StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Considering the Threats and Vulnerabilities of Information Systems: A Plan for Improvements - Coursework Example

Comments (0) Cite this document
Summary
"Considering the Threats and Vulnerabilities of Information Systems: A Plan for Improvements" paper purposes actions that include: enhancements to the hiring and promotion processes, implementing a contingency in job appointments, enhancing the sustainability of basic technology…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Considering the Threats and Vulnerabilities of Information Systems: A Plan for Improvements
Read TextPreview

Extract of sample "Considering the Threats and Vulnerabilities of Information Systems: A Plan for Improvements"

Download file to see previous pages Current considerations should be examined to further scrutinize the consequential effects of internal and external threats. To combat internal and external threats and guard information systems, proposed actions include the following: enhancements to the hiring and promotion processes, implementing a contingency in job appointments, enhancing the sustainability of basic technology.

The interconnectivity of FLPD's Information Systems Unit provides secured information with added convenience. Interconnectivity of the system allows immediate responses to inquiries and eliminates lag time possible from manual efforts to retrieve information (flpd.org). When an emergency call is entered into the Computer Aided Dispatch System (CAD), the CAD instantly checks other databases supported by the ISU and instantly relays dependable and pertinent information. Thus, the efficiency of the ISU aids FLPD's Public Safety Communications Center in its quick responses to the emergency needs of its citizens.

Without effective or secured informational systems, however, emergency operations may lack proficiency in their efforts to respond to citizens' needs. Time is a critical element of rescue efforts. Mishandled minutes or seconds may result in delayed responses, deaths, or even a crisis. One purpose of FLPD's Public Safety Communications Center's information systems is to decrease the opportunity of danger by retrieving dependable information for the purpose of responding to the emergency needs of citizens.
Not only does the ISU support FLPD's locally operating system, but it is also linked to databases that harbor critical information for other areas. For example, the ISU's informational contribution to Florida Crime Information Center Systems adds pertinent information to The National Crime Information Center Systems (SafirRosetti, 2006). Jeopardy FLPD's centralized information system renders extremely vulnerable.

Information systems act as the nucleus of interconnectivity and efficient communication (ISACA). The absence of interconnected systems that work properly disturbs emergency operations. Thus, guarding FLPD's Information Services Division is imperative and requires the implementation of new policies and procedures that begin with the hiring process.

Enhancing the Hiring Process

The Fort Lauderdale Police Department (FLPD) recognizes the serious role of staff working in the Information Services Division, as it reports that "all personnel is mission-critical" (SafirRosetti, 2006, p. 44). Thus, all staff members must be thoroughly screened and periodically evaluated. The police department assesses the credibility of candidates for employment through background checks, a series of interviews, tests, and extensive training (ci.ftlaud.fl.us/jobs).

For applicants seeking positions within FLPD, the hiring process may seem strenuous or in-depth. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Considering the Threats and Vulnerabilities of Information Systems: A Coursework, n.d.)
Considering the Threats and Vulnerabilities of Information Systems: A Coursework. https://studentshare.org/management/1500950-considering-the-threats-and-vulnerabilities-of-information-systems-a-plan-for-improvements
(Considering the Threats and Vulnerabilities of Information Systems: A Coursework)
Considering the Threats and Vulnerabilities of Information Systems: A Coursework. https://studentshare.org/management/1500950-considering-the-threats-and-vulnerabilities-of-information-systems-a-plan-for-improvements.
“Considering the Threats and Vulnerabilities of Information Systems: A Coursework”. https://studentshare.org/management/1500950-considering-the-threats-and-vulnerabilities-of-information-systems-a-plan-for-improvements.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Considering the Threats and Vulnerabilities of Information Systems: A Plan for Improvements

Effects of Human Resource Systems on Manufacturing Performance and Turnover

Most of these developments, not surprisingly, have come from communities of scholars focusing on their own particular countries or regions, be it the US (for example, Arthur, 1994; Delery and Doty, 1996; Huselid et al., 1997), the UK (for example, Brewster, 1999; Guest et al., 2003), elsewhere in Europe (for example, D’Arcimoles, 1997; Lahteenmaki et al., 1998; Roderiguez and Ventura, 2003). The difference in perspective on the value of people in organizations and the validity of HRM, particularly in non-Western Countries may be best understood in terms of the concept of locus of human value (Jackson et al., 2003). Jackson et al. (2003) came up with a conceptual map of international organization and human resource management...
12 Pages(3000 words)Essay

Marketing Research Plan: Old Navy

Gap’s credit ratings thereby limiting access to the capital market, international trade matters which may be disruptive of the supply chain, changes to its IT systems disruptive of operations, changes in the IT services agreement with IBM that can disrupt operations and produce adverse effects on financial results, international expansion through franchising and other arrangements may impair the value of its brands if unsuccessful, products are subject to risks associated with overseas outsourcing and manufacturing, and failure of vendors to adhere to Gap’s code of vendor conduct could harm the business. From available data in the 2007 Annual Report, both the Gap and Old Navy brands have exhibited declining net sales....
11 Pages(2750 words)Business Plan

Evandale's Business Plan

Evandale’s mission would have a strong impact on the company’s later brand development.
When a company determines its mission and its vision, it needed to determine its objectives to accomplish that vision. I did not see the objectives—where the company was heading through in the presentation. A clear objective would have enabled me, as an audience to also picture where the company would want to go and would serve as the benchmark for me to assess the later strategic choices the company would state in the presentation.
According to the slides, the potential demand for caviar and the sturgeon products are “100x” bigger than the current supply. I would have wanted to see a reliable source for...
7 Pages(1750 words)Case Study

Info-Point: Marketing of New Touch Screen Information Technology

The development of the new Info-Point technology, a stand-alone information module designed to offer the public information on tourism, local shopping, weather, and transportation, has created the opportunity to successfully market these information technologies to different UK cities. The entire marketing concept is to establish self-service information centers that offer a wide variety of regional information, utilizing an easy-to-use touch screen methodology to cater to a broad mass market of consumers. 

Touch screen interface systems are becoming more and more common in the UK and abroad. During a pilot experiment using touch screen information technology, the automotive manufacturer Lexus piloted an informatio...
10 Pages(2500 words)Report

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

Accounting systems and Assurance

The allocation of resources is dependent on the information regarding the financial condition of the firm. Here comes the role of accounting, which provides all the required financial information to the investors through several financial reports. There There are two classifications of accounting 1) financial accounting and 2) management accounting. Financial accounting is the one which furnishes all the financial information to the investors and management accounting is used at the micro-level where the internal allocation of the funds takes place. Accounting is one of the most crucial components of any organization as it provides all those financial information that is used to make the economic and financing decision making.&nbs...
9 Pages(2250 words)Coursework

Business Information Systems

...Club IT - Part Three of Phoenix BIS 219 Introduction to Business Information Systems Club IT – Part Three _________ _________ DATE ________ Table of Contents Table of Contents 2 Abstract 3 Overview 3 Business background 4 Current Technology Structure of Club IT 5 Problem Assessment 5 Club IT Business Goal and Strategy 6 Assessment of Needs 7 IT Solutions for Club IT 8 Decision Support Systems/ DSS 8 Customer Information System 8 Data Mining for Business Performance 9 Enterprise Resource Planning 10 Supply Chain Management 11 Customer Relationship Management 11 Conclusion 11 Bibliography 12 Abstract Club IT is a nightclub that is currently operating with the traditional technology structure. Club IT nightclub is most popular club in its...
8 Pages(2000 words)Case Study

Business Plan Real Estate Agency

re representing our company as their business consultants and our responsibilities are limited to the knowledge of the client’s business and information provided by the client.
The company Of-Fit has been operating as office supplies and equipment supplier since 1998. Their corporate office is in Aberdeen and it has excellent industry relations. The company is a sole proprietorship and its owner is Mr. Andrew Schwatz who has been working in the industry for more than 20 years. The company current staff is 8 and its revenues are £115,690 and £156,178 in 2008. The company aims to expand its operations in other business areas and regions of the UK.
The detailed business plan developed for this report incor...
12 Pages(3000 words)Business Plan

Global Employee Information and Consultation: Replicating the European Model

... be able to cater to wider range of issues. With this mechanism, employees will be able to ask for information from transnational corporations in a fair and unimpeded manner, avoiding the usual scenario where the employer discloses information when he wants and how he wants it to be revealed. A legislative approach will be much more beneficial since it will have mandatory effect on nation-states. If the arrangement is transposed at a national level, transnational companies will be compelled to submit to the system—avoiding resistance or noncooperation on the part of the management. In this regard, it is important to consider the fact that there is “no real concept of employee involvement in transnational context” because the current...
9 Pages(2250 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Considering the Threats and Vulnerabilities of Information Systems: A Plan for Improvements for FREE!

Contact Us