Vulnerability of an organizations information system - Research Paper Example

Comments (0) Cite this document
Vulnerability of an Organization’s Information System Name University Name Date Introduction: In the present times, the dependency on the internet and the use of information technology, within organizations, has largely increased with significant developments in the field…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
Vulnerability of an organizations information system
Read TextPreview

Extract of sample "Vulnerability of an organizations information system"

Download file to see previous pages Vulnerability in regard to organizational information systems can be defined as “a weakness that allows a threat to be realized or to have an effect on an asset” (Kim & Solomon, 2010, p.6). Thus it can be realized that a threat is not capable of affecting an information system unless the system is weak or vulnerable not to survive an attack (Kim & Solomon, 2010, p.6). Thus the vulnerabilities of an organization’s information systems reflect that the organization’s control over the systems has either become lost or ineffective (Whitman & Mattord, 2011, p.65). In the present times, the cyber world has taken a significant position in both organizational as well as personal lives. The most critical factor that has been obtained as making the information systems vulnerable to cyber threats and attacks is the human element. The information technology (IT) managers of today’s business organizations are thus encountered with severe challenges in regard to such vulnerabilities (Platsis, 2012). The present study focuses on the vulnerabilities those organizational information systems presently challenging the IT managers, with over viewing the most important cyber security vulnerability and considering measures that might protect organizations from such vulnerabilities. ...
All these media, if vulnerable, can lead to cyber intrusions causing cyber threats or attacks, thus affecting the entire information system of the organization. Hardware and Software: Information systems viruses and other malwares have the capability to destroy the software system of computers, or they might affect the security functions of the system. Thus this makes the software vulnerable allowing outsiders to steal information and use their commands on the organizations’ computers and information devices to manipulate information as per their need. This initiates the need for an organization to consider the use of antivirus tools essentially as well as update the system’s functions on a regular basis to detect any vulnerability, in advance (Kazmeyer, 2013). Considering the vulnerabilities of the hardware, it is of major concern since the unsecured terminals can be taken advantage of by outsiders along with the help of network access points, using which they might get access to systems that are otherwise protected. Security functions may be circumvented by an intruder if they get access to server rooms or floors where the computer systems are placed for work. Thus in order to prevent this, organizations need to have strict control over the access of any individual to the hardware such that such vulnerabilities may not be taken advantage of (Kazmeyer, 2013). Transmission Media: The media of transmission in organizations include both cabling as well as wireless communication media. In case of cabling, wires are used for transmission, that in many cases pass through the walls and channels of the organization eventually terminating the plugs of the walls ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Vulnerability of an organizations information system Research Paper”, n.d.)
Retrieved from
(Vulnerability of an Organizations Information System Research Paper)
“Vulnerability of an Organizations Information System Research Paper”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Vulnerability of an organizations information system

Vulnerability Tools

...? Full Paper Vulnerability Analysis Vulnerability analysis that is also called vulnerability assessment is a method that is aimed to identify, classify and express security weaknesses in a computing device or a computer network or an Information Technology infrastructure of an organization. Apart from this primary objective, vulnerability analysis also forecasts the efficiency and effectiveness of projected countermeasures as it measures their effectiveness at the operational layer. Some of the steps that may incorporate vulnerability analysis include: Classification of resources on the network Tagging importance level to...
10 Pages(2500 words)Essay

Information System

...?Information Systems I. Organizational Flexibility: Organizational Flexibility also known as Organizational Ambidexterity (Birkinshaw & Gibson, 2004,Bryson, Boal, & Rainey, 2008) can be better achieved by taking advantage of the power of the internet to optimize productivity and efficiency. By ensuring that the tools used by employees are available in the internet which can be accessed by them anywhere there is connectivity or service, an organization’s operation can also be transportable and flexible. Secure Internet based application is considered the best way of achieving organizational and operational ambidexterity. By making the organization operate out of the...
12 Pages(3000 words)Essay

Information System In Organizations

...INFORMATION SYSTEM IN ORGANIZATIONS INTRODUCTION The success and continuing competitiveness of a modern organization depends on how they tap and use information and technology. In this era, information technology is evident in every business practice, from the creation of business strategies to the direction of internet process of the organization. Because of increasing technology and unparalleled reliance to how organizations are run, the practice of ensuring that the security of the organization's information system is a vital aspect of an organization's survival (Willcocks, 1996). Today's organizations are more interconnected to their environment because of more value being placed by managers towards the use of the Internet... that it...
5 Pages(1250 words)Essay

Vulnerability Assessment on your System at Home

...images, financial information and much more. The computer will not notify any activity and will not show the existence of this special software virus. It is not necessary for the virus to be activated all the time. The hacker will trigger it anytime he wants. This is the reason why organizations that are fighting hacking and virus launch security patches and security updates on regular basis. The tools which is used for vulnerability testing is the more advanced approach rather than cleaning the system by an antivirus again and again. Vulnerability scanning is an efficient approach to handle any potential threats which may occur later....
14 Pages(3500 words)Essay

Information System

...Information System Introduction This report seeks to explore the difficulties of creating new software systems. People involved in the creation of successful software systems for end user applications face several challenges, which make the entire task a complex process. Software creation practice utilizes several models, each having approaches relevant to the development process. In the next part of this paper, we discuss the challenges faced by developers of new software systems. Discussion The major challenge in the creation of new software systems is the ability to change peoples attitudes and behaviors towards the new development....
2 Pages(500 words)Essay


...was very low in mood; he informed the staff that he felt depressed and he had suicidal thoughts. He was also very tearful in the absence of his wife. The depression rose higher following his hip replacement six months ago. This medical history made him vulnerable because even after explaining himself to the staff, it seemed that he was not aware of his present state and thus he could not make decisions for himself. He was helpless in this state and any decision was left to the caregivers who were supposed to make health decisions for him. In essence, his condition already made him vulnerable due to the fact that his wishes could not be upheld as a result of the caregiver’s perceptions of...
10 Pages(2500 words)Essay

Information System/Information Technology use fro other profitable purposes. The cost of renting or constructing more office space is also eliminated. Decision making Strategic plans of any organization largely its success. If the strategies are adequate then the company is highly likely to be successful. Companies to formulate strategies and make decisions about the organization’s prosperity and longevity use information system. IS is used to evaluate information from various sources both internal and external and use the information gathered as a basis for decision-making. Innovative products and models of business Creation of new products, both goods and services and...
2 Pages(500 words)Assignment


...the control room firewall. Several measures can be taken to avoid these attacks for instance employing a program known as Critical Infrastructure protection (CIP) to safeguard the United States security and defend them against intruders of the infrastructure. The Department of Homeland Security (DHS) of US puts in place the following recommendations to deal with cyber-terrorism; conducting threat vulnerability assessment, coming up with strategic analysis and warning capabilities in order to identify potential cyber attacks, protection to infrastructure control system, enhancing public or private information sharing and facilitating plan of recovery together with the recovery of the...
1 Pages(250 words)Admission/Application Essay

Information Systems in Organizations

... Sociology 16 January Social Response to the Video Clips How social affects my life Social affects my life in the areas of formal education, health, dating and political interests among others. Education-wise, the calibre of my school and teachers is determined by my social class. In terms of health, my social class plays a great role in determining my life expectancy whereby it is more likely be greater if I belong to a higher social class because I would be able access treatment and better one for that matter. People are more likely to form relationships with those who possess the same attributes as their own in terms of behavior, language and cultural values (Griffin, Larry, and Peggy 142). My social class therefore affects... Sociology...
16 Pages(4000 words)Assignment

Information System in Public Sector Organizations

...INFORMATION SYSTEM IN PUBLIC SECTOR ORGANISATIONS Challenges from the implementation of information system in public sector organizations Introduction With the increased government services locally and nationally, there is need to ensure effective coordination of government services and communication. Since 1950s, technology has been important theme in the study of organization functions. Over the last 30 years, information technologies have become a major factor that has led to remarkable performance of organizations locally and globally. With the emergence of modern information technology, firms and government agencies no longer need to take place around hierarchy. Contrary to the bureaucracies in the past that adopted command... the...
8 Pages(2000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Vulnerability of an organizations information system for FREE!

Contact Us