Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

NMIMS Global Access

School for Continuing Education (NGA-SCE)


Course: Information Systems for Managers
Assignment Answers

Q1.
Answer 1:

These days everything is moving online and we can pay our bills from anywhere
using net banking or our debit or credit card. Online transactions are timesaving,
convenient, and popular. However, there is risk of cyber theft involved for those who
don’t take all the required precautions for safe transactions. Cybercrime can range
from security breaches to identity theft.  Cybercriminals use different methods to
capture information people enter on sites by targeting computer networks or devices,
such as credit card or debit card information.
Businesses need to protect themselves and their customers personal details from
these fraudulent crimes. Retail sector needs to adopt higher data security measures
for customer data protection due to challenges posed by the government and their
regulations.

5 security threats
Phishing - It is a social engineering attack used by cybercriminals to steal user
personal data such as login credentials and credit card numbers. Phishing is a scam
where cybercriminals impersonate legitimate organizations usually via email.
Spoofing - Spoofing is a cybercriminal activity used to set up fake or mirror sites that
pretend to be the official website of a particular firm. These spoofed sites collect
login details, and stealing credit card information.
Malware - It is software program delivered over the network that alters and modifies
the IS without the authority of the user or owner. It affects the confidentiality,
availability and integrity of the working system.
Data breach - It is a threat that allows confidential information to be exposed to
unauthorized person and makes it viewable to others, so that anyone can steal or
use the other user information.
Distributed Denial of Service (DDOS) attack - It is a cybercrime where users are
unable to access information systems, devices, or other network resources. DDOS
involves hundreds or more computers to launch the attack to the targeted working
system. Businesses experience loss of money, customers and information.
5 Innovative IT security mechanisms
Identity management: Identity management is an organizational process for
validating, identifying, and authorizing individuals or groups of people to have access
to the critical information with established identities. It is to make sure that the
unrelated and unwanted people should not get access to the critical information or
any such information which is not meant to be leaked out.
Firewalls and antivirus system: A firewall is network security device that provides
protection by controlling incoming and outgoing network traffic based on the
implemented security rules. The main purpose of firewall is to keep bad things out of
the protected network environment.
An antivirus is a software designed to detect and neutralize malicious software from
the computer system. Antivirus is important for any business to protect the
computers against viruses such as phishing attacks, worms, Trojan horses, and
more. These days virus attacks are very common, these viruses can easily enter an
unprotected system through emails, external drives, unknown downloads etc and
can steal data from the system. To protect the computer system an organisation
must install antivirus software into their computer systems.

Access control and authorization: Access control is s security policy that allows or
restrict access to computer data to individuals or parties. Only the authorized parties
are given access for reading, viewing, printing, etc. This is called privacy. Access
control and authorization is very important aspect of any organization as it secures
the right of the organization towards the data which it is willing to share or not.

Encryption: Encryption is a technique where the “plain text” is converted into “cipher
text”. The encryption and decryption of data is called cryptography. Encryption stops
cybercriminals to access the data.

Hardware controls: There are different types of computer controls to assist in


providing computer security.

 locks to limit the access


 password controls
 devices to verify users' identities
 intrusion detection systems
 hardware or smart card implementations of encryption
 firewalls
 locks or cables limiting access or deterring theft

Policies and procedures: Implementation of cybersecurity policies and procedures


is important. There should be training and administration of security policy to ensure
their proper use e.g., rules for using email encryption, and guidelines for creating
passwords.
Q2.
Answer 2:
In the government sector, e-governance is the use of information and communication
technologies for providing better services to its citizens.
It helps improving access of the government services and delivering these services
on time. It is an electronic medium used by the government for interacting with its
citizens.

G2C: Government to Citizen or vice versa (that is C2G or Citizen to Government).


Government-to-Citizen is the communication link between a government and private
individuals or residents. G2C communication can also include direct mail and media
campaigns. There are various services provided by the government and useful for
the citizens under this governance model such as Aadhar card, Voter ID, passport
services etc. G2C also allows citizens to be more informed about government laws,
regulations, policies, and services.

The e-governance initiatives in India face the twin challenges of automating the
government departments and taking the on-line services to the common man. While
there are standard approaches available for the former, the later needs innovations
to suit the Indian needs.

Advantages of E-Governance
Providing information: E-governance can provide various information to the
citizens which can be related to political processes, services and choices.

Citizens participation: E-governance can encourage the people to actively


participate and involve in various government activities.

Faster resolution: E-governance is helpful in facilitating speedy, transparent and


accountable administration services at the back office,

Effective interaction mode: E-governance provides the government with a cheap,


transparent and easy way of interacting with its citizens.

Reduced transaction costs: E-governance reduces transaction costs for


governments. It saves the time, effort and money of citizens in getting the services
they need. Transaction costs here have to be seen both from the supply-side and
demand-side perspective.

Indian Government conducted COVID testing in Dharavi (Mumbai) area


Dharavi is Asia’s largest urban-slum situated in Mumbai city. At the time of first
lockdown during Covid, Dharavi was at huge risk of spreading the virus and people
were hesitant to spend thousands of rupees on corona RTPCR test. In this scenario,
government took the responsibility and arrange the COVID test campaign at various
locations at Dharavi. The government officials took complete care of Covid positive
patients and admit them in hospital without taking any money from them.

Features of the initiative


 A team of 18 people including Doctors, Nurses, other staff etc. The whole
drive was concluded in five days as Dharavi has a big slum area.
 This testing program was completely free for all of them so this was also good
and commendable of the government.
 All the staff were very professional and they discussed about everything in
detail with the people.
 Staff checked the temperature, oxygen level and other details as well.

Benefits of this initiative

 It was convenient for people to get themselves tested with on-the-spot


registration.
 People were able to undergo RTPCR test with the help of government
officials, which was necessary at that time.
 Government was able to create awareness among the people and they came
forward and undergo RTPCR test.
 Government conducted this campaign to avoid the spread of virus.
 The campaign was at Dharavi itself, so it was convenient for the people to
visit the location and undergo the test.
 As the senior citizens were unable to walk till laboratory and for all those
citizens, this campaign proved to be advantageous.
 The people who found positive with mild symptoms were taken to the
quarantine centre to prevent themselves spreading the virus in the area.
 Due to free of cost testing and check-up people came forward to get
themselves tested as a precautionary measure.
 Government conducted this program for many localities like Dharavi.
 The most important benefit of this program was the safety of people, which is
the priority of the government. Our government officials were working
tirelessly to fight with this virus and keep the citizens safe and healthy.
Q3.
Answer 3:
(3a):

Mysuru is one of the cleanest and attractive cities in India. With the help of technological
assistance, we can make our life convenient and better. In this way, we can make Mysuru city
as smart city. There are many smart cities in the world, but we will take one smart city as
benchmark and emulate the best practices of that city into Mysuru.

Smart city to be chosen as benchmark- Bhopal


I have chosen Bhopal as benchmark smart city and while developing Mysuru as smart city, I
would adopt best practices of smart city Bhopal and apply to Mysuru as well. Below are the
reasons why I chose Indore as smart city.

Better transport system: In Bhopal, you will find well managed transport system as well as
Intelligent Traffic Management System (ITMS) proactively manage the ongoing traffic
situation, enhance traffic discipline . The Habibganj railways station is developed according to
international standards. It is India’s first world-class railway station. In order to make Mysuru
a smart city, the government needs good transport system as well so this is the first reason, I
have chosen Bhopal.

Waste management: Bhopal is India’s second cleanest city. The waste management system
is very effective. The waste is managed via technology with smart sensors in the bins. This
system is used to reduce the cost and time required for waste management service. In any
developed city, you need to have proper waste management system which should be there in
Mysuru as well.

Infrastructure: The better infrastructure development is one of the main requirements to


make your city smart. In past few years, there is lot of infrastructural development in Bhopal
like educational facilities, healthcare facilities, public safety etc. This will be the third reason
for my selection and I will expect the same developments when Mysuru adopts smart city
practices.

(3b):

Smart city
For a city to become smart, it requires to smartly manage the various resources such as water,
energy and other natural resources as well as taking smart care of transportation,
infrastructure, etc. so that there will be a growth in investment, trade, jobs, economy,
education, living standards, etc. The foundation of such a growth should be such that it is
sustainable. Cities should be enabled in such a way as to smartly manage the existing
capacity, resources and the infrastructure. The various factors that should be taken into
consideration for a smart city project are:

 Infrastructure
 Economy
 Mobility
 Environment
 People
 Living
 Governance

Technology enabled services to be used in smart cities


Internet of things (IoT): IoT presents a world where all the smart things are connected and
can communicate with each other. All this happens without or minimum human intervention.
The goal behind IoT is to create a better-connected world for the whole humanity. These
smart things provide services which are real-time, cheap and non-intrusive. IoT can be very
useful and it can be used to improve and benefit the lives of persons all over the world.
People will be able to monitor their vital signs and eating patterns and habits so they will be
healthier. Using IoT, various IoT enabled services can be offered such as:

Smart Roads
Smart roads incorporate the use of sensors and IoT technology that makes driving easier and
safer. These roads provide drivers with real-time information about weather and road
conditions. They can also help drivers to find free parking space and prevent accidents by
alerting drivers about incoming traffic. These roads are particularly useful on mountain roads
where landslides are a common occurrence. Roads that are fitted with electric vehicle
charging capabilities can also charge electric vehicles running over them with the help of
electromagnetic effects. In cities like Mysuru which is a preferred travel destination
especially for south people, it is really important to have smart roads.

Smart waste management


Using Internet of things (IoT), waste of any city can be managed in a smarter way. The
growing use of the Internet of Things (IoT), smart devices and sensors, and machine-to-
machine (M2M) connectivity has the potential to reduce unnecessary expenses that occur due
to operational inefficiencies in trash collection processes. Most popular and feasible smart
waste management solutions consist of endpoints (sensors), gateways, IoT platforms, and
web and mobile applications. A sensor is attached to a dumpster to measure its fill level.
Gateways play the role of bridging the gap between the IoT platform and sensor, sending data
from the sensor to the cloud. Different sensors can be used to perform different tasks.
Technology is making our life simpler and easier and it will help any city to become smart
city in short span of time.
Smart water management
The IoT smart water management techniques can reduce water cost by up to 20 percent,
resulting in better revenues with lower costs. IoT smart water management system also
provides opportunities to municipalities to reduce operational costs around construction,
maintenance, and more.

You might also like