Sunday, June 9, 2019
Business information system Essay Example | Topics and Well Written Essays - 1500 words - 2
Business information system - Essay ExampleThere ar many factors that are contributing to the increase vulnerability of organizational information assets. Given below are some of the important factors that play significant role in making the organizational assets undefendable (Prentice Hall, 2010 KingCounty, 2009 Turban et al., 2005) Internet Vulnerabilities The research has shown that open or public networks such(prenominal) as the Internet are more vulnerable than internal networks for the reason that they are virtually open to everyone. Hence, when the Internet turns out to be an important part of the business network, and the most of the business tasks are supported by this network thence the organizations information arrangements in addition become open for attacks from outsiders. Wireless Security Challenges Wireless networks based on radio technology are also vulnerable to security penetration for the reason that radio frequency bands are easy to scan and detect for the att ackers. These days Wi-Fi technology is extensively available and crack great deal of support for connectivity and information sharing. However, these networks always remain the major target of attackers which can cause problems for the organizations and attacks against information system. Malicious Software Viruses, Worms, Trojan Horses, and Spyware A malicious software program can cause a variety of threats for example worms, computer viruses and Trojan horses. These threats can cause massive destruction to organizations resources in the forms of theft of organizational information, personal data theft and huge danger to corporate and personal information. Hackers and Cybervandalism A hacker is a person who aims to obtain black access to an information system. However, in the hacking community, the term cracker is normally employed to demonstrate a hacker with criminal objectives, though in the public press, the wrong cracker and hacker are employed interchangeably. These hacker s can get access to an organizations network and launch a variety of security attacks such as (Prentice Hall, 2010 KingCounty, 2009 Turban et al., 2005) Spoofing and sniffing Denial of service attacks Identity theft Question 2 Contrast unintentional and hash out threats to an information resource. Provide two (2) examples of both. reading systems are vulnerable and in danger due to a number of possible threats and hazards. However, there are two major types of threats known as deliberate threats and unintentional threats. Given below are acts with no malicious determination and with malicious determination (Rainer, 2009 Safari Books Online, 2013 E.Whitman, 2004) Unintentional Threats Device Loss Human errors or mistakes are the major causes of un-intentional threats that can happen due to human error or due to negligence of human. For example, a person who has lost his device, mobile or laptop which be misused by an attacker for carrying out illegal activities. Temporary Hires Tem porary hires are also major type of unintentional threats. In this scenario, temporary workers including contract labor, janitors, consultants, and guards can also create serious security loss for the organizations. Contract labor, for example temporary hires, can be ignored in information security policy. Though, these staff members can unintentionally access the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.