Preview

Week 7 Research Paper Sun

Better Essays
Open Document
Open Document
1241 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 7 Research Paper Sun
Information System Security in Business
Tiffin University
Dr. Millar
Jun Sun

Information System Security in Business
Introduction
Information technology is not only the trend of world economic and social development, but also is the key of enterprises upgrade traditional industries and accelerate the information construction. Today 's small and medium-size companies, as well as large enterprises, widely used in information technology, especially network technology. The development of information systems continuously improve the competitiveness of enterprises. Enterprise information systems to improve business efficiency, but also to all kinds of enterprises to increase the risk of hidden benefits. All types of commercial enterprise network security-related reports have been emerging, systemic risk issues, and network security issues become increasingly serious. This paper will analyze and propose countermeasures in business information systems, network security risk.
Information security risk analysis
1. The system hardware environment risks
“Hardware is the physical embodiment of an information system. It is one of the main elements which creates the information system cycle” (n. d.). Operational of business information systems depends on the particular hardware environment, such as various types of databases and web servers, LAN, INTERNET, bank POS terminals, etc. These environments rely on a large number of hardware devices that have a failure rate. When failure occurs, it will inevitably affect the normal operation of information systems. Failure often occurs mainly in electrical machinery and other aspects of hard faults. These failures of hardware are more frequent.
2. The software environment risks
After the commercial implementation of enterprise information, systems running various operating systems like database engines, finance and other applications, all kinds of network protocols and communications software. As a software



References: Dai, W. (2012). Risk Management Model of Information Security in IC Manufacturing Industry. Retrieved from https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&ved=0CC8QFjAC&url=http://ojs.academypublisher.com/index.php/jcp/article/download/jcp0702317324/4317&ei=aYKEVID3L5ObyATbjIDADw&usg=AFQjCNGl1jrsgGsbVg4siDRHPHGtLBJtAw Introduction to Information Systems, (n. d.) Retrieved from http://oum.edu.my/oum/v3/download/CBAD2103.pdf M.A. Badamas, (2001),"Mobile computer systems - security considerations", Information Management & Computer Security, Vol. 9 Iss: 3 pp. 134 – 136 Paquet, C. (2014). Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=6 Peggy, C. E., Sohail, C. S., & Ronald, R. (2011). DEVELOPING A MODEL FOR ENTERPRISE INFORMATION SYSTEMS SECURITY. Journal of Academic Research In Economics, 3(3), 243-254.

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1210 Chapter 1

    • 4800 Words
    • 20 Pages

    CHAPTER 1 INFORMATION TECHNOLOGY1.0 Introduction Information technology (IT) is the design, development, implementation, support, and management of computer hardware and software applications. An IT professional is knowledgeable about computer systems and operating systems. This chapter will review IT certifications and the components of a basic personal computer system.After completing this chapter, you will meet these objectives: * Explain IT industry certifications. * Describe a computer system. * Identify the names, purposes, and characteristics of cases and power supplies. * Identify the names, purposes, and characteristics of internal components. * Identify the names, purposes, and characteristics of ports and cables. * Identify…

    • 4800 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    describe the necessity of secure architecture in information systems analyze the role of security models and architectures and their relationship to information security explain the…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Good Essays

    The Genre: You’re familiar with the book and movie reviews that appear in newspapers, magazines, and websites. They are just one kind of evaluative writing, but from them we can identify the key components of the genre. First, there is the object to be evaluated. Often this is a single thing—a music CD, a scholarly study, a corporation—but it can also be an idea or process: the impact of a particular band on rock history, the importance of a new trend in scholarly opinion, or the management practices used by a particular sector of industry. Second, there are the criteria…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Class I worked with a community college network a few years ago and it was almost fun to watch. No matter how much bandwidth they purchased, the students would use it all. They could not get educational traffic to work because there was too much competition from students gaming and streaming audio and video. Ultimately they purchased some expensive bandwidth management equipment to give priority to certain traffic. The problem was not really security, but rather, controlling usage.…

    • 1177 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Best Essays

    Information Security Policy

    • 3396 Words
    • 14 Pages

    References: Merkow, Mark & Breithaupt, Jim. (2006). Information Security: Principles and Practices. Published by Prentice Hall. Retrieved August 19, 2011…

    • 3396 Words
    • 14 Pages
    Best Essays
  • Good Essays

    Soc Week 4 Paper

    • 924 Words
    • 4 Pages

    In this paper I will be discussing the article “Study of delinquent, diverted, and high-risk adolescent girls: Implications for mental health intervention”. I will start by giving a brief summary of the article I have chosen. Followed by discussing the type of article this is and my conclusion I have drawn form the information found in this article. Lastly I will discuss how this article fits into our sociology class as well as how this article differs from non-scholarly periodicals…

    • 924 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Week 5 Research Paper

    • 1014 Words
    • 3 Pages

    I have been through so many experiences with sales representatives but as well as everyone else in the world who buys goods or services from someone else. You meet different kind of salespeople anywhere where you go. They’re motives can be because they are working on commission meaning their paycheck is reflected on the amount of product or service they sell or they are just trying to be as helpful to you as possible because they like what they do. For whatever, reason it may be the goal is always to find and sell what the consumer wants. I have worked in retail in the past selling coffee for people. I did not have any experience in selling prior to the coffee shop job but the job teaches you how to sell their product. So, I have an idea how the sales representatives are going to be like and the basic structure, which brings me to one of my memorable experiences with a sales representative. I was looking for a present for my girlfriend for our anniversary. I know already that she likes this one particular brand so I went to that store. The usual greeting the moment I got in the store, “Hello, please let us know if there is anything we could help you in.” I looked around the store and stopped at their jewelry case. I have been standing there for about five minutes before a sales representative came up to me. She asked if there was anything she can help me with. I told her why I was there. The sales representative started to ask me a couple of follow up questions such as the time of the anniversary, whether my girlfriend like silver or gold, and the clothes she wears. After, answering all her questions she showed me a couple of necklaces and rings as an idea for a present. I liked all of them but I told her none of those feel right to get. Then, she asked me my feelings towards a particular product and it from there she brought out watches and bracelets. From those questions that was asked from me she pinpointed what I was looking for before…

    • 1014 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 5 Paper

    • 803 Words
    • 4 Pages

    Climate change; the gradual shift in weather patterns throughout the planet attributed to the use of fossil fuels used by humanity to make life more convenient and comfortable. People have been the stewards of the planet for roughly 200,000 years of which, the past 150 years would be classified as America’s peak industrialization, but this is a global issue and many nations have only recently begun their foray into industrialization, like China, India, Dubai, Saudi Arabia, Iran, etc.…

    • 803 Words
    • 4 Pages
    Good Essays
  • Good Essays

    My doctoral study topic focuses on internet security for businesses. Internet security is a broad topic that involves a multitude of theories, beliefs, recommendations, and guidelines. My article selections detailed a synopsis of the government’s responsibility and the end users obligation to internet security. In addition, the annotated bibliographies give the reader a summarization of the article through it 's main focal points. The two articles below are for my doctoral study.…

    • 380 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Week 5 Paper

    • 616 Words
    • 3 Pages

    During our final chapter, we discussed the four stages of the learning cycle. The four stages of transformational learning are as follows: recognizing a significant problem, confronting it intensely, finding a solution, then integrating a new perspective and a new set of assumptions into ones’ life pattern. I think that a lot of times people go through life not realizing when they have a problem. Therefore, acknowledging your problem is most definitely the first step in learning from it. When you realize that there is a problem, you must confront the problem head on to find a solution. Once you have found a solution, you need to incorporate it into your life. These four stages are important in any learning experience.…

    • 616 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Scope: Access control is the process of determining which users are allowed to perform what operations on which objects in a computer system. Healthcare information systems contain sensitive information about patients that is vital in the treatment process. Procedure:…

    • 458 Words
    • 2 Pages
    Good Essays