Companys Business Foundation and Deliberate Threats to Information Systems - Assignment Example

Comments (0) Cite this document
The reporter answers several questions, for example, what do you see as the three biggest threats to corporate cybersecurity that CSOs should be aware of? He says that CSOs should be aware of the type of corporate threats that undermine the existence and mission of their respective business models…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful
Companys Business Foundation and Deliberate Threats to Information Systems
Read TextPreview

Extract of sample "Companys Business Foundation and Deliberate Threats to Information Systems"

Case Study
What do you see as the three biggest threats to corporate cyber security that CSOs should be aware of?
1. Company’s Business Foundation
CSOs should be aware of the type of corporate threats that undermine the existence and mission of their respective business models. The business foundation of any for profit-company is comprised of information vital to the company as it includes the strategies and products the company deploys to secure competitive advantage. In this case, two primary threats associated with the foundations of business models include Espionage or trespass and Information Extortion. These two threats to the foundation of a company are specific in threatening the company’s survival as both a sustainable entity and a competitive rival to other companies as well. In revelation of these threats, CSOs should be aware that rival companies and/or private groups can use espionage as a means to acquire the company information illegally. While the issue of espionage may be addressed as an external threat, in most cases, CSOs should be aware that internal activities exposing critical information to employees can lead to espionage. This means that through illegal acquisition of that information, employees in firms can facilitate the damaging of the business foundation of the company by selling the information to rivals.
Additionally, information extortion is another area where CSOs should be aware of when it comes to business foundation. In order to secure a company’s business foundation, the CSO should be aware that illegal access to information can lead to corporate blackmail. This process involves a hacker or a holder of sensitive information who agrees to give up information or not to disclose it for a fee. The motive of information extortion is to create value by pointing out the possible losses that would be incurred if the information was accessed by rival companies Information (Security, pp. 103-104).
2. Value of Information
CSOs must be equipped with the information regarding the value of the company data and how such information can be harmful if it was lost or accessed by unauthorized personnel. When CSOs are aware of the information value, two primary corporate cyber threats are considered. Firstly, the CSO should be aware that information loss can result from sabotage and vandalism. Although companies do not have social enemies, they have financial rivals who thrive to push as many of their competitors out of business. By damaging or rendering a company’s information database unusable, a company is unable to move on as it has to accommodate all direct losses, law suits, and possible closures (Information Security, pp. 104-105).
3. Targeted Resources
All business models have resources they make use of in order to sustain development and profitability. Following this fact, CSOs should be aware that a company’s resources differ from one user to another but can be generally fatal. In this case, 3 areas are identified as corporate cyber-attack hotspots. Firstly, since companies use software to operate, software attacks aim at finding security holes in order to execute the attacking commands. Secondly, comprise to intellectual property is another area CSOs should be aware of as laws governing certain areas are not universally enforced and may expose intangible assets such as patents. Thirdly, most publicly traded firms have shareholders as sources of capital. As a resource, shareholder or user details can be acquired maliciously and disrupting user/shareholder confidence with the company at hand. In order to protect resources, CSOs must ensure that they are aware of the types of threats potentially capable of disrupting competitive strategies of the business entity (Information Security, p. 105).
Works Cited
Information Security. Deliberate Threats to Information Systems. pp. 103-108
Works Cited Read More
Cite this document
  • APA
  • MLA
(“Companys Business Foundation and Deliberate Threats to Information Sy Assignment - 8”, n.d.)
Companys Business Foundation and Deliberate Threats to Information Sy Assignment - 8. Retrieved from
(Companys Business Foundation and Deliberate Threats to Information Sy Assignment - 8)
Companys Business Foundation and Deliberate Threats to Information Sy Assignment - 8.
“Companys Business Foundation and Deliberate Threats to Information Sy Assignment - 8”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Companys Business Foundation and Deliberate Threats to Information Systems

Business Information Systems

...that the organization possesses (Nocera, 2007, p. 9). Information Systems are important because establishing a foundation for responsible use of technology. Managing information systems stems from internetwork enterprises. Hence, the field of information systems has become critical aspects of business administration. One of the key innovations that business professionals implement is an IS Framework (Pradhan, 2010, p. 13). IS Framework is used by business professionals who need to gain competitive strategies (Pradhan, 2010, p. 14). Thus, this competitive advantage allows...
8 Pages(2000 words)Essay

Business Intelligence Information Systems

...? Business Intelligence information systems Introduction The tools and software which influence and / or enhance a business’s strategic decision making or planning process and optimize overall planning are known as a business intelligence programs. There are various business intelligence systems which aid companies to store, gather, access and evaluate important business data in order to improve decision-making powers and capabilities of a company without any bias. There are a number of different areas business intelligence systems cater to for a corporation; for example, they cater to customers support, analysis of products, product placement, marketing segmentation, cost, profitability of the products or products, distribution... of the...
3 Pages(750 words)Essay

Business Driven Information Systems

...? Business Driven Information Systems Business Driven Information Systems Porter’s 5 Forces analysis: The of La Verne Thepower of new entrants into the business is described by Porter as a threat to the competitiveness of a business (Roy, 2009). Since the University of La Verne is a private institution whose business is provision of higher education services and academic research, it is evident that the rise of higher institutions within California which offers these educational services are likely to pose a business threat. It is in this...
8 Pages(2000 words)Case Study

Business Information Systems

...their activities of the day or week and alert the administration. Transaction processing System is therefore an information system that ‘BMW’ should invest in to ensure that their operations run smoothly. With the opportunity of expanding their market already available through the exposure to the media, they should embrace the use of information systems with two hands. Timely production and delivery objective will therefore be majorly boosted and efficiency in the process of production enhanced (Stair & Reynolds 2011). The company will therefore be in a position to asure their clients of quality production and timely delivery. These...
9 Pages(2250 words)Essay

Business Information Systems

...The Fine Food Company: Presenting a Case for Business Information Systems Introduction In response to a directive from the Chief Executive Officer, Iam pleased to present a case for implementation of a suitable state-of-the-art integrated Business Information System (BIS) for the Fine Food Company (FFC). This report has been prepared after a review and analysis of the existing operating and management information sharing procedures in vogue in the company in light of the recent advancements in Information and Communication Technology (ICT) applications...
6 Pages(1500 words)Essay

Business-accounting information systems

...All businesses need to have specific financial data about the operation of the company. A sound financial system provides management with the information they need to make decisions such as inventory purchase reorder points, analysis of costs, determination of profitability of the company and the value of the company. Stakeholders such as lenders require financial statements of a company before they extend any credit to a business. Accounting is the discipline that allows businesspeople to keep track of the inputs and outputs of a company within a systemic system that has been around for several thousands of years (Anders). The purpose of this report is to provide a company with an inadequate accounting system the basic elements... of an...
6 Pages(1500 words)Essay

Information Systems in Business

...enabled mobile phone or IPad (Dibb & Simkin 2008). These promotional websites will encourage customers to share stories on how they were able to make savings through these coupons. Since all the big companies are offering discount coupons, the war game hosting business will make its sales surge by introducing such voucher codes. Business analysis There are a number of weaknesses and threats associated with a war game hosting business. Air soft games are a fun activity enjoyed by many people but the dangers accompanying the games are numerous (Polman 2010). Furthermore, air soft games are expensive and consequently the capital required for this...
8 Pages(2000 words)Coursework

Information Systems in Business

...INFORMATION SYSTEMS IN BUSINESS Number: Lecturer: Question 3 (i) Wal-Mart is one of the leading retail stores in the world that has relatively high number of users. A data warehouse for this company would probably be the largest data warehouse given the size of the company. The company requires transactional and operational data such as forecast data, sales, inventory, payroll, cost and accounting (Paul, 2001). Additionally, they will need industry sales, macro-economic data and Meta data. This data can be sourced by capturing point of sale transactions from the over 2900 stores in six countries. They can also source data from the suppliers who supply their products and services. Other data such a s population and demographic data... ...
5 Pages(1250 words)Coursework

Business Information Systems decisions, so that effective decisions can be made in accordance with business and market requirements. Decision support system is an approach based on which information is accumulated and disseminated through computerized system. In this context, decision support system is helpful for managers to select more than one solution for a problem. The integration of decision support system in an organisation is effective for retrieving as well as dissemination of information in different departments of an organisation (Nizeti & et. al., n.d.). In this regard, the essay intends to explain about the importance as well as...
8 Pages(2000 words)Essay

Business Information Systems

...Management, Supply Chain Management and Customer relationship management system that will enable the company formulate and enhance an effective information system within the business. This paper finds out Enterprise System as an information strategy to find solutions for the challenges. Enterprise System According to Laudon and Laudon (2006), enterprise system is s strategic information System that integrates internal business processes of a firm into single information architecture. This business...
16 Pages(4000 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Companys Business Foundation and Deliberate Threats to Information Systems for FREE!

Contact Us