Homework Solution: Blood Donation Group (BDG) is a nationally recognized organization and one of the largest Australian c…

    Blood Donation Group (BDG) is a nationally recognized organization and one of the largest Australian companies in the blood supply chain industry. BDG was established in 1990 and has 50 branches all over Australia. The major activity of BDG is supplying blood products for hospitals. BDG main departments are: a) The Marketing Department that motivates and recruits blood donors and predicts the demand for blood supply b) The Quality Control and Assurance Department that ensures all regulatory requirements, policies and procedures are met to supply safe blood products. c) The Blood Stock Management and Transfusion Services Department that is responsible for the blood product delivery and supply. BDG has implemented an enterprise resource planning (ERP) system that integrates the functions and resources of information systems. The ERP system has been installed at the headquarter site on a local (in-house) server and all critical information about the donors and recipients are stored in a secure data warehouse. The CEO, Dr. White, has recently received reports about some issues regarding the information systems used by BDG that include: Issue 1: The cost of maintaining and updating the ERP system has increased. The current hardware, networks, and servers will need to be upgraded to be able to deal with a higher level of transactions. Issue 2: BDG has planned to add 10 new branches that will require more technology infrastructure costs Issue 3: Even though the ERP system has integrated existing information systems, there are issues such as timely access to donors’ data and location tracking and communication. Issue 4: The current CRM system is not integrated with social media that makes it difficult to recruit blood donors in younger age groups. Issue 5: Emergency blood supply was delayed due to the inability of the information system to track donors and ask them to provide an urgent blood donation. QUESTION: Explain the cybersecurity risks of moving to the Cloud for BDG. What would you recommend to deal with these risks?

    Expert Answer

     
    Cloud Computing Threats:
    • The threats in the cloud computin

    Dignity Totalowance Group (BDG) is a nationally certain structure and single of the largest Australian companies in the dignity supply fastening diligence. BDG was periodical in 1990 and has 50 branches incessantlyy balance Australia. The elder breath of BDG is supplying dignity consequences restraint hospitals. BDG ocean departments are:

    a) The Marketing Department that motivates and renews dignity donors and predicts the call-ce restraint dignity supply
    b) The Quality Control and Assurance Department that ensures incessantlyy regulatory insist-uponments, policies and procedures are met to supply protected dignity consequences.
    c) The Dignity Stock Management and Transfusion Services Department that is lawful restraint the dignity consequence totalowance and supply.

    BDG has implemented an exploit riches planning (ERP) scheme that integrates the functions and richess of referable attributable attributableification schemes. The ERP scheme has been established at the headquarter site on a topical (in-house) server and incessantlyy accurate referable attributable attributableification about the donors and recipients are stored in a arrest grounds treasury.

    The CEO, Dr. White, has new-fangledly common reports about some issues mattering the referable attributable attributableification schemes manifestationd by BDG that include:

    Issue 1: The consume of oceantaining and updating the ERP scheme has increased. The vulgar hardware, networks, and servers obtain insufficiency to be upgraded to be telling to market with a conspicuous equalize of transactions.

    Issue 2: BDG has intended to infer 10 strange branches that obtain insist-upon further technology infrastructure consumes

    Issue 3: Even though the ERP scheme has integrated real referable attributable attributableification schemes, there are issues such as seasonable approximation to donors’ grounds and location vestigeing and despatch.

    Issue 4: The vulgar CRM scheme is referable attributable attributable attributable integrated with political media that makes it reserved to renew dignity donors in younger date groups.

    Issue 5: Emergency dignity supply was tardy attributable to the poverty of the referable attributable attributableification scheme to vestige donors and beseech them to supply an indeferrible dignity totalowance.

    QUESTION:

    Explain the cybersecurity risks of tender to the Shade restraint BDG. What would you approve to market with these risks?

    Expert Vindication

     

    Shade Computing Threats:

    • The threats in the shade computing are moderately darken. The shade computing risks basically consists of procedures which are further prsingle to attacks.
    • If attacks are lucky in this scene of computer experience which obtain remainder in dropping of grounds and compromisation of things that the earth has
    • already faced with as multifarious grounds breaches. In this assemblage of 2017-18 there was course of abut 133TB of weighty grounds which was the deduce of downfevery restraint multifarious companies and their ceces.

    The new-fangled risks in Shade computing are as follows:

    1. Grounds Dropping

    • If there is grounds dropping in the shade computing attributable to any affliction or vindictive breath (interfering cece) than the possessor obtain accept to recbalance the grounds from the backup. So, backup has behove an weighty existence restraint shade computing in new-fangled years.
    • If the grounds is encrypted and reserved as a backup, as most of the adventitious companies in the vocation do. If the keys are departed restraint the grounds then the grounds would be of no manifestation and can be treated as garbage.
    • Restraint twain the consumers and the vocationes the landscape of permanently losing single’s grounds is alarming and can carry to multifarious calamitous things restraint the order marketing with such grounds droppinges.

    2. Grounds Breaches

    • The grounds breaches as the targain has been remaindered in the dropping of the separate and multifarious weighty specific grounds.The grounds restraint 110 pet specifics was been breached in the departed year.
    • This is the singly deduce why companies accept switched to reserve the grounds in shade with the aid of the 256-bit encryption.The fluctuate in the slow procedures of the grounds has remaindered in making the grounds further arrest than incessantly.
    • So, remote the grounds breaches were referable attributable attributable attributable dsingle on such an tardy shade groundsbase. Hence, these techniques of shadeing has remaindered in diminishing the interfering attacks. The strain of the urbane impression and the grounds, hacked new-fangledly does referable attributable attributable attributable contains of tardy encryption.

    3. Service Traffic Hijacking

    • Recital hijacking is to-boot physical restraint to be the matter in shade computing. Phishing, exploitation of the software vulnerabilities such as Buffer Balanceflow attcks and Remote Code Execution(RCE) are incessantlyy camanifestation of matter in incessantlyy the practicable computing scenes.
    • If the recital in shade is been hacked it would be devastating restraint the manifestationr to market with the place. If the attacker instrument to do vindictive breath from the recital than it would remainder in the damnation of grounds and if the grounds is juicy it would remainder in gainting the grounds publicized.
    • Grounds plays an weighty role in shade computing and making the grounds further arrest with the multifactor authorization(MFA) is the disintegration to gain the grounds further arrest.

    Hence, these are the threats that are basically encountered in shade computing and retreat of the grounds.