Threats to Information Security

868 Words2 Pages

Many organizations are now facing huge threats to their stored information. This is putting organizations and individuals at risk of losing their privacy. There are factors that contribute to information vulnerability of an organization and to a personal level. In addition, there are measures that are put in place to help secure information.

The factors that pose a threat to information may include inter-connectivity and the wireless applications used in business (Rainer & Turban, 2009, p. 1). There is massive communication of computers following the inter-connectivity and this introduces a lot of challenges in the manning of information security (Rainer & Turban, 2009, p. 1). The massive inter-connectivity has acted as a brooding ground for many attackers and malicious programs. This has brought about the idea of trusted and un-trusted networks that operate outside the business applications (Rainer & Turban, 2009, p. 1). Research has shown that wireless communication is the most risky in terms of information security but yet it is the most effective since it enables employees to access information from any part of the world (Rainer & Turban, 2009, p. 1).

Some government legislations also affect information security. The government issues the direction that financial information of a company should be available to the public (Rainer & Turban, 2009, p. 1). In the course of posting the information to the public, it makes a company vulnerable to attack by hackers or malicious programs.

Another factor is the increasing technology in the field of storage devices. Devices are increasingly becoming smaller, cheaper, and portable; they have an increased storage capacity (Rainer & Turban, 2009, p. 1). This has put organizations at a ris...

... middle of paper ...

...ti-malware systems, white-listing and black-listing and intrusion detection systems (Reynolds & Stair, 2005, p. 42).

In conclusion, information systems and resources should be protected at all times. The protection of information should be initiated by a company and enhanced by its employees and their clients. Application control ensures that information, data and all the applications used within an organization are protected.

Works Cited

O'Brien, J., & Marakas, G. (2008). Management information systems with MI source 2007. New York, NY: McGraw-Hill Laudon.

Rainer, R. K. Jr., & Turban, E. (2009). Introduction to information systems: Supporting and transforming business ( 3rd ed.). Available from http://edugen.wiley.com/edugen/student/mainfr.uni

Reynolds, G., & Stair, R. (2005). Principles of information systems ( 7th ed.). Boston, MA: Course Technology.

Open Document