Friday, August 23, 2019

Business information system Essay Example | Topics and Well Written Essays - 1500 words - 2

Business information system - Essay Example There are many factors that are contributing to the increasing vulnerability of organizational information assets. Given below are some of the important factors that play significant role in making the organizational assets vulnerable (Prentice Hall, 2010; KingCounty, 2009; Turban et al., 2005): Internet Vulnerabilities The research has shown that open or public networks such as the Internet are more vulnerable than internal networks for the reason that they are virtually open to everyone. Hence, when the Internet turns out to be an important part of the business network, and the most of the business tasks are supported by this network then the organization’s information arrangements also become open for attacks from outsiders. Wireless Security Challenges Wireless networks based on radio technology are also vulnerable to security penetration for the reason that radio frequency bands are easy to scan and detect for the attackers. These days Wi-Fi technology is extensively avai lable and offering great deal of support for connectivity and information sharing. However, these networks always remain the major target of attackers which can cause problems for the organizations and attacks against information system. Malicious Software: Viruses, Worms, Trojan Horses, and Spyware A malicious software program can cause a variety of threats for example worms, computer viruses and Trojan horses. These threats can cause massive destruction to organizations’ resources in the forms of theft of organizational information, personal data theft and huge danger to corporate and personal information. Hackers and Cybervandalism A hacker is a person who aims to obtain illegal access to an information system. However, in the hacking community, the term cracker is normally employed to demonstrate a hacker with criminal objectives, though in the public press, the terms cracker and hacker are employed interchangeably. These hackers can get access to an organization’s network and launch a variety of security attacks such as: (Prentice Hall, 2010; KingCounty, 2009; Turban et al., 2005): Spoofing and sniffing Denial of service attacks Identity theft Question 2: Contrast unintentional and deliberate threats to an information resource. Provide two (2) examples of both. Information systems are vulnerable and in danger due to a number of possible threats and hazards. However, there are two major types of threats known as deliberate threats and unintentional threats. Given below are acts with no malicious determination and with malicious determination (Rainer, 2009; Safari Books Online, 2013; E.Whitman, 2004): Unintentional Threats Device Loss Human errors or mistakes are the major causes of un-intentional threats that can happen due to human error or due to negligence of human. For example, a person who has lost his device, mobile or laptop which be misused by an attacker for carrying out illegal activities. Temporary Hires Temporary hires are also ma jor type of unintentional threats. In this scenario, temporary workers including contract labor, janitors, consultants, and guards can also create serious security loss for the organizations. Contract labor, for example temporary hires, can be ignored in information security policy. Though, these staff members can unintentionally access the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.