StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information Security - Essay Example

Cite this document
Summary
Information Security Name: Institution: INFORMATION SECURITY Following the anti-virus update from McAfee that affected computers running Windows XP internationally, the company made an official announcement, contending that a very small percentage of their clients had been affected…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
Information Security
Read Text Preview

Extract of sample "Information Security"

Download file to see previous pages

The next morning, Barry McPherson, their EVP, released a statement that was well phrased, but still unapologetic. Again, this was the wrong person to give such an announcement. The public relations and brand management team should have been the first people to make the announcement as it hurt their company’s image. The fact that the announcements were made by a spokesman and the EVP was damaging since their announcements came off as unapologetic, considering the major inconveniences suffered by their clients.

The apology eventually came from the EVP, followed closely by the CEO three days after the malfunction of their anti-virus software (Harkins, 2013). This was too late, and the damage to McAfee as a trusted brand had already been done. If the CIO had liaised with the brand and public relations people, the issue would have been solved with less frustration from the clients. In this aspect, while McAfee was able to arrest the situation with relative speed, the communication of the malfunction was more damaging than the malfunction (Harkins, 2013).

The effect that the anti-virus malfunction had on ordinary everyday computer users shows that the world is becoming too reliant on information systems. They have taken over the everyday running of organizations, as well as daily planning for individuals. Information systems are now used to store most of the information and transfer the information (Harkins, 2013). The use of cell phones and computers to communicate has gone up tremendously in the last ten years. It is almost impossible to imagine what life was like when one had to use a cell phone or write a letter.

Increasingly, enterprises are transacting businesses using technology and most accounting is now information system based. The use of information system has also become indispensable to decision making and logistics for most medium and big organizations (Harkins, 2013). Finally, even government agencies are now reliant on information systems. This shows that, as a society, information systems have begun to define how man interacts with information. The advancement of information systems have been good for society and arguing otherwise overlooks how easy it has made decision making at multiple levels.

However, this heightened use has ensured that the law of unintended consequences will apply (Harkins, 2013). In the case of any breach or failure for these systems, the consequences will be far reaching, particularly, if it is on a large scale. Over-reliance on information systems has made society a little more vulnerable. The use of passwords and pin numbers to guard these systems is basic to the threatening vulnerability. Because the society now uses interconnected systems for majority of their activities from banking, to food supply, to power, if anything goes wrong with the systems or they are sabotaged, the effects will be widespread.

The collapse of information system networks due to cyber-attacks by terrorists or system failures, there would be mild paralysis (Harkins, 2013). As can be seen, the McAfee anti-virus update failure caused a lot of inconveniences to their clients. The reimbursement for reasonable expenses was the right thing to do, particularly for those home clients who were hit by the fault. In fact, McAfee was obligated legally to reimburse its clients (Harkins, 2013). Software is dealt with in the US and EU by the consumer guarantee act and other similar acts These require that, in a situation where

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Security Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1487238-information-security
(Information Security Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1487238-information-security.
“Information Security Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1487238-information-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security

Policies and Procedures Organizations Should Implement to Protect Themselves

Professional ethics plays crucial role in helping Information Security professional to execute their duty.... However, to ensure maximum Information Security, organizations need to institute relevant legislations to guard against Information Security breach.... Protecting the firm from possible Information Security breach should be a major focus of the company's operational process.... Recommended Information Security Policies for Organizations Control over Access to Computer Rooms In order to ensure high level security for crucial organizational information, computer rooms should be kept under lock and key at all times....
4 Pages (1000 words) Essay

Information Security Management

This paper ''Information Security Management'' takes a look at the security threats that an SME faces online and its need of Information Security management to tackle these threats.... This paper would take a look at the security threats that an SME faces online and its need of Information Security management to tackle these threats.... An effective Information Security management allows businesses to implement various measures that would protect various data and assets that the business owns....
18 Pages (4500 words) Research Proposal

Information Security Management

The paper ''Information Security Management'' tells that there are many approaches for Information Security assessment, the challenge is to find a set of approaches that fits the unique circumstances of an Accounting Company.... The TMA01 evaluation reveals that the references to various vital aspects of Information Security.... hellip; On the whole, with the lack of rigor, one can say that the firm faces many different Information Security risks, and the challenge is to find an approach that best surfaces these risks for Accounting Company, given the state of TMA01 and the current circumstances of the firm....
10 Pages (2500 words) Essay

Information Security Measures

"Information Security Measures" paper states that a risk assessment approach is necessary for the development of systems with an acceptable level of risk.... nbsp; The study has been planned in several stages; review of relevant literature; study of architectures and measures in computing systems; a case study of security issues within a specific system; and recommendations for good practices for Information Security.... Information Security is not about looking at the past of an attack faced; neither is it about looking at the present with the fear of being attacked; nor is it about looking into the future about the uncertainty that might befall us....
5 Pages (1250 words) Coursework

Information Security Plan

nbsp;  Organizations are created by people, buildings and procedures, and these three ingredients can perform well only if they are assure of their security.... From the exchange of information for communication purpose to the exchange of secrets pertaining to the security of countries, cyberspace has become the medium of choice for everyone.... With the introduction of information technology, the risk of all above mentioned factors have increased....
15 Pages (3750 words) Case Study

Information Security Audit Tools

As the paper "Information Security Audit Tools" states, when audit systems are adopted, they assist to prevent the attacks and reduce their associated consequences.... elow shows Information Security management.... : Information Security management.... These risks can be prevented by installing Information Security to protect the organization's software from intruders.... Thus, this paper will seek to discuss, in detail, some of the Information Security audit tools....
10 Pages (2500 words) Literature review

Key Information Security Issues

This case study "Key Information Security Issues" presents the case scenario of Jack Doe that represents most of the internet users who are unaware of the presence of online attackers.... Furthermore, it demonstrates the usefulness of Information Security in an organization.... At times the acronym CIA is used regarding Information Security to refer to confidentiality, integrity as well as the availability of data.... With that, this report will detail key Information Security issues concerning Jack's handling of his work information, associated attacks, risks, impacts of attacks, countermeasures, and mitigation effects of the countermeasures....
8 Pages (2000 words) Case Study

Information Security Concept Map

… The paper "Information Security Concept Map" is a great example of a term paper on information technology.... Information Security ensures the integrity, availability, and privacy of data is protected.... The paper "Information Security Concept Map" is a great example of a term paper on information technology.... Information Security ensures the integrity, availability, and privacy of data is protected.... The primary function of Information Security is to prevent unauthorized access, disclosure, or modification of information in order to maintain reliable and timely access and use....
7 Pages (1750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us