their data is being stored or processed. The hazards that can develop throughout the implementation or management process are increased. The company is responsible for user identification and authorization, identity management, data encryption, and access control, even if the cloud service provider guarantees data integrity (Kumari & Singh, 2021). Identity theft, data breaches, malware infections, and other security issues on the cloud all lead to a decline in user confidence in your applications.

Enterprises now rely on numerous cloud service providers in addition to using a single cloud because there are more options available to them. Most of these businesses employ hybrid cloud strategies. The infrastructure team frequently finds that managing this is hindered. Because of the variations between various cloud providers, the process usually ends up being extremely complicated for the IT staff. It gets vulnerable as more users have access to your cloud account. An organization’s private data will be accessible to anyone who learns your password or breaks into their cloud (Ahmad, 2017). The company should employ multiple levels of authentication and make sure that credentials are kept secure. Additionally, passwords need to be changed frequently, particularly once an individual quits and leaves the company. It’s wise to use discretion when granting access rights to usernames and passwords.

A business performance starts to depend on your provider when you shift your business apps to the cloud or a third-party vendor. Choosing the best cloud service provider is yet another significant issue with cloud computing. One should search for providers with cutting-edge technologies before making an investment. The performance of the BI and other cloud-based systems is also connected to those of the provider. Make sure the service has processes in place to address problems as they develop in real time before picking them.

Why cloud computing requires strong security measures

Cloud security, often referred to as cloud computing security, is a group of security controls intended to safeguard data, programs, and infrastructure that are hosted in the cloud. These steps guarantee device and user authentication, data and resource access control, and data privacy protection. They assist with regulatory compliance as well. Businesses that keep a lot of personally identifiable information (PII) or other sensitive data are at danger of becoming targets for cybercriminals (Tabrizchi & Kuchaki 2020). As a result, IT must put up a cloud system with more than simply the fundamental configurations, pre-configured credentials, and access restrictions.

Cloud storage’s intrinsic accessibility means that breaking into a poorly setup system doesn’t always require a high level of technical understanding. Criminals are undoubtedly a problem, but human error is a much more prevalent one. Staff who are not properly trained or who have poorly set access restrictions may treat secure information carelessly. Security personnel must therefore make sure the system is as secure as possible against all of their attempts, whether malicious or not.

Question 2

Why Law-enforcement agencies struggle to hire, train, and retain staff capable of keeping pace with today’s cyber-criminals

Law enforcement organizations require qualified investigators, modern computer forensic examiners, and prosecutors with experience in cybercrime in order to investigate and prosecute cybercrime. Federal and state law enforcement officials claim that there is a shortage of qualified applicants because those who look into or investigate cybercrime must be highly trained specialists with a combination of detective and technical skills, including an understanding of different IT hardware and software and forensic tools (Majumdar et al., 2018). Few departments have staff members who are able or willing to undertake investigations involving computers and very sophisticated technological systems. Even departments that are able to recruit willing investigators must contend with the financing crisis that most law enforcement organizations are always fighting.

Question 3

How you advise Macharia to proceed on the issue of upgrading the B1 System

This case study assesses Mr. Macharia’s (the CEO) upcoming steps regarding the B1 system upgrade. It entails determining if the improvement should enhance the B1 or upgrading to a newer version of SAP. Following the discussion, Mr. Macharia will assess the efficiency and capacity of the current B1 system to resolve his concerns. Notably. It is important to take Abbas’ concerns regarding RedLock’s past inefficiencies, particularly the failures with customizing, seriously (Acosta & Acosta, 2014). Making a wise choice requires thorough research on the B1 system’s potential and existing limitations. This suggests that a B1 audit system is necessary before choosing to upgrade to SAP. The effectiveness of RedLock’s system upgrade efforts is a crucial evaluation as well. It is clear from the case study that RedLock’s internal inefficiencies have prevented Zaidi from reaping the full benefits of the B1 system.

Should they upgrade to a higher version of SAP or should they improve the B1?

After careful consideration, it is possible to conclude that Zaidi Oil Group operations have developed beyond the capabilities of its B1 SAP system. According to the case study’s data, the B1 system has served the company well because it has been continuously upgraded to meet the needs of a growing business. The benefits of Macharia pursuing an upgrade to a more recent version of SAP will be examined in three categories, since the advantages clearly outweigh the disadvantages.

  1. Expansion: The company’s current B1 system is unable to support the anticipated future development of the business. Investment in more sophisticated ERP can improve business operations, allowing Zaidi Oil Group to grow into new markets. The failure of the organization to seize possibilities may limit returns on investments, which will undoubtedly have an influence on their bottom line.
  2. Long-term vs. short-term advantages: Overspending on maintenance costs is a sign that an update is required. Continuous system upgrades, which only address issues as they arise, can undoubtedly end up costing more in the long term. According to the facts, the company has a functioning problem that never goes away. Replacing the current B1 system with the A1 system would be less expensive in terms of labor, time, and money because it would eliminate the need for staff to work around bugs, programs that wouldn’t process fresh data, and costs related to ongoing upgrades.
  3. Durability and compatibility: According to Abbas (Acosta & Acosta, 2014), the company has experienced problems due to frequent upgrades, including features. A crucial component of Macharia’s operation is its information system, which must be interoperable with the systems of the clients it serves. Increased output, a competitive advantage, and more lines would be some of the key benefits of upgrading to the A1 system. According to the evidence provided, ERP systems that are unable to support a specific version require more maintenance, which results in higher costs than an upgrade would.

Criteria would you use as a basis for your decision or recommendation

A corporation must balance initiatives with its readiness for SAP upgrades as it creates its technology road plan. Performance, compatibility, and affordability are the three key factors used to assess the A1 SAP system update. According to Abbass’ account of the state of the business’ operations at the moment, the B1 system is currently a hindrance to success. It would be fair to say that the performance of Zaidi Oil Group depends on the decision to upgrade the SAP to the A1 system after an empirical analysis of the provided evidence. An overhaul will expand into unexplored markets, reduce operating expenses, and boost revenue.

References

Acosta, F. R., & Acosta, A. S. (2014). Zaidi Oil: the SAP ERP dilemma. Emerald Emerging Markets Case Studies. https://doi.org/10.1108/EEMCS-01-2014-0023

Ahmad, N. (2017). Cloud computing: Technology, security issues and solutions. In 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) (pp. 30-35). IEEE.

Kumari, P., & Singh, M. (2021). Cloud Security Challenges and Issues. Review of International Geographical Education Online11(8).

Majumdar, S., Madi, T., Jarraya, Y., Pourzandi, M., Wang, L., & Debbabi, M. (2018). Cloud security auditing: major approaches and existing challenges. In International Symposium on Foundations and Practice of Security (pp. 61-77). Springer, Cham.

Tabrizchi, H., & Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing76(12), 9493-9532.

 

Don't have time to write this essay on your own?
Use our essay writing service and save your time. We guarantee high quality, on-time delivery and 100% confidentiality. All our papers are written from scratch according to your instructions and are plagiarism free.
Place an order

Cite This Work

To export a reference to this article please select a referencing style below:

APA
MLA
Harvard
Vancouver
Chicago
ASA
IEEE
AMA
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Need a plagiarism free essay written by an educator?
Order it today

Popular Essay Topics