Risk Assessment



Overview
       Risks are unavoidable when IVK implements a new software system. Gallaugher (2017) states that cloud firms often argue that their expertise translates into less downtime and failure than conventional corporate data centers, but no method is without risks. Shifting existing on-premises data to a new cloud storage will bring several risks. For example, there will be a security implications problem. If AWS becomes unresponsive due to some system problem, IVK will not retrieve their data. Basically, AWS does not provide a technical support, so IVK needs to purchase a support plan, which costs up to 10 percent of monthly AWS usage. Also, AWS may not be familiar with IVK’s culture, so they cannot understand IVK’s language.

Privacy Issues
            Some risks are of high expectation but trivial consequences, whereas others are of low probability but significant impact. These various competitors are incredibly unique based upon their overall costs, values, and risks associated with implementing the software. However, there are similar characteristics amongst this software, making them very comparable. They include supply chain management, electronic data integration, sales order processing, and customer data management. AWS is based upon few characteristics that make it standout to  IVK. Some of these items are: abstraction of support, resource democratization, service-oriented architecture, flexibility and dynamism, utility model of consumption and allocation. These different software’s possess different value, which will be compared to see which software has better value for IVK. This system will also assist in decreasing operational costs and increasing business profitability.
            IVK is a company that is in a financial crisis at the moment from its decreasing stock price. The company is currently firing and laying off employees, due to financial issues. Although it could be resolvable through analyzing the risk factors it shares with competitors. Since everyday, data is communicated throughout companies, there is information going from consumers to suppliers and even supplier to manufacturers. With all of this data transactions, there is heightened risk of potential exposure.

Security Issues
            While AWS is a very secure cloud service, there are still some potential security issues that may be present and users should be aware of. In a cloud-based service it is very hard to determine who is accessing what and to control when, how, and who is logging into the different systems and if the activity is malicious or not. (Cheslock, 2018). Making sure that data is protected from data breaches and intruders is also a major security issue. In addition, there is the possibility of an outage which would leave the company unable to use or access any of the AWS services which would more than likely cause the business to go into a temporary shutdown. From a behavioral perspective, managers may compromise security by having too loose security group policy by giving access and logins to people that do not need them. (Kakarla, 2018). Oftentimes, human errors and mistakes by network users misconfigured settings, and violations of standard procedures. (Winnefeld, Upton, Kirchhoff, 2015). It is important to restrict access to only employees that it is absolutely necessary for them to access the cloud. Looking at the probability of these risks and the potential consequences, the behavioral risks have the highest probability of occurring with more trivial consequences, while the higher impact risks would be hackers and malicious people trying to still data.



References:

Amazon Web Service. (2018).Compare AWS support plans. Retrieved from https://aws.amazon.com/premiumsupport/compare-plans/
 
Cheslock, P. (2018, July 20). The Top 7 AWS Security Issues: What You Need to Know – Threat Stack. Retrieved November 6, 2018, from https://www.threatstack.com/blog/what-you-need-to-know-about-the-top-7-aws-security-issues
 
Gallaugher, J. (2017). Information Systems: A Manager’s Guide to Harnessing Technology. Boston, MA: FlatWorld
 
Kakarla, S. (2018, March 08). Common AWS Security Threats and How to Mitigate Them. Retrieved November 6, 2018, from https://www.sumologic.com/blog/amazon-web-services/aws-security-threats/
 
Winnefeld, J., Upton, D., & Kirchhoff, C. (2015, November 10). Defending Your Networks: Lessons from the Pentagon. Retrieved November 4, 2018, from https://hbr.org/webinar/2015/10/defending-your-networks-lessons-from-the-pentagon







No comments:

Post a Comment