StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information System Vulnerabilities - Assignment Example

Cite this document
Summary
The paper "Information System Vulnerabilities" tells us about a weakness or opportunity in an information system that cybercriminals can exploit and gain unauthorized access to a computer system. Vulnerabilities weaken systems and open the door to malicious attacks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
Information System Vulnerabilities
Read Text Preview

Extract of sample "Information System Vulnerabilities"

In modern times, every organization relies heavily on the information system infrastructure for achieving its objectives and performing daily routine activities. The information systems have provided a large number of benefits and have reduced dependency on manual sources. Having said that, information systems are directly prone to threats, failures, outside attacks, and various other factors. There are a number of reasons for its vulnerabilities and these elements originate from both internal sources as well as external sources

Information systems can backfire in the manner of damages in the form of breach of privacy, leaking of important data, bugs in the system, downtime of software and network and various other factors that have a direct impact on the life of the project and organization(Laudon & Laudon, 2011).

One prime reason for being so fragile is nature is a characteristic attribute of being directly in touch with outside forces and entities. Since it is an established fact that a large number of malicious forces and programs exist that are a direct threat to information systems, therefore they serve as the front-line threats to its safe working and existence.

Another downside of information systems is its rapid-paced transition and introduction of new trends in the arena. Since innovation and up gradation are bound to occur in information systems, this also serves as a vulnerability.

Having identified the vulnerabilities that might arise in the information system atmosphere, there is a need for creating an effective protection and security layer, along with assigning responsibilities to the top management for ensuring the implementation of the information system and its principles in its true spirit(Gibson, 2010).

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IT Systems Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
IT Systems Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1596780-it-systems
(IT Systems Assignment Example | Topics and Well Written Essays - 250 Words)
IT Systems Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1596780-it-systems.
“IT Systems Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1596780-it-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information System Vulnerabilities

Considering the Threats and Vulnerabilities of Information Systems: A Plan for Improvements

uarding the information system ... Jeopardy FLPD's centralized information system renders extremely vulnerable.... The person in charge of managing FLPD's Information Systems Unit (ISU) observes and evaluates staff members who work with the information system (SafirRosetti, 2006).... The director's sole purpose should be to evaluate and respond to threats of the information system.... Streamlining duties will induce competence among system operators and enhance security of the information system. ...
7 Pages (1750 words) Coursework

Network Vulnerabilities:

This research will summarize 10 common network vulnerabilities into a table.... Most of people make use of them to copy their sensitive information from one system to another and use it NETWORK vulnerabilities Network vulnerabilities Affiliation Introduction This paper presents an overview of some of the common network vulnerabilities.... This research will summarize 10 common network vulnerabilities into a table....
2 Pages (500 words) Essay

Information Systems Security

The report has outlined the basic threats and system vulnerabilities along with risk management controls that can help the pharmacy reduce the information security threats.... The report provides an overview of risks and vulnerabilities of the information system (IS) in the pharmacy.... The hardware comprising of central processing unit, external hard disk drives, keyboards and monitors are an integral part of any information system.... hysical components of the information system are exposed to threats and damages in the form of fire, theft or any kind of physical damage that can result in loss of data....
8 Pages (2000 words) Essay

System Security for Department of Human and Health Services

IST SP 800-53 Control: The organization should update the scanned Information System Vulnerabilities.... This paper "System Security for Department of Human and Health Services" focuses on the system security plan (SSP) which aims at providing an overview of federal information system security requirements as well as describing the current and planned controls for meeting the requirements.... Furthermore, the SSP sets out responsibilities and expected behaviour of all individuals who access the information system....
4 Pages (1000 words) Essay

The Strategies Applied in Computer Security

"The Strategies Applied in Computer Security" paper focuses on information security as a continuous process of practicing due care as well as due diligence to protect information and the information system against disclosure, alteration, distribution, and unauthorized access.... onfidentiality is an information security principle that is aimed at preventing information disclosure to people or entities that are unauthorized to access both the information and information system....
8 Pages (2000 words) Assignment

Building Management System Vulnerabilities

The paper "Building Management system vulnerabilities" is an outstanding example of a term paper on management.... The paper "Building Management system vulnerabilities" is an outstanding example of a term paper on management.... Building Management system vulnerabilities ... uilding Management system vulnerabilities 0 ... uilding Management system vulnerabilities 9 ... o understand the building management system vulnerabilities is important to get acquainted with the hardware and software architecture of the system. ...
13 Pages (3250 words) Term Paper

Current Trends in Information Security

nformation system vulnerabilities 6 ... nformation system vulnerabilities ... he network and computer technology together form the information system.... A user management policy may be critical here as it specifies staff access rights on the organization's information system.... An information system can become susceptible to the threats due to the vulnerability of the information system that allows cyber-attacker to compromise the system's security....
8 Pages (2000 words) Essay

Intelligent Building System Vulnerabilities

The paper "Intelligent Building system vulnerabilities" is a great example of a report on information technology.... The paper "Intelligent Building system vulnerabilities" is a great example of a report on information technology.... Running head: Intelligent Building system vulnerabilities ... ntelligent Building system vulnerabilities ... he major vulnerabilities which are classified as the generic vulnerabilities of the intelligent building system include, the limited awareness of system vulnerabilities and security threats, compromising of the various networks in use, physical access of the systems parts, inadequate physical security or lack of it....
12 Pages (3000 words)
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us