Tiffin University
Dr. Millar
Jun Sun
Information System Security in Business
Introduction
Information technology is not only the trend of world economic and social development, but also is the key of enterprises upgrade traditional industries and accelerate the information construction. Today 's small and medium-size companies, as well as large enterprises, widely used in information technology, especially network technology. The development of information systems continuously improve the competitiveness of enterprises. Enterprise information systems to improve business efficiency, but also to all kinds of enterprises to increase the risk of hidden benefits. All types of commercial enterprise network security-related reports have been emerging, systemic risk issues, and network security issues become increasingly serious. This paper will analyze and propose countermeasures in business information systems, network security risk.
Information security risk analysis
1. The system hardware environment risks
“Hardware is the physical embodiment of an information system. It is one of the main elements which creates the information system cycle” (n. d.). Operational of business information systems depends on the particular hardware environment, such as various types of databases and web servers, LAN, INTERNET, bank POS terminals, etc. These environments rely on a large number of hardware devices that have a failure rate. When failure occurs, it will inevitably affect the normal operation of information systems. Failure often occurs mainly in electrical machinery and other aspects of hard faults. These failures of hardware are more frequent.
2. The software environment risks
After the commercial implementation of enterprise information, systems running various operating systems like database engines, finance and other applications, all kinds of network protocols and communications software. As a software
References: Dai, W. (2012). Risk Management Model of Information Security in IC Manufacturing Industry. Retrieved from https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&ved=0CC8QFjAC&url=http://ojs.academypublisher.com/index.php/jcp/article/download/jcp0702317324/4317&ei=aYKEVID3L5ObyATbjIDADw&usg=AFQjCNGl1jrsgGsbVg4siDRHPHGtLBJtAw Introduction to Information Systems, (n. d.) Retrieved from http://oum.edu.my/oum/v3/download/CBAD2103.pdf M.A. Badamas, (2001),"Mobile computer systems - security considerations", Information Management & Computer Security, Vol. 9 Iss: 3 pp. 134 – 136 Paquet, C. (2014). Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=6 Peggy, C. E., Sohail, C. S., & Ronald, R. (2011). DEVELOPING A MODEL FOR ENTERPRISE INFORMATION SYSTEMS SECURITY. Journal of Academic Research In Economics, 3(3), 243-254.