Many organizations are now facing huge threats to their stored information. This is putting organizations and individuals at risk of losing their privacy. There are factors that contribute to information vulnerability of an organization and to a personal level. In addition, there are measures that are put in place to help secure information.
The factors that pose a threat to information may include inter-connectivity and the wireless applications used in business (Rainer & Turban, 2009, p. 1). There is massive communication of computers following the inter-connectivity and this introduces a lot of challenges in the manning of information security (Rainer & Turban, 2009, p. 1). The massive inter-connectivity has acted as a brooding ground for many attackers and malicious programs. This has brought about the idea of trusted and un-trusted networks that operate outside the business applications (Rainer & Turban, 2009, p. 1). Research has shown that wireless communication is the most risky in terms of information security but yet it is the most effective since it enables employees to access information from any part of the world (Rainer & Turban, 2009, p. 1).
Some government legislations also affect information security. The government issues the direction that financial information of a company should be available to the public (Rainer & Turban, 2009, p. 1). In the course of posting the information to the public, it makes a company vulnerable to attack by hackers or malicious programs.
Another factor is the increasing technology in the field of storage devices. Devices are increasingly becoming smaller, cheaper, and portable; they have an increased storage capacity (Rainer & Turban, 2009, p. 1). This has put organizations at a ris...
... middle of paper ...
...ti-malware systems, white-listing and black-listing and intrusion detection systems (Reynolds & Stair, 2005, p. 42).
In conclusion, information systems and resources should be protected at all times. The protection of information should be initiated by a company and enhanced by its employees and their clients. Application control ensures that information, data and all the applications used within an organization are protected.
Works Cited
O'Brien, J., & Marakas, G. (2008). Management information systems with MI source 2007. New York, NY: McGraw-Hill Laudon.
Rainer, R. K. Jr., & Turban, E. (2009). Introduction to information systems: Supporting and transforming business ( 3rd ed.). Available from http://edugen.wiley.com/edugen/student/mainfr.uni
Reynolds, G., & Stair, R. (2005). Principles of information systems ( 7th ed.). Boston, MA: Course Technology.
Saunders, C. S., & Pearlson, K. E. (2009). Managing and Using Information Systems. John Wiley&Sons, Incorporated.
...6. Fisher Center for Information Technology & Management, University of California in Berkeley. June 1995
Security helps the organization meet its business objectives or mission by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets through the selection and application of appropriate safeguards. Businesses should establish roles and responsibilities of all personnel and staff members. However, a Chief Information Officer should be appointed to direct an organization’s day to day management of information assets. Supporting roles are performed by the service providers and include systems operations, whose personnel design and operate the computer systems. Each team member must be held accountable in ensuring all of the rules and policies are being followed, as well as, understanding their roles, responsibilities and functions. Organizations information processing systems are vulnerable to many threats that can inflict various types of damage that can result in significant losses (Harris, 2014). Losses can come from actions from trusted employees that defraud the system, outside hackers, or from careless data entry. The major threat to information protection is error and omissions that data entry personnel, users, system operators and programmers make. To better protect business information resources, organizations should conduct a risk analysis to see what
Business owners will go to amazing lengths to keep their workplace safe while completely overlooking their IT security and their multifunction devices. IT security breaches cost the average company $800,000 in 2009 (Tattrie, 2009). Those figures represent a 97 percent increase from 2008. The $800,000 includes labor lost when a breach freezes systems, cost of repairing the damage caused by the breach, and the cost of replacing the faulty security. That is quite a large sum that is also highly avoidable. Due to escalation in Internet use, the amount of computer security breaches that businesses have experienced in the last year has increased at a rapid rate. Breaches can come from external attacks as well as within the walls of a company. External attacks are serious but the threat created by a company’s employees can be much worse (Robb, 2010). Last year 81 percent of security breaches came from inside the company. Employees can cause deliberate attacks, but more likely employee use can compromise your system without malice and unknowingly. Employees can abuse internet access privileges by downloading pornography, downloading music, and pirating software. Obviously, this is improper use of company time and resources but more importantly, it can expose your company to fines from the Business Software Alliance (BSA) and it also can make your computer network more vulnerable to access from outside troublemakers and industry spies. BSA has collected more than $70 million in penalties from companies where employees violated piracy laws.
ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest in designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers. INTRODUCTION
We all love computers; people store important information on their computers whether it is a business or one’s home. Businesses have confidential information stored on their computers.
Mehdi Khosrow-Pour, D.B.A. 2006, Cases on information technology : lessons learned,Vol 7, Hershey, Pa. : Idea Group.
The computer is considered one of the most important technological advances of the twentieth century. Security and privacy issues have been in existence long before the computer became a vital component of organizations' operations. Nevertheless, the operating features of a computer make it a double-edged sword. Computer technologies with reliable error detection and recording capabilities, permit the invasion of a supposedly secure environment to occur on a grand scale and go undetected. Furthermore, computer and communications technology permit the invasion of a persons' privacy and likewise go undetected. Two forces threaten privacy: one, the growth of information technology with its enhanced capacity for surveillance, communication, computation, storage and retrieval and two, the more insidious threat, the increased value of information in decision making. Information has become more vital in the competitive environment, thus, decision makers covet it even if it viol!
Haag, S. & Cummings, M. (2008). Management information systems for the information age (Laureate Education, Inc., custom ed.). Boston: McGraw-Hill/Irwin.
With a growing use of technology in modern society, it is not surprising that many businesses have to take significant measures to protect their company data and keep it secure. It is interesting to know to what lengths a company should go to avoid security beach and ID theft. I had an opportunity to sit down and meet with a senior manager of the project management office at CVS Health. She stated that computers and mobile phones were an essential part of her workday. When asked how she used technology in the office setting, she discussed how she uses technology to communicate with others, document information, give presentations during meetings, and share live web conferencing.
A wireless network is a wireless communication system that allows electronic devices and computing workstations communicate and exchange data with each other by utilizing radio waves as the transmission medium. Wireless networking offers many advantages for organizations and users such as increased productivity, portability and flexibility, and lower installation costs. However, wireless networking is also coupled with security threats that can alter and damage an organization’s computing and networking resources. Using effective network management can help prevent attacks from occurring by having a sound and thorough assessment of potential security risks and develops guidelines that will mitigate the identified threats. This paper will discuss
Stair, R., & Reynolds, G. ( 200). Fundamentals of information systems second edition. 2nd ed. : Course Technology.
Privacy exist wherever personal information or other sensitive information is collected, stored, used, and finally destroyed or deleted – in digital form or otherwise. The challenge of data privacy is to use data while safe-guarding individual's privacy preferences and their personally identifiable information. The fields of computer security, data security, and information security design and utilize software, hardware, and human resources to address this issue.
This paper is going to discuss wireless security from a broad view where I will go into why wireless security is so important, especially today as the ways in which we communicate is changing dramatically. From there I will discuss the multiple wireless security options that are available to give a better understanding of the options given. Then I will go into why exactly not protecting your wireless can be so dangerous with some descriptions on the most dangerous wireless attacks out there today. Finally, I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden. Wireless is everywhere today whether at home working from your WIFI network to work where you might be linked to a wireless network or even through your phone through a 3G or 4G network to connect to an open wireless network.
Laudon C. & J. Laudon (2003: 5th edition) Essentials of Management Information Systems. London: Prentice Hall International Limited