Q. 7 (New)
chp - 4
5 mks
*Hybrid Cloud*
1⃣ This is a combination of both at least one private (internal) and at least one public (external) cloud computing environments - usually, consisting of infrastructure, platforms and applications.
2⃣ The usual method of using the hybrid cloud is to have a private cloud initially, and then for additional resources, the public cloud is used.
3⃣ The hybrid cloud can be regarded as a *private cloud extended to the public cloud* and aims at utilizing the power of the public cloud by retaining the properties of the private cloud.
*Note:*
This is just a way to revise EIS
u may refer to ur study material
*Regards*
*Prof. NIRAV MEHTA*
chp - 4
5 mks
*Hybrid Cloud*
1⃣ This is a combination of both at least one private (internal) and at least one public (external) cloud computing environments - usually, consisting of infrastructure, platforms and applications.
2⃣ The usual method of using the hybrid cloud is to have a private cloud initially, and then for additional resources, the public cloud is used.
3⃣ The hybrid cloud can be regarded as a *private cloud extended to the public cloud* and aims at utilizing the power of the public cloud by retaining the properties of the private cloud.
*Note:*
This is just a way to revise EIS
u may refer to ur study material
*Regards*
*Prof. NIRAV MEHTA*
Q.8 (INTER NEW)
Chp 4
4 Marks
*Advantages of BYOD*
1. *Happy Employees:* Employees love to use their own devices when at work. This also reduces the number of devices an employee has to carry; *otherwise he would be carrying his personal as well as organization provided devices*.
2. *Lower IT budgets:* Could involve *financial savings* to the organization since employees would be using the devices they already possess thus reducing the outlay of the organization in providing devices to employees.
3. *IT reduces support requirement:* IT department *does not have to provide end user support and maintenance* for all these devices resulting in cost savings.
4. *Early adoption of new Technologies:* Employees are generally *proactive* in adoption of new technologies that result in enhanced productivity of employees leading to overall growth of business.
5. *Increased employee efficiency:* The efficiency of employees is more when the employee works on his/her own device. In an organization provided devices, employees have to learn and there is a learning curve involved in it.
*Note*
This is just a way to revise EIS u may refer ur study material.
*Regards*
*Prof. NIRAV MEHTA*
Chp 4
4 Marks
*Advantages of BYOD*
1. *Happy Employees:* Employees love to use their own devices when at work. This also reduces the number of devices an employee has to carry; *otherwise he would be carrying his personal as well as organization provided devices*.
2. *Lower IT budgets:* Could involve *financial savings* to the organization since employees would be using the devices they already possess thus reducing the outlay of the organization in providing devices to employees.
3. *IT reduces support requirement:* IT department *does not have to provide end user support and maintenance* for all these devices resulting in cost savings.
4. *Early adoption of new Technologies:* Employees are generally *proactive* in adoption of new technologies that result in enhanced productivity of employees leading to overall growth of business.
5. *Increased employee efficiency:* The efficiency of employees is more when the employee works on his/her own device. In an organization provided devices, employees have to learn and there is a learning curve involved in it.
*Note*
This is just a way to revise EIS u may refer ur study material.
*Regards*
*Prof. NIRAV MEHTA*
Q.9 (INTER NEW)
Chp 4
4 Marks
*Emerging BYOD Threats*
1. *Network Risks:* It is normally exemplified and hidden in *‘Lack of Device Visibility’*. When company-owned devices are used by all employees within an organization, the organization’s IT practice has complete visibility of the devices connected to the network. This helps to analyze traffic and data exchanged over the Internet. As BYOD permits employees to carry their own devices (smart phones, laptops for business use), the IT practice team is unaware about the number of devices being connected to the network. *As network visibility is of high importance, this lack of visibility can be hazardous*.
2. *Device Risks:* It is normally exemplified and hidden in *‘Loss of Devices’*. A lost or stolen device can result in an *enormous financial and reputational embarrassment* to an organization as the device may hold sensitive corporate information. With easy access to company emails as well as corporate intranet, company trade secrets can be easily retrieved from a misplaced device.
3. *Application Risks:* It is normally exemplified and hidden in *‘Application Viruses and Malware’*. A related report revealed that a majority of employees’ phones and smart devices that were connected to the corporate network weren’t protected by security software. Organizations are not clear in deciding that ‘who is responsible for device security – the organization or the user’.
4. *Implementation Risks:* It is normally exemplified and hidden in *‘Weak BYOD Policy’*. The effective implementation of the BYOD program should not only cover the technical issues mentioned above but also mandate the development of a robust implementation policy. In addition to this, a weak policy fails to educate the user, thereby increasing vulnerability to the above mentioned threats.
*Note*
This is just a way to revise EIS u may refer ur study material.
*Regards*
*Prof. NIRAV MEHTA*
Chp 4
4 Marks
*Emerging BYOD Threats*
1. *Network Risks:* It is normally exemplified and hidden in *‘Lack of Device Visibility’*. When company-owned devices are used by all employees within an organization, the organization’s IT practice has complete visibility of the devices connected to the network. This helps to analyze traffic and data exchanged over the Internet. As BYOD permits employees to carry their own devices (smart phones, laptops for business use), the IT practice team is unaware about the number of devices being connected to the network. *As network visibility is of high importance, this lack of visibility can be hazardous*.
2. *Device Risks:* It is normally exemplified and hidden in *‘Loss of Devices’*. A lost or stolen device can result in an *enormous financial and reputational embarrassment* to an organization as the device may hold sensitive corporate information. With easy access to company emails as well as corporate intranet, company trade secrets can be easily retrieved from a misplaced device.
3. *Application Risks:* It is normally exemplified and hidden in *‘Application Viruses and Malware’*. A related report revealed that a majority of employees’ phones and smart devices that were connected to the corporate network weren’t protected by security software. Organizations are not clear in deciding that ‘who is responsible for device security – the organization or the user’.
4. *Implementation Risks:* It is normally exemplified and hidden in *‘Weak BYOD Policy’*. The effective implementation of the BYOD program should not only cover the technical issues mentioned above but also mandate the development of a robust implementation policy. In addition to this, a weak policy fails to educate the user, thereby increasing vulnerability to the above mentioned threats.
*Note*
This is just a way to revise EIS u may refer ur study material.
*Regards*
*Prof. NIRAV MEHTA*
*Q.10 (INTER NEW)*
Chp 4
4 Marks
*E-commerce*
*Benefits to Customer / Individual / User*
1. *Convenience:* Every product at the *tip of individual’s fingertips* on internet.
2. *Time saving:* *No. of operations* that can be performed both by potential *buyers and sellers increase*.
3. *Various Options:* There are several options available for customers which are *not only being easy to compare* but are provided by different players in the market.
4. *Easy to find reviews:* There are often reviews about a particular site or product from the previous customers which provides *valuable feedback*.
5. *Coupon and Deals:* There are discount coupons and reward points available for customers *to encourage online transaction*.
6. *Anytime Access:* Even *midnight access* to the e-commerce platforms is available which brings in customer suitability.
*Regards*
*Prof. NIRAV MEHTA*
Chp 4
4 Marks
*E-commerce*
*Benefits to Customer / Individual / User*
1. *Convenience:* Every product at the *tip of individual’s fingertips* on internet.
2. *Time saving:* *No. of operations* that can be performed both by potential *buyers and sellers increase*.
3. *Various Options:* There are several options available for customers which are *not only being easy to compare* but are provided by different players in the market.
4. *Easy to find reviews:* There are often reviews about a particular site or product from the previous customers which provides *valuable feedback*.
5. *Coupon and Deals:* There are discount coupons and reward points available for customers *to encourage online transaction*.
6. *Anytime Access:* Even *midnight access* to the e-commerce platforms is available which brings in customer suitability.
*Regards*
*Prof. NIRAV MEHTA*
*Q.11 (INTER NEW)*
Chp 4
4 Marks
*E-Commerce*
*Benefits to Business / Sellers*
1. *Increased Customer Base*: Since the number of people getting online is increasing, which are creating not only new customers but also *retaining the old ones*.
2. *Recurring payments made easy*: Each business has number of operations being *homogeneous*. Brings in uniformity of scaled operations.
3. *Instant Transaction:* The transactions of e commerce are *based on real time processes*. This has made possible to crack number of deals.
4. *Provides a dynamic market:* Since there are several players, providing a dynamic market which enhances quality and business.
5. *Creation of new markets:* This is done through the ability to *easily and cheaply reach potential customers.*
6. *Easier entry into new markets:* This is especially into geographically remote markets, for enterprises regardless of size and location.
7. *Better quality of goods:* As standardized specifications and competition have increased and improved variety of goods through expanded markets and the ability to produce customized goods.
8. *Elimination of Time Delays:* Faster time to market as business processes are linked, thus enabling seamless processing and eliminating time delays.
*Regards*
*Prof. NIRAV MEHTA*
Chp 4
4 Marks
*E-Commerce*
*Benefits to Business / Sellers*
1. *Increased Customer Base*: Since the number of people getting online is increasing, which are creating not only new customers but also *retaining the old ones*.
2. *Recurring payments made easy*: Each business has number of operations being *homogeneous*. Brings in uniformity of scaled operations.
3. *Instant Transaction:* The transactions of e commerce are *based on real time processes*. This has made possible to crack number of deals.
4. *Provides a dynamic market:* Since there are several players, providing a dynamic market which enhances quality and business.
5. *Creation of new markets:* This is done through the ability to *easily and cheaply reach potential customers.*
6. *Easier entry into new markets:* This is especially into geographically remote markets, for enterprises regardless of size and location.
7. *Better quality of goods:* As standardized specifications and competition have increased and improved variety of goods through expanded markets and the ability to produce customized goods.
8. *Elimination of Time Delays:* Faster time to market as business processes are linked, thus enabling seamless processing and eliminating time delays.
*Regards*
*Prof. NIRAV MEHTA*
*Q.12 (INTER NEW)*
Chp 4
4 Marks
*E-commerce*
*Benefits to Government*
1. *Instrument to fight corruption*:-In line with Government’s vision, e commerce provides a pivotal hand to fight corruption.
2. *Reduction in use of ecologically damaging materials* through electronic coordination of activities and the movement of information rather than physical objects.
*Regards*
*Prof. NIRAV MEHTA*
Chp 4
4 Marks
*E-commerce*
*Benefits to Government*
1. *Instrument to fight corruption*:-In line with Government’s vision, e commerce provides a pivotal hand to fight corruption.
2. *Reduction in use of ecologically damaging materials* through electronic coordination of activities and the movement of information rather than physical objects.
*Regards*
*Prof. NIRAV MEHTA*
*Q.13 (INTER NEW)*
Chp 4
*5 Marks*
*Risk involved in E-commerce*
*7 points are enough*
(i) *Privacy and Security:* Comes in the point of hacking. There are often issues of security and privacy due to *lack of personalized digital access and knowledge.*
(ii) *Quality issues:* There are quality issues raised by customers as the *original Product differs* from the one that was ordered.
(iii) *Delay in goods and Hidden Costs:* When goods are ordered from another country,*there are hidden costs* enforced by Companies.
(iv) *Needs Access to internet and lack of personal touch:* The e commerce requires an *internet connection* which is extra expensive and lacks personal touch.
(v) *Security and credit card issues:* There is *cloning* possible of credit cards and debit cards which poses a security threat.
(vi) *Infrastructure:* There is a greater need of not only digital infrastructure but also network expansion of roads and railways which remains a substantial challenge in developing countries.
(vii) *Problem of anonymity:* There is need to *identify and authenticate users* in the virtual global market where anyone can sell to or buy from anyone, anything from anywhere.
(viii) *Repudiation of contract:* There is possibility that the electronic transaction in the form of contract, sale order or purchase by the trading partner or customer maybe denied.
(ix) *Lack of authenticity of transactions:* The electronic documents that are produced during an e-Commerce transaction *may not be authentic and reliable.*
(x) *Data Loss or theft or duplication:* The data transmitted over the Internet may be lost, duplicated, tampered with or replayed.
(xi) *Attack from hackers:* Web servers used for e-Commerce maybe *vulnerable to hackers.*
(xii) *Denial of Service:* Service to customers may be denied due to non-availability of system as it may be affected by viruses, e-mail bombs and floods.
(xiii) *Non-recognition of electronic transactions:* E-Commerce transactions, as electronic records and digital signatures may not be recognized as evidence in courts of law.
(xiv) *Lack of audit trails:* Audit trails in e-Commerce system may be lacking and the logs may be incomplete, too voluminous or easily tampered with.
(xv) *Problem of piracy:* *Intellectual property may not be adequately protected* when such property is transacted through e-Commerce.
*Regards*
*Prof. NIRAV MEHTA*
Chp 4
*5 Marks*
*Risk involved in E-commerce*
*7 points are enough*
(i) *Privacy and Security:* Comes in the point of hacking. There are often issues of security and privacy due to *lack of personalized digital access and knowledge.*
(ii) *Quality issues:* There are quality issues raised by customers as the *original Product differs* from the one that was ordered.
(iii) *Delay in goods and Hidden Costs:* When goods are ordered from another country,*there are hidden costs* enforced by Companies.
(iv) *Needs Access to internet and lack of personal touch:* The e commerce requires an *internet connection* which is extra expensive and lacks personal touch.
(v) *Security and credit card issues:* There is *cloning* possible of credit cards and debit cards which poses a security threat.
(vi) *Infrastructure:* There is a greater need of not only digital infrastructure but also network expansion of roads and railways which remains a substantial challenge in developing countries.
(vii) *Problem of anonymity:* There is need to *identify and authenticate users* in the virtual global market where anyone can sell to or buy from anyone, anything from anywhere.
(viii) *Repudiation of contract:* There is possibility that the electronic transaction in the form of contract, sale order or purchase by the trading partner or customer maybe denied.
(ix) *Lack of authenticity of transactions:* The electronic documents that are produced during an e-Commerce transaction *may not be authentic and reliable.*
(x) *Data Loss or theft or duplication:* The data transmitted over the Internet may be lost, duplicated, tampered with or replayed.
(xi) *Attack from hackers:* Web servers used for e-Commerce maybe *vulnerable to hackers.*
(xii) *Denial of Service:* Service to customers may be denied due to non-availability of system as it may be affected by viruses, e-mail bombs and floods.
(xiii) *Non-recognition of electronic transactions:* E-Commerce transactions, as electronic records and digital signatures may not be recognized as evidence in courts of law.
(xiv) *Lack of audit trails:* Audit trails in e-Commerce system may be lacking and the logs may be incomplete, too voluminous or easily tampered with.
(xv) *Problem of piracy:* *Intellectual property may not be adequately protected* when such property is transacted through e-Commerce.
*Regards*
*Prof. NIRAV MEHTA*
Guys was not well since last 2 days and was also busy with my neighbour hospitalization work.
But will send from today..
But will send from today..
Dear CA Student,
You can easily score 50+ marks in ITSM and EISSM! Register for this FREE webinar to know more about it!
https://event.webinarjam.com/register/52/w8z4zi4q
24edu7 - Your friend in your journey of CA.
You can easily score 50+ marks in ITSM and EISSM! Register for this FREE webinar to know more about it!
https://event.webinarjam.com/register/52/w8z4zi4q
24edu7 - Your friend in your journey of CA.
Webinarjam
The world's most powerful webinar software
You can share this with your friends also. It’s a free webinar.
If you are facing any difficulties while registering yourself for the free webinar, you can message at 9029333352.
Pls register for this webinar. It would be very helpful for you.
Registration link: https://event.webinarjam.com/register/52/w8z4zi4q
Pls register for this webinar. It would be very helpful for you.
Registration link: https://event.webinarjam.com/register/52/w8z4zi4q
Webinarjam
The world's most powerful webinar software
Just about 9 hours to go for FREE live webinar! This webinar is for you if you want to get more than 50+ marks in the subject of EISSM!
Register below
https://event.webinarjam.com/register/52/w8z4zi4q
If already registered, do not forget to attend it live!
Register below
https://event.webinarjam.com/register/52/w8z4zi4q
If already registered, do not forget to attend it live!
Webinarjam
The world's most powerful webinar software
EIS SM NEW SYL - Prof. Nirav Mehta
Just about 9 hours to go for FREE live webinar! This webinar is for you if you want to get more than 50+ marks in the subject of EISSM! Register below https://event.webinarjam.com/register/52/w8z4zi4q If already registered, do not forget to attend it live!
Less then 3 hours to go! If you have not registered yet! Do it now!
If anyone facing any sort of difficulty for registration of ITSM or EISSM mentoring can message at 9029333352.
For registering you can visit: https://24edu7.com/course/itsm-eissm-mentoring-program/
I would handhold you at every step of your journey to ensure you score more than 50+ in ITSM or EISSM!
For registering you can visit: https://24edu7.com/course/itsm-eissm-mentoring-program/
I would handhold you at every step of your journey to ensure you score more than 50+ in ITSM or EISSM!
A lot of questions answered about the mentoring program in this video. A lot of students had confusions so made a video to answer those