There are many threats facing information systems. For example, if a fire were to burn down one of our restaurants, now only would Pizzarama lose property, but the sales data for that restaurant would be unrecoverable. In addition, an earthquake could hit our main data center and cause a loss of data there. To make sure our data is safe, we keep local backups as well as an online sync of backups with multiple datacenters located around the United States. Pizzarama employs many different people, For example, we have those who operate our business functions and those who work in our chains such as delivery personnel and cashiers. Employees must only be allowed to see the data that they are intended to see and to make no modifications beyond what is needed. To prevent unauthorized access and information modification, we require passwords for every change that is being made. Each password is signed to a specific user who must be authorized to access certain areas of the information system. In addition, we require keycards to ensure dual authentication. Although Pizzarama respects its partnerships with Kraft, we also want to protect our servers from corporate espionage. We use similar access-control restrictions to prevent our partners at Kraft from accessing any part of our information system other than the information required to fulfill our order.
Pizzarama must also protect itself from hackers and other outside attackers. It is important to maintain a secure network that is free from intruders. This is done by requiring passwords to login to any wireless network and encrypting data on that network. This helps prevent drive by packet sniffing. In addition, Pizzarama has firewalls on every network. Because a firewall allows us to only enable access to approved connections and applications, it helps secure each network from hackers. Pizzarama also has virus monitoring software installed on every computer used by the company. This software will set up a warning when an employee accidentally opens an email containing a virus or other malicious software and help prevent it from being installed. In addition, local systems are wiped daily so that every 24 hours they are restored to a clean state.
The picture above is demonstrating how encryption works. When someone wants to send data to someone else, but wants to ensure that only the intended receiver may access the file, they can encrypt it. After the file has been encrypted, the receiver will be the only one who can decrypt it. To do this, the receiver must have two keys, a public key and a private key. A public key is actually more like a lock. Anyone can access it and use it to lock or encrypt data. Once data has been encrypted with the public key, only the private key can decrypt it. Because only the receiver has the private key, the sender knows that only the intended recipient will have access to the data. In addition, if a Pizzarama Chef wants to send a recipe back, but they want to ensure that the person at the restaurant getting the recipe knows it is from them, they can encrypt the recipe with their private key. The restaurant would just use Pizzarama’s public key to decrypt the message. Because the public key will only decrypt messages scrambled with the private key, they know it is from a Pizzarama chef. Of course, the recipe will be able to be decrypted by anyone because the public key is public knowledge. However, the restaurant will be safe in knowing that the food cooked for our customers actually came from a Pizzarama chef and not a malicious third party.