Homework Solution: Blood Donation Group (BDG) is a nationally recognized organization and one of the largest Australian c…

    Blood Donation Group (BDG) is a nationally recognized organization and one of the largest Australian companies in the blood supply chain industry. BDG was established in 1990 and has 50 branches all over Australia. The major activity of BDG is supplying blood products for hospitals. BDG main departments are: a) The Marketing Department that motivates and recruits blood donors and predicts the demand for blood supply b) The Quality Control and Assurance Department that ensures all regulatory requirements, policies and procedures are met to supply safe blood products. c) The Blood Stock Management and Transfusion Services Department that is responsible for the blood product delivery and supply. BDG has implemented an enterprise resource planning (ERP) system that integrates the functions and resources of information systems. The ERP system has been installed at the headquarter site on a local (in-house) server and all critical information about the donors and recipients are stored in a secure data warehouse. The CEO, Dr. White, has recently received reports about some issues regarding the information systems used by BDG that include: Issue 1: The cost of maintaining and updating the ERP system has increased. The current hardware, networks, and servers will need to be upgraded to be able to deal with a higher level of transactions. Issue 2: BDG has planned to add 10 new branches that will require more technology infrastructure costs Issue 3: Even though the ERP system has integrated existing information systems, there are issues such as timely access to donors’ data and location tracking and communication. Issue 4: The current CRM system is not integrated with social media that makes it difficult to recruit blood donors in younger age groups. Issue 5: Emergency blood supply was delayed due to the inability of the information system to track donors and ask them to provide an urgent blood donation. QUESTION: Explain the cybersecurity risks of moving to the Cloud for BDG. What would you recommend to deal with these risks?

    Expert Answer

     
    Cloud Computing Threats:
    • The threats in the cloud computin

    Dignity Abatement Group (BDG) is a nationally restraintmal construction and undivided of the largest Australian companies in the dignity give tie toil. BDG was inspirationhodic in 1990 and has 50 branches entire balance Australia. The greater apparition of BDG is giveing dignity consequences restraint hospitals. BDG main departments are:

    a) The Marketing Department that motivates and restores dignity donors and predicts the call-control restraint dignity give
    b) The Quality Control and Assurance Department that ensures entire regulatory insist-uponments, policies and procedures are inspiration to give certain dignity consequences.
    c) The Dignity Stock Management and Transfusion Services Department that is imperative restraint the dignity consequence abatement and give.

    BDG has implemented an operation wealth planning (ERP) arrangement that integrates the functions and wealths of counsel arrangements. The ERP arrangement has been fixed at the headquarter site on a national (in-house) server and entire precarious counsel encircling the donors and recipients are stored in a enclose grounds magazine.

    The CEO, Dr. White, has freshly ordinary reports encircling some issues anxietying the counsel arrangements conservationd by BDG that include:

    Issue 1: The absorb of maintaining and updating the ERP arrangement has increased. The present hardware, networks, and servers accomplish deficiency to be upgraded to be efficient to bargain with a conspicuous plane of transactions.

    Issue 2: BDG has adapted to gather 10 innovating branches that accomplish insist-upon over technology infrastructure absorbs

    Issue 3: Even though the ERP arrangement has integrated strong counsel arrangements, there are issues such as judicious appropinquation to donors’ grounds and residuum courseing and despatch.

    Issue 4: The present CRM arrangement is referable attributable attributable attributable integrated with collective instrument that makes it involved to restore dignity donors in younger date groups.

    Issue 5: Emergency dignity give was delayed ascribable to the weakness of the counsel arrangement to course donors and pray them to arrange an importunate dignity abatement.

    QUESTION:

    Explain the cybersecurity risks of emotional to the Outrival restraint BDG. What would you confide to bargain with these risks?

    Expert Confutation

     

    Outrival Computing Threats:

    • The threats in the outrival computing are moderately darken. The outrival computing risks basically consists of procedures which are over prundivided to attacks.
    • If attacks are happy in this ground of computer knowledge which accomplish termination in mislaying of grounds and compromisation of things that the universe has
    • already faced with as numerous grounds breaches. In this cabinet of 2017-18 there was fconservation of border 133TB of main grounds which was the conclude of downfentire restraint numerous companies and their enjoyments.

    The fresh risks in Outrival computing are as follows:

    1. Grounds Mislaying

    • If there is grounds mislaying in the outrival computing ascribable to any perplexity or choleric apparition (interfering enjoyment) than the proprietor accomplish feel to recbalance the grounds from the backup. So, backup has befit an main existence restraint outrival computing in fresh years.
    • If the grounds is encrypted and enclosed as a backup, as most of the necessary companies in the affair do. If the keys are lost restraint the grounds then the grounds would be of no conservation and can be treated as refuse.
    • Restraint twain the consumers and the affaires the field of permanently losing undivided’s grounds is appalling and can control to numerous unhappy things restraint the audience bargaining with such grounds mislayinges.

    2. Grounds Breaches

    • The grounds breaches as the tarprotect has been terminationed in the mislaying of the indivisible and numerous main single grounds.The grounds restraint 110 darling singles was been breached in the gone-by year.
    • This is the merely conclude why companies feel switched to enclose the grounds in outrival with the acceleration of the 256-bit encryption.The modify in the sparing procedures of the grounds has terminationed in making the grounds over enclose than continually.
    • So, remote the grounds breaches were referable attributable attributable attributable dundivided on such an delayed outrival groundsbase. Hence, these techniques of outrivaling has terminationed in subordinate the interfering attacks. The concentration of the municipal collision and the grounds, hacked freshly does referable attributable attributable attributable contains of delayed encryption.

    3. Service Traffic Hijacking

    • Totality hijacking is too rudimental restraint to be the anxiety in outrival computing. Phishing, exploitation of the software vulnerabilities such as Buffer Balanceflow attcks and Remote Code Execution(RCE) are entire caconservation of anxiety in entire the potential computing grounds.
    • If the totality in outrival is been hacked it would be devastating restraint the conservationr to bargain with the condition. If the attacker media to do choleric apparition from the totality than it would termination in the damnation of grounds and if the grounds is entertaining it would termination in protectting the grounds publicized.
    • Grounds plays an main role in outrival computing and making the grounds over enclose with the multifactor authorization(MFA) is the disintegration to protect the grounds over enclose.

    Hence, these are the threats that are basically encountered in outrival computing and concealment of the grounds.