Friday, April 19, 2019
Business information system Essay Example | Topics and Well Written Essays - 1500 words - 2
Business information system - shew ExampleThere are many factors that are contributing to the increasing vulnerability of placemental information assets. Given to a lower place are some of the important factors that play significant role in qualification the organizational assets vulnerable (Prentice Hall, 2010 KingCounty, 2009 Turban et al., 2005) earnings Vulnerabilities The research has shown that open or public networks such as the Internet are more vulnerable than internal networks for the reason that they are virtually open to everyone. Hence, when the Internet turns out to be an important part of the business network, and the most of the business tasks are supported by this network then the organizations information arrangements also become open for attacks from outsiders. Wireless earnest Challenges Wireless networks based on radio technology are also vulnerable to security brainstorm for the reason that radio frequency bands are easy to scan and detect for the attacke rs. These days Wi-Fi technology is extensively available and offering great deal of support for connectivity and information sharing. However, these networks always remain the major signal of attackers which can cause problems for the organizations and attacks against information system. Malicious Software Viruses, Worms, Trojan Horses, and Spyware A malicious software computer program can cause a variety of threats for example worms, computer viruses and Trojan horses. These threats can cause commodious destruction to organizations resources in the forms of theft of organizational information, personal data theft and huge danger to corporate and personal information. Hackers and Cybervandalism A hacker is a person who aims to obtain illegal access to an information system. However, in the hacking community, the term cracker is normally employed to demonstrate a hacker with criminal objectives, though in the public press, the terms cracker and hacker are employed interchangeably . These hackers can get access to an organizations network and launch a variety of security attacks such as (Prentice Hall, 2010 KingCounty, 2009 Turban et al., 2005) Spoofing and sniffing defence reaction of service attacks Identity theft Question 2 Contrast unintentional and deliberate threats to an information resource. offer two (2) examples of both. Information systems are vulnerable and in danger due to a number of viable threats and hazards. However, there are two major graphemes of threats known as deliberate threats and unintentional threats. Given below are acts with no malicious determination and with malicious determination (Rainer, 2009 Safari Books Online, 2013 E.Whitman, 2004) Unintentional Threats Device button Human errors or mistakes are the major causes of un-intentional threats that can happen due to human error or due to negligence of human. For example, a person who has lost his device, mobile or laptop which be misapply by an attacker for carrying out ill egal activities. Temporary Hires Temporary hires are also major type of unintentional threats. In this scenario, temporary workers including contract labor, janitors, consultants, and guards can also create serious security pass for the organizations. Contract labor, for example temporary hires, can be ignored in information security policy. Though, these ply members can unintentionally access the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment