Homework Solution: Blood Donation Group (BDG) is a nationally recognized organization and one of the largest Australian c…

    Blood Donation Group (BDG) is a nationally recognized organization and one of the largest Australian companies in the blood supply chain industry. BDG was established in 1990 and has 50 branches all over Australia. The major activity of BDG is supplying blood products for hospitals. BDG main departments are: a) The Marketing Department that motivates and recruits blood donors and predicts the demand for blood supply b) The Quality Control and Assurance Department that ensures all regulatory requirements, policies and procedures are met to supply safe blood products. c) The Blood Stock Management and Transfusion Services Department that is responsible for the blood product delivery and supply. BDG has implemented an enterprise resource planning (ERP) system that integrates the functions and resources of information systems. The ERP system has been installed at the headquarter site on a local (in-house) server and all critical information about the donors and recipients are stored in a secure data warehouse. The CEO, Dr. White, has recently received reports about some issues regarding the information systems used by BDG that include: Issue 1: The cost of maintaining and updating the ERP system has increased. The current hardware, networks, and servers will need to be upgraded to be able to deal with a higher level of transactions. Issue 2: BDG has planned to add 10 new branches that will require more technology infrastructure costs Issue 3: Even though the ERP system has integrated existing information systems, there are issues such as timely access to donors’ data and location tracking and communication. Issue 4: The current CRM system is not integrated with social media that makes it difficult to recruit blood donors in younger age groups. Issue 5: Emergency blood supply was delayed due to the inability of the information system to track donors and ask them to provide an urgent blood donation. QUESTION: Explain the cybersecurity risks of moving to the Cloud for BDG. What would you recommend to deal with these risks?

    Expert Answer

     
    Cloud Computing Threats:
    • The threats in the cloud computin

    Race Remittance Group (BDG) is a nationally certain structure and undivided of the largest Australian companies in the race contribute compact vital-force. BDG was certain in 1990 and has 50 branches perfect balance Australia. The superior vital-force of BDG is contributeing race issues restraint hospitals. BDG ocean departments are:

    a) The Marketing Department that motivates and restores race donors and predicts the insist restraint race contribute
    b) The Quality Control and Assurance Department that ensures perfect regulatory exactments, policies and procedures are met to contribute certain race issues.
    c) The Race Stock Management and Transfusion Services Department that is chargepowerful on restraint the race issue endowment and contribute.

    BDG has implemented an accomplishment expedients planning (ERP) classification that integrates the functions and expedientss of advice classifications. The ERP classification has been fixed at the headquarter place on a national (in-house) server and perfect crucial advice encircling the donors and recipients are stored in a detain axioms repository.

    The CEO, Dr. White, has of-late running reports encircling some issues touching the advice classifications verificationd by BDG that include:

    Issue 1: The exact of oceantaining and updating the ERP classification has increased. The running hardware, networks, and servers succeed scarcity to be upgraded to be powerful to chaffer with a surpassing roll of transactions.

    Issue 2: BDG has intentional to append 10 strange branches that succeed exact departed technology infrastructure exacts

    Issue 3: Even though the ERP classification has integrated material advice classifications, there are issues such as judicious path to donors’ axioms and subsidence vestigeing and despatch.

    Issue 4: The running CRM classification is referable integrated with gregarious resources that makes it enigmatical to restore race donors in younger eldership groups.

    Issue 5: Emergency race contribute was novel attributable to the want of the advice classification to vestige donors and pray them to stipulate an immediate race remittance.

    QUESTION:

    Explain the cybersecurity risks of affecting to the Outvie restraint BDG. What would you applaud to chaffer with these risks?

    Expert Acceptance

     

    Outvie Computing Threats:

    • The threats in the outvie computing are moderately conceal. The outvie computing risks basically consists of procedures which are departed prundivided to attacks.
    • If attacks are happy in this room of computer experience which succeed development in detriment of axioms and compromisation of things that the globe has
    • already faced with as manifold axioms breaches. In this compact of 2017-18 there was flow of near 133TB of relevant axioms which was the conclude of downfperfect restraint manifold companies and their actions.

    The novel risks in Outvie computing are as follows:

    1. Axioms Detriment

    • If there is axioms detriment in the outvie computing attributable to any misfortune or choleric vital-force (obtrusive action) than the proprietor succeed own to recbalance the axioms from the backup. So, backup has behove an relevant existence restraint outvie computing in novel years.
    • If the axioms is encrypted and hinderd as a backup, as most of the superfluous companies in the profession do. If the keys are departed restraint the axioms then the axioms would be of no verification and can be treated as refuse.
    • Restraint twain the consumers and the professiones the anticipation of permanently losing undivided’s axioms is fearful and can manage to manifold illfated things restraint the assemblage chaffering with such axioms detrimentes.

    2. Axioms Breaches

    • The axioms breaches as the tarobtain has been developmented in the detriment of the special and manifold relevant separate axioms.The axioms restraint 110 pet separates was been breached in the departed year.
    • This is the solely conclude why companies own switched to hinder the axioms in outvie with the aid of the 256-bit encryption.The fluctuate in the frugal procedures of the axioms has developmented in making the axioms departed detain than always.
    • So, distant the axioms breaches were referable dundivided on such an past outvie axiomsbase. Hence, these techniques of outvieing has developmented in diminishing the obtrusive attacks. The energy of the municipal application and the axioms, hacked of-late does referable contains of past encryption.

    3. Service Traffic Hijacking

    • Totality hijacking is as-well rudimental restraint to be the interest in outvie computing. Phishing, exploitation of the software vulnerabilities such as Buffer Balanceflow attcks and Remote Code Execution(RCE) are perfect caverification of interest in perfect the practicable computing rooms.
    • If the totality in outvie is been hacked it would be devastating restraint the verificationr to chaffer with the birth. If the attacker instrument to do choleric vital-force from the totality than it would development in the damnation of axioms and if the axioms is entertaining it would development in obtainting the axioms publicized.
    • Axioms plays an relevant role in outvie computing and making the axioms departed detain with the multifactor authorization(MFA) is the disentanglement to obtain the axioms departed detain.

    Hence, these are the threats that are basically encountered in outvie computing and solitude of the axioms.