StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

How Secure is Your Data, Information and Information Systems Technology - Assignment Example

Cite this document
Summary
This study, How Secure is Your Data, Information and Information Systems Technology, outlines that there are both similarities and differences in the security issues that you raised when compared to mine. This is because we both touched on password issues but I did not touch on the issue of virus. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
How Secure is Your Data, Information and Information Systems Technology
Read Text Preview

Extract of sample "How Secure is Your Data, Information and Information Systems Technology"

There are both similarities and differences in the security issues that you raised when compared to mine. This is because we both touched on password issues but I did not touch on the issue of virus. Reading about your post carefully, I find that it is important for your organization to take the issue of virus very serious as it can easily bring down the entire information system of the company (Chen, Ramamurthy and Wen, 2012). This is because of the differences in threat and harm that viruses pose.

As a way of mitigating the risk of virus and their threat, I believe your organization must be very emphatic on the use of cloud backup systems. This will ensure that in cases where virus wipe out important information, there can still be a source of reference (Martucci and& Oldvader, 2010). In my own organization, I believe upgrading our antivirus system as exists in your organization will do us a lot of good. ReferencesChen, Y., Ramamurthy, K. K., & Wen, K. (2012). Organizations' Information Security Policy Compliance: Stick or Carrot Approach?. Journal Of Management Information Systems,29(3), 157-188.

Martucci, W. C., & Oldvader, J. K. (2010). Workplace privacy and data security. Employment            Relations Today, 37(2), 59–66.Retrieved from the Walden Library databasesThe issue of insider threat is something that we both touched on as part of the trends in security issues. I however did not mention the case of employee negligence. I believe that from the elaboration that you give about employee negligence and how it applies to your organization, having much emphasis on employee training will be a solution to the problem that you currently face.

This is because through training, most of the cases of negligence can be dealt with as employees will gain the needed experience to handle all forms of security system cases (Vance, Lowry and Eggett, 2013). In my own organization, I am going to take a lot of inspiration from your organization on the use of specific employee based rules to ensure that all forms of insider breaches are dealt away with (Regions Intranet, 2013).ReferencesRegions Intranet. (2013). Data Breach. Retrieved from lifeatregions.

Accessed April 11, 2014 from http://lifeatregions.rgbk.com/RiskManagement/Compliance/DataBreach.rfVance, A., Lowry, P., & Eggett, D. (2013). Using Accountability to Reduce Access Policy            Violations in Information Systems. Journal Of Management Information Systems, 29(4),            263-290. doi:10.2753/MIS0742-1222290410

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“How Secure is Your Data, Information and Information Systems Assignment”, n.d.)
Retrieved from https://studentshare.org/business/1639242-how-secure-is-your-data-information-and-information-systems-technology-part-ii
(How Secure Is Your Data, Information and Information Systems Assignment)
https://studentshare.org/business/1639242-how-secure-is-your-data-information-and-information-systems-technology-part-ii.
“How Secure Is Your Data, Information and Information Systems Assignment”, n.d. https://studentshare.org/business/1639242-how-secure-is-your-data-information-and-information-systems-technology-part-ii.
  • Cited: 0 times

CHECK THESE SAMPLES OF How Secure is Your Data, Information and Information Systems Technology

Technology of Information Security

technology of Information Security Name Institution technology of Information Security Introduction The use of cryptography is a necessity for the consequence of the revolution of information in the world today.... Methods of encryption are on the rise because of the rapid growth in the technology sector all over the world.... Its disadvantages come mainly because the technology is sometimes not used as required.... Cryptography is a very powerful and important technology that can be used to protect information sent to emails and all financial based transactions....
3 Pages (750 words) Essay

Oracle and a Secure System

owever, how secure is it' Is it secure enough for Stockport PCT' Oracle focuses on the use of Internet Protocol, and in order to understand this better, these key ideas must be defined.... Having developed the tools, Ellison took another of his great strategic decisions and asked his people to implement the systems at Oracle 4.... There are several systems that on the basis of IP address define which packets to pass and which packets to stop from passing....
11 Pages (2750 words) Essay

Importance of Information Security and Privacy

Networks are built in order to allow users to share, however it also allows other users the possibility to obtain information and other data that are not meant for them.... With more advanced technology network managers can also detect when and where there is an intruder and what the intruder has done.... Although there are several methods to prevent unauthorised access; users occasionally are able to get through the security systems, and it is therefore essential for organizations to also be capable f detecting intruders....
6 Pages (1500 words) Essay

Telecommunications in information system

… We will need well secured protocols for our computers and information devices.... We will need well secured protocols for our computers and information devices.... ef=technology&_r=0 McCollum, S.... TELECOMMUNICATIONS IN information SYSTEM s Since we are aiming at providing a good care for our patients it will be necessary that we come up with a network design that will support the different locations for the dental care practice....
2 Pages (500 words) Essay

Hacking the Accounting Information System

An unauthorized access to the accounting information can be damaging to the accounting data.... Today, the whole business works with internet facility hence the risk of hacking on accounting information system in high.... So the companies need to be alert and take considerable responsibility to secure its Accounting information System (Thesis).... ccounting information System is a process which needs high security as many crucial and essential data are handled in it....
4 Pages (1000 words) Research Paper

What is System Security

System security can be defined as the mechanisms and techniques that are implemented to ensure organizational data and information maintains confidentiality, integrity at the same time is always available whenever it's needed.... That notwithstanding, with the advancement of technology our systems are prone to a number of threats that are out to jeopardize organizational system security.... The level of system security is being highlighted given the large numbers of multi-billion transactions that are conducted through those systems....
11 Pages (2750 words) Term Paper

Business Data Communication and Networking

sually, the information and data on a star network tend to pass through the hub, the switch, or the concentrator before continuing on the way to its destination.... This kind of topology reduces the damage that may be caused by line failure on the process of connecting all of the systems to the centrally located node.... In the case of the transmission line failing to link any peripheral node to the central node, the entire peripheral node will be isolated from all other nodes, though the entire t systems will remain unaffected....
5 Pages (1250 words) Coursework

Information Technology: History and Practice

With a click of a button, one can access vast amounts of data, information and can transact almost at the speed of thought.... The use of this technology has brought tremendous breakthrough on how you perform and keep your data safe and secure.... … The paper “Information technology: History and Practice” is an excellent example of an essay on information technology.... The advent of the computer and the progress in the world of information technology has brought a major change in each and every industry....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us