Free Essay

Securing Information Systems

In:

Submitted By jasper1701z
Words 717
Pages 3
Securing information systems Kirill Borovskoy
Date: Tuesday 18. November Homework 2

• Explain why information systems are vulnerable to destruction, error, and abuse.

Main reason why the information systems are so vulnerable is because they are designed to be easily accessible and they do not exist in physical form per se. Digital date is stored on servers, and if anything was to happen to so called storage, the whole system goes bust.
And last but not least: any system can be a subject to a hacker attack.

• Describe the business value of security and control

When you lose data – you lose money, simple as that. Any information you have is relevant to your business, and when this information gets into wrong hands, the same hands will be chopping pieces of your profit in no time.

• Describe the components of an organizational framework for security and control

First step in developing security system would be that of assessing the risk. Establishing weak points and determining the strengths of the system is of an utmost importance. Second – a security policy needs to be developed. And finally, there always has to be a contingency plan, involving all the levels of informational infrastructure.

• Describe the tools and technologies used for safeguarding information resources.

Firewalls and Antiviruses prevent unauthorized access to private network from happening. The very basic tool of defending the privacy of information would be using passwords and other method of authentication will prevent the initial intrusion from happening.

Apple, Google and Microsoft battle for your internet experience

1. Compare the business models and areas of strength of Apple, Google and Microsoft

Apple creates it’s own exclusive platform and life style accessory. They are not even allowing the majority of google apps to run on an iOS platforms. Apple also relies heavily on the hardware part.
Google is the complete opposite. The most open platform on the market, their policy is to become available for every user and every developer.
Microsoft are mostly competing in the “big” software, meaning desktops and laptops, and unlike Google and Apple their software costs money to the consumers

2. Why is mobile computing so important to these firms? Evaluate the mobile platform offerings of each firm in comparison.

Mobile computing is so important because that’s what people are shifting towards in their day to day working and leisure activities, hence, that’s where the money is.

Apple has a closed system that only they can control and amend, but that offers consistency and stability to the consumer
Google offers open platform for everyone for much smaller price and much easily adjustable for individual needs.
Microsoft’s strategy in the mobile department is to create one solid system, that will function for both desktop computers and your phone(Surface).

3. What is the significance of mobile applications, app stores and closed vs. open app standards to the success or failure of mobile computing?

The competition today lays in the area of applications and application markets. That’s how the final consumer decides which platform to stick with. The strength of the platform nowadays is determined by the qualities of the apps you can download.

4. Which company and business model do you think will prevail in this epic struggle? Please explain your answer thoroughly including numbers to sustain your argument.

I think for a very long time it is going to be a battle between Google and Apple. Apple is 4 times more expensive then Android device of the same calculating power, but Apple has a very loyal customer base, so the prediction today would be nothing but sheer guesswork

5. What difference would it make to a business tor to an individual consumer if Apple, Google or Microsoft dominated the Internet experience? Explain your answer.

A monopoly is hardly a good thing, and the laws of economy do not change with the internet – the end customer will pay the highest price

6. With the recent announcement of IBM strongly joining forces with Apple, would that make any difference in terms of relative strength or would this not really matter in the long run. Please explain.

IBM will only help to improve the hardware part of the mobile device. As of today we have more calculating power that we can use, so this alliance is hardly a game changer

Similar Documents

Premium Essay

Business

...Information Systems and Software Application BIS/219 April 25, 2012 Abstract Information Systems and Software Application There are many types of information systems and software applications that an organization uses to run their businesses. Today, organization uses the information systems and software applications to broaden their horizons and allow their businesses to function at its full capacity. For example, human resources use the software applications to manage employees, were accounting uses the software applications to help manage the company finances and other applications that help manage the company on day-to-day operations. Every organization has a different agenda and specific duties they must perform. The information systems and software applications helps the organization to run a successful business in todays, environment and help manage every aspect of their business affairs. Also, it will help determined how well a business is doing and which direction the business is going. Business that takes the opportunity to seek investment in this type of software can help take accurate inventory of the company. Three major organizational departments that help run a company is human resources, marketing, and accounting. Human resources gather the information that relates to the employees and the company they uses the information system and software applications to help maintain the company, such as hiring, employees...

Words: 746 - Pages: 3

Premium Essay

Medicaid Management Information System

...Information system (Medicaid Management Information system) I would like to pick up MMIS (Medicaid Management Information system) as my topic today. MMIS is coupled with multiple entities like claims, provider, client, PA(Prior Authorization), TPL(Third Party Liability), DRB ( Drug Rebate) subsystems. First of all client enrolls into the state medicaid system. When the client goes to the provider, they will verify the insurance and claims to it. All this data was collected from frond end screens, paper, fax, imaging and stored in Oltp system. The data is then moved to ware house by using ETL tools like datastage, informatica etc. The same data will be used to reporting purposes by using tools like cognos, business objects etc. The components of the information system are: 1. Hardware: It is equipment that processes the data for information and it includes input, output, storage and communication devices. Typically in MMIS environment we need to figure the # of server’s needed, capacity, storage before kicking off the project. 2. Software: software is a set of instructions written in a specialised code that convert data into information. Need to decide what COTS products need to be used for the project. 3. System Policies: It governs the operation of a computer system. Set some system policies for securing the data, testing policies etc. 4. Data: Data was used by the programs to produce useful information. Data are stored in machine readable form until the computer needs...

Words: 278 - Pages: 2

Free Essay

Learning Team Collaboration Bis/220 Week 2

...Information system plays a vital role in a working environment and allows organizations to work more efficiently by increasing productivity. Information systems are essential, which helps organizations collect, store, and process data to communicate information throughout the organization. Information system is the structure in any business by knowing how to use the system will enhance my skills. My learning has increased because I know by learning the components of information systems I will always continue to apply in my personal life and in any business environment to display my skills. With new technologies arising makes a threat on security, and privacy concerns. They are many ethical issues related to information technology for example, such as the increasing collection of personal data by private and governmental agencies. In addition, this makes new systems vulnerable, and the security can be breached by hackers. Information technology can be applicable in my workplace by better securing customer’s information. In addition, providing security controls by going the extra mile to safeguard customer’s information will secure controls and help build customers confidence. My knowledge has increased because I understand security, and I know I have to take steps to protect my computer by incorporating the software to safeguard information from hackers. By using word processing tools to communicate business objectives within the business environment using word processing tools...

Words: 321 - Pages: 2

Premium Essay

Practical Applications of an Information Privacy Plan

...Winkka HRM320 Instructor Diane Moffat 9-27-2014 Abstract In this paper I will address the three questions for each of the three scenarios required by the Case Study: Practical Applications of an Information Privacy Plan which can be found in Chapter 16 of the text Human Resource Information Systems: Basics, Applications, and Future Directions, Second Edition. Keywords: case study Assignment 1 Scenario 1: Roger, a photocopier technician, has been asked to repair an office photocopier that just broke down while someone was copying a grievance matter against an employee of the agency. The officer who was copying the file takes the opportunity to grab a cup of coffee and leaves Roger in the photocopy room while the photocopier cools down. While waiting, Roger flips through the file and realizes that the person against whom the grievance was made lives on the same street as he does. 1. What information privacy principles (IPPs) have been breached? Answer: Roger breached IPP 4 (Security) and IPP 11 (Disclosure) is the privacy principles that have been breached. IPP 4 has requirements of securing and protecting files against loss, unauthorized access, use, modification, disclosure and any other misuse. IPP 11 is has the requirements of disclosing personal information. 2. How? Answer: An IPP 4 could have been breached by leaving files in areas where others could access them. IPP 11 was breached because Roger read the file and seen that the person in the grievance...

Words: 781 - Pages: 4

Premium Essay

Ict/ Strategic Management

...Decision Support System (DSS) 4 Transaction Processing System (TPS) 4 Q 3. 4 Computer Misuse Act 1990 4 Data Protection Act 1998 4 Research 5 Q 1. There are 3 levels of management: Strategic, Tactical and Operational. All 3 levels of management within the organisation require information with different characteristics to manage the company successfully and to reach the goals. Strategic management is the highest level or Top management (Chief executive, managing Directors). These level deals with organisational growth and all long-term decisions, like expansion, relocation, merger, new IT system introduction. Strategic management always rely on information of 2 other levels of management: of tactical and operational levels. Strategic management of BW is responsible for introduction of new IT systems for whole organisation, as different areas in the business have designed and implemented their own systems and there is no communication between all areas. Planning of new IT systems should involve cost/benefit analysis. Company will require market research about the customers and competitors, feedback from customers and suppliers, so the company require internal and external information. Internal: * Advantages and disadvantages of implementing a new IT system * Financial information Sources of information: * Financial reports * Profit reports External: * Types of software and hardware * Pricing to introduce IT system Sources: ...

Words: 1141 - Pages: 5

Premium Essay

Infs1602 Course Outline 2013

...Australian School of Business Information Systems, Technology and Management INFS1602 INFORMATION SYSTEMS IN BUSINESS Course Outline Semester 1, 2013 Part A: Course-Specific Information Please consult Part B for key information on ASB policies (including those on plagiarism and special consideration), student responsibilities and student support services. Table of Contents PART A: COURSE-SPECIFIC INFORMATION 1   STAFF CONTACT DETAILS 2   COURSE DETAILS 2.1   Teaching Times and Locations 2.2   Units of Credit 2.3   Summary of Course 2.4   Course Aims and Relationship to Other Courses 2.5   Student Learning Outcomes 3   LEARNING AND TEACHING ACTIVITIES 3.1   Approach to Learning and Teaching in the Course 3.2   Learning Activities and Teaching Strategies 4   ASSESSMENT 4.1   Formal Requirements 4.2   Assessment Details 4.3   Late Submission 5   COURSE RESOURCES 6   COURSE EVALUATION AND DEVELOPMENT 7   COURSE SCHEDULE 3   3   3   3   4   4   4   5   7   7   7   8   8   9   11   11   12   13   INFS1602 Information Systems in Business 2 PART A: COURSE-SPECIFIC INFORMATION 1 STAFF CONTACT DETAILS Position   Lecturer-­‐ in-­‐charge   Lecturer     Tutor-­‐in-­‐ charge   Tutor   Tutor   Tutor   Tutor   Tutor   Name   Professor  Patrick   Finnegan   Ms  Christine  Van   Toorn   Ms  Jill  Moore  ...

Words: 4600 - Pages: 19

Premium Essay

Management Information System

...Management Information Systems Course Code | CSC-490 | Course Title | Management Information Systems | Credit Hours | 03 | Prerequisites by Course(s) and Topics | | Assessment Instruments with Weights (homework, quizzes, midterms, final, programming assignments, lab work, etc.) | Quizzes | 10 % | Assignment | 20 % | Mid-Term Examination | 20 % | Final Examination | 50 % | Total | 100 % | | Instructor e-mail address (if any) | ravianz99@gmail.com | Current Catalog Description | Understanding and knowledge of use of computer-based information systems in all functional areas of business. Computer and information technology, resources, management and end-user decision making, and system development. Study and present a comprehensive case study/Assignment regarding the understanding and knowledge of the of the skills learned in the course. | Textbook (or Laboratory Manual for Laboratory Courses) | Management Information Systems-Managing Digital Firm, by Laudon, Kenneth C., and Laudon, Jane P., 12th Edition, Publisher: Pearson/Prentice Hall, 2012/13. | Reference Material...

Words: 1199 - Pages: 5

Premium Essay

Management Information Technology

...Management Information Systems Course Code | CSC-490 | Course Title | Management Information Systems | Credit Hours | 03 | Prerequisites by Course(s) and Topics | | Assessment Instruments with Weights (homework, quizzes, midterms, final, programming assignments, lab work, etc.) | Quizzes | 10 % | Assignment | 20 % | Mid-Term Examination | 20 % | Final Examination | 50 % | Total | 100 % | | Instructor e-mail address (if any) | ravianz99@gmail.com | Current Catalog Description | Understanding and knowledge of use of computer-based information systems in all functional areas of business. Computer and information technology, resources, management and end-user decision making, and system development. Study and present a comprehensive case study/Assignment regarding the understanding and knowledge of the of the skills learned in the course. | Textbook (or Laboratory Manual for Laboratory Courses) | Management Information Systems-Managing Digital Firm, by Laudon, Kenneth C., and Laudon, Jane P., 12th Edition, Publisher: Pearson/Prentice Hall, 2012/13. | Reference Material...

Words: 1199 - Pages: 5

Premium Essay

Didjdj

...Case Study for Information Management 資訊管理個案 E-commerce: Digital Markets, Digital Goods 1. Facebook, 2. Amazon vs. Walmart (Chap. 10) 1011CSIM4B10 TLMXB4B Thu 8, 9, 10 (15:10-18:00) B508 Min-Yuh Day 戴敏育 Assistant Professor 專任助理教授 Dept. of Information Management, Tamkang University 淡江大學 資訊管理學系 http://mail. tku.edu.tw/myday/ 2012-11-29 1 課程大綱 (Syllabus) 週次 日期 內容(Subject/Topics) 1 101/09/13 Introduction to Case Study for Information Management 2 101/09/20 Information Systems in Global Business: 1. UPS, 2. The National Bank of Kuwait (Chap. 1) 3 101/09/27 Global E-Business and Collaboration: NTUC Income (Chap. 2) 4 101/10/04 Information Systems, Organization, and Strategy: Soundbuzz (Chap. 3) 5 101/10/11 IT Infrastructure and Emerging Technologies: Salesforce.com (Chap. 5) 6 101/10/18 Foundations of Business Intelligence: Lego (Chap. 6) 2 課程大綱 (Syllabus) 週次 日期 內容(Subject/Topics) 7 101/10/25 Telecommunications, the Internet, and Wireless Technology: Google, Apple, and Microsoft (Chap. 7) 8 101/11/01 Securing Information System: 1. Facebook, 2. European Network and Information Security Agency (ENISA) (Chap. 8) 9 101/11/08 Midterm Report (期中報告) 10 101/11/15 期中考試週 11 101/11/22 Enterprise Application: Border States Industries Inc. (BSE) (Chap. 9) 12 101/11/29 E-commerce: 1. Facebook, 2. Amazon vs. Walmart (Chap. 10) 3 課程大綱 (Syllabus) 週次 日期 內容(Subject/Topics) 13 101/12/06 Knowledge Management: Tata Consulting Services (Chap. 11) 14 101/12/13 Enhancing Decision Making: CompStat...

Words: 1288 - Pages: 6

Free Essay

Social Engineering Attacks and Counterintelligence

...Table of Contents Ethical and Social Issues In Information System 1 Chapter one 3 Introduction to the Study 3 Context of the Problem 4 Statement of the Problem 5 Research Questions 6 Introduction 6 Research Question 6 Research Question 7 Research Question 7 Significance of the Study 8 Research Design and Methodology 9 Organization of the study 9 Literature Review 10 Introduction 10 References 14 Chapter one Introduction to the Study Ethical and social issues in information system is a combination of the benefits and disadvantages of using computer and computer related devices, social networks versus our ethics, morals and beliefs. The importance and reliability of computer in our day to day running of human life cannot be over emphasized. Social networking platforms may allow organizations to improve communication and productivity by disseminating information among different groups of employees in a more efficient manner, resulting in increased productivity. While it is not meant to be all-inclusive, there are a lot of problems faced by its usage in younger generations, businesses use, and the even medical field. The social media comes with risks as it opens up the possibility for hackers to commit fraud, launch spam and virus attacks, and also increases the risk...

Words: 3249 - Pages: 13

Free Essay

Paper

...------------------------------------------------- BUSINESS INFORMATION SYSTEMS UCB: Managing Information for Globalization and Innovation ------------------------------------------------- BUSINESS INFORMATION SYSTEMS UCB: Managing Information for Globalization and Innovation BML 106 STUDENT NUMBER: 1108282 BML 106 STUDENT NUMBER: 1108282 CONTENTS Page 2: Company Background Page 3: Question 1 Page 4: Question 1 Page 5: Question 1& 2 Page 6: Question 2 Page 7: Question 2 & 3 Page 8: Question 3 & 4 Page 9: Question 4 Page 10: Question 4 Page 11: References & Bibliography BACKGROUND OF UCB Formally as Union Chimique Belge when it began in 1928, UCB was one of the largest concerns in Belgium. Being associated with one of the oldest chemical factories in Belgium, UCB had grown by acquisition of other companies. The organisation was split into three different sectors; Chemicals, Films and Pharma with Pharma being the biggest market as they moved into two therapeutic fields; allergy and neurology. Priding itself in its flexibility and ability to adapt, UCB saw sectors such as Pharma’s sales growing by 20% with a profit margin of 28% adopting the philosophy of taking ‘speed of action’ when it came to developing new information systems across the entire organisation. The company was known for its practicality as it looked for ‘quick wins and identifiable value in everything that it did.’ 1. Use the case study...

Words: 3188 - Pages: 13

Premium Essay

It System in Banglalink

...Introduction of the Study: The present world is the world of information technology. Mobile phone is the revolutionary invention of science. This mobile has enriched our communication network. It has been possible to communicate from one corner to another by its contribution. Mobile phone is one of the important wonders of modern science. The standard of living of men has been changed by the contribution of this technology. At the beginning Telegraph was only one medium of communication. Alecgunder invented telephone in 1876. As a result, it has been possible to send the human voice to the remote. Electric sign is flown through the wire of both the telegraph and telephone. At the beginning of last century wireless was invented by Marcony which occurred revolutionary change in the communication. Consequently the necessary of adding wire by receiving & transferring not needed. In case of telephone it is set up one place which is not transferable, so problem occurs. In this situation mobile phone takes the place of telephone to overcome the problem. “Mobile Phone Service” is another name of silent revolution in Bangladesh. Mobile phone service is keeping important role in removing the digital divide. Mobile phone is contributing active role in receiving and sending information in the villages. Bangladesh enters the mobile world through the City Cell Company in 1993. In that time the cost of a connected mobile phone required more than one lack Tk for a mobile holder. Mobile...

Words: 9939 - Pages: 40

Premium Essay

Monitoring System

...Chapter 1 INTRODUCTION Many companies today use information as a basis to increase productivity, producing quality products, providing quality services, creating customer confidence, and making timely decisions. As such, information technology has become the prime reason for the success and failure of a company to compete in business. This illustrates the impact of information technology on business operations today. As a result, designing an information system of high quality is important so that organisations can compete successfully in the global market. Information systems experts need to understand the business operation of a company before they can design a comprehensive system. Every business is likely to be different. As an example, business transactions at a supermarket, bank, and hotel require information systems that are different and Unique. A systems analyst applies a technique called Business Process Modelling to Represent company operations and information requirements. A systems analyst works in an information technology based department. This person is Responsible for planning, analysing and implementing information systems. 1.1 Background of the Study Funeral homes arrange services in accordance with the wishes of surviving friends and families. The funeral home often takes care of the necessary paperwork, permits, and other details, such as making arrangements with the cemetery, and providing obituaries to the news media. ...

Words: 3357 - Pages: 14

Premium Essay

Information Technology Management

...Chapter 1 1. How are information systems transforming business and what is their relationship to globalization? E-mail, online conferencing, and cell phones have become essential tools for conducting business. Information systems are the foundation of fast-paced supply chains. The Internet allows many businesses to buy, sell, advertise, and solicit customer feedback online. Organizations are trying to become more competitive and efficient by digitally enabling their core business processes and evolving into digital firms. The Internet has stimulated globalization by dramatically reducing the costs of producing, buying, and selling goods on a global scale. New information system trends include the emerging mobile digital platform, online software as a service, and cloud computing. 2. Why are information systems so essential for running and managing a business today? Information systems are a foundation for conducting business today. In many industries, survival and the ability to achieve strategic business goals are difficult without extensive use of information technology. Businesses today use information systems to achieve six major objectives: operational excellence; new products, services, and business models; customer/ supplier intimacy; improved decision making; competitive advantage; and day-to-day survival. 3. What exactly is an information system? How does it work? What are its management, organization, and technology components? From a technical...

Words: 8338 - Pages: 34

Premium Essay

Extreme Makeover: Walmart Edition

...analytical information, and between OLTP and OLAP. Define TPS, DSS, and EIS, and explain how organizations use these types of information systems to make decisions. Understand what AI is and the four types of artificial intelligence systems used by organizations today. Describe how AI differs from TPS, DSS, and EIS. Describe the importance of business process improvement, business process reengineering, business process modelling, and business process management to an organization and how information systems can help in these areas. This chapter describes various types of business information systems found across the enterprise used to run basic business processes and used to facilitate sound and proper decision making. Using information systems to improve decision making and re-engineer business processes can significantly help organizations become more efficient and effective. ? 2.4 2.5 As a business student, you can gain valuable insight into an organization by understanding the types of information systems that exist in and across enterprises. When you understand how to use these systems to improve business processes and decision making, you can vastly improve organizational performance. After reading this chapter, you should have gained an appreciation of the various kinds of information systems employed by organizations and how you can use them to help make informed decisions and improve business processes. opening case study Information Systems Improve Business...

Words: 16302 - Pages: 66