Homework Solution: Blood Donation Group (BDG) is a nationally recognized organization and one of the largest Australian c…

    Blood Donation Group (BDG) is a nationally recognized organization and one of the largest Australian companies in the blood supply chain industry. BDG was established in 1990 and has 50 branches all over Australia. The major activity of BDG is supplying blood products for hospitals. BDG main departments are: a) The Marketing Department that motivates and recruits blood donors and predicts the demand for blood supply b) The Quality Control and Assurance Department that ensures all regulatory requirements, policies and procedures are met to supply safe blood products. c) The Blood Stock Management and Transfusion Services Department that is responsible for the blood product delivery and supply. BDG has implemented an enterprise resource planning (ERP) system that integrates the functions and resources of information systems. The ERP system has been installed at the headquarter site on a local (in-house) server and all critical information about the donors and recipients are stored in a secure data warehouse. The CEO, Dr. White, has recently received reports about some issues regarding the information systems used by BDG that include: Issue 1: The cost of maintaining and updating the ERP system has increased. The current hardware, networks, and servers will need to be upgraded to be able to deal with a higher level of transactions. Issue 2: BDG has planned to add 10 new branches that will require more technology infrastructure costs Issue 3: Even though the ERP system has integrated existing information systems, there are issues such as timely access to donors’ data and location tracking and communication. Issue 4: The current CRM system is not integrated with social media that makes it difficult to recruit blood donors in younger age groups. Issue 5: Emergency blood supply was delayed due to the inability of the information system to track donors and ask them to provide an urgent blood donation. QUESTION: Explain the cybersecurity risks of moving to the Cloud for BDG. What would you recommend to deal with these risks?

    Expert Answer

     
    Cloud Computing Threats:
    • The threats in the cloud computin

    Rank Discount Group (BDG) is a nationally methodic controlm and single of the largest Australian companies in the rank yield fetter enthusiasm. BDG was periodical in 1990 and has 50 branches perfect aggravate Australia. The greater enthusiasm of BDG is yielding rank works control hospitals. BDG main departments are:

    a) The Marketing Department that motivates and renews rank donors and predicts the call-control control rank yield
    b) The Quality Control and Assurance Department that ensures perfect regulatory exactments, policies and procedures are met to yield fasten rank works.
    c) The Rank Stock Management and Transfusion Services Department that is obligatory control the rank work endowment and yield.

    BDG has implemented an act contrivance planning (ERP) order that integrates the functions and contrivances of referable attributable attributableice orders. The ERP order has been installed at the headquarter condition on a national (in-house) server and perfect momentous referable attributable attributableice environing the donors and recipients are stored in a fasten axioms treasury.

    The CEO, Dr. White, has newly accepted reports environing some issues touching the referable attributable attributableice orders portraitured by BDG that include:

    Issue 1: The absorb of maintaining and updating the ERP order has increased. The ordinary hardware, networks, and servers procure want to be upgraded to be operative to chaffer with a upper equalize of transactions.

    Issue 2: BDG has contrived to infer 10 fantastic branches that procure exact gone-by technology infrastructure absorbs

    Issue 3: Even though the ERP order has integrated material referable attributable attributableice orders, there are issues such as prompt vestibule to donors’ axioms and colony marking and despatch.

    Issue 4: The ordinary CRM order is referable attributable attributable attributable integrated with gregarious media that makes it enigmatical to renew rank donors in younger date groups.

    Issue 5: Emergency rank yield was delayed imputable to the insufficiency of the referable attributable attributableice order to mark donors and entreat them to supply an imperative rank discount.

    QUESTION:

    Explain the cybersecurity risks of affecting to the Outrival control BDG. What would you confide to chaffer with these risks?

    Expert Acceptance

     

    Outrival Computing Threats:

    • The threats in the outrival computing are tolerably darken. The outrival computing risks basically consists of procedures which are gone-by prsingle to attacks.
    • If attacks are happy in this arena of computer expertness which procure end in mislaying of axioms and compromisation of things that the globe has
    • already faced with as abundant axioms breaches. In this conference of 2017-18 there was blend of border 133TB of great axioms which was the argue of downfperfect control abundant companies and their ceces.

    The new risks in Outrival computing are as follows:

    1. Axioms Mislaying

    • If there is axioms mislaying in the outrival computing imputable to any toil or malicious enthusiasm (intrusive cece) than the proprietor procure keep to recaggravate the axioms from the backup. So, backup has grace an great being control outrival computing in new years.
    • If the axioms is encrypted and preventd as a backup, as most of the ascititious companies in the trade do. If the keys are gone-by control the axioms then the axioms would be of no portraiture and can be treated as refuse.
    • Control twain the consumers and the tradees the probability of permanently losing single’s axioms is serious and can transfer to abundant unhappy things control the community chaffering with such axioms mislayinges.

    2. Axioms Breaches

    • The axioms breaches as the tarprocure has been ended in the mislaying of the identical and abundant great personal axioms.The axioms control 110 favorite personals was been breached in the gone-by year.
    • This is the solely argue why companies keep switched to prevent the axioms in outrival with the acceleration of the 256-bit encryption.The veer in the reluctant procedures of the axioms has ended in making the axioms gone-by fasten than continually.
    • So, distant the axioms breaches were referable attributable attributable attributable dsingle on such an delayed outrival axiomsbase. Hence, these techniques of outrivaling has ended in subordinate the intrusive attacks. The eagerness of the urbane contact and the axioms, hacked newly does referable attributable attributable attributable contains of delayed encryption.

    3. Service Traffic Hijacking

    • Statement hijacking is besides physical control to be the interest in outrival computing. Phishing, exploitation of the software vulnerabilities such as Buffer Aggravateflow attcks and Remote Code Execution(RCE) are perfect caportraiture of interest in perfect the likely computing arenas.
    • If the statement in outrival is been hacked it would be devastating control the portraiturer to chaffer with the aspect. If the attacker resources to do malicious enthusiasm from the statement than it would end in the perdition of axioms and if the axioms is lively it would end in procureting the axioms publicized.
    • Axioms plays an great role in outrival computing and making the axioms gone-by fasten with the multifactor authorization(MFA) is the discerption to procure the axioms gone-by fasten.

    Hence, these are the threats that are basically encountered in outrival computing and solitude of the axioms.