Importance of Information System and Security in Organizations
Verified
Added on 2023/06/08
|6
|989
|407
AI Summary
This report focuses on the importance of information system and security in any kinds of organization. It discusses the issues related to the information security, critical evaluation of all relevant issues, and recommendations to resolve them.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INFORMATION SYSTEM AND SECURITY Information System and Security Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 INFORMATION SYSTEM AND SECURITY Table of Contents Introduction................................................................................................................................2 Issues and Problems...................................................................................................................2 Critical evaluation of all relevant issues....................................................................................2 Recommendations......................................................................................................................3 Conclusion..................................................................................................................................4
2 INFORMATION SYSTEM AND SECURITY Introduction The primary determination of this report is to focus on the importance of information system and security in any kinds of organization. The extensive development in the field of science and technology has many benefits and issues as well as it questions the integrity of the organization. This report will be focusing on the issues related to the information security. Issues and Problems In any business enterprises, both internal and external stakeholders work together in an integrated way which is the main reasons behind the need for a secure and efficient management technique regarding the informationsecurity (Crossleret al. 2013). Thesecurity measures will be help in restricting the unauthorized access to the private networks of the organization. The disclosure of the agreements is maintained by the security measures. The application of the security measure will also help in decreasing different type of disruptions in an organization and also helps the organization to modify their rules and regulations according to therequirements (Dotcenko, Vladyko and Letenko 2014). Theinformation assets of any company can be maintained with the help of specific information security measures. Critical evaluation of all relevant issues The extensive use of the information systems made our life much easier. The problem regarding the information system are the illegals activities such as data breach and data alteration. These issues are common when data are stored in the cloud servers as well as in private servers. The efficiency and productivity of the organization is maintained if their vital
3 INFORMATION SYSTEM AND SECURITY data can be stored and retrieved in an efficientway (Encket al. 2014).These unethical activities can have a huge impact on the organization who heavily relies on the Information system to accomplish their daily activities. The threats related to the information security such as hardware failure, software failure, user errors, telecommunication problems and server issues are the most common issues in every organizations. Spamming and Jamming are the latest crimes related to the information security of the global corporations, effective steps are necessary for mitigating those issues. The use of malicious software by the cyber criminals are the other issues of informationsecurity (Von Solms and Van Nieker 2013).All these issues infect the entire network system and make it inoperable disabling most of the applications, it destroys or alters the crucial data and cause huge loss to the organization. The operating system gets affects by these issues and often it is found the database of the organization is undersized during those issues. The other issue associated with the injection of a virus named as “code red” which are injected by hackers slows down the performance of the system in an organization. The other importantthreatsofinformationsecurityarethesniffingwhichgivesaccesstothe unauthorized users in a private network and spoofing in which a spoofer uses personal information such as credit card number, residential address, birthdates and social security number for personal benefits. Identity theft is also a significant issue in most business enterprises where illegal users gain access to stolen electronic records by the process known as Conning. Recommendations All the issues need to be resolved in an effective way so that these issues do not cause any problem in the future. The security policies provided by the internet service providers
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 INFORMATION SYSTEM AND SECURITY need to be incorporated into the systems. The practice anti-spam law should be encouraged more so that the criminals are aware of the consequences of their unethical activity(Yang, Shieh and Tzen, 2013). The default firewall and the anti-virus programs installedin the systems should be updated so that it can restrict the activities for the malicious software. Conclusion From the above report, it can be concluded that every organization who uses internet facility faces different types of issues related to the information security and system. This report thus focuses on the resolving techniques regarding these issues.
5 INFORMATION SYSTEM AND SECURITY Reference Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M. and Baskerville, R., 2013.Futuredirectionsforbehavioralinformationsecurityresearch.computers& security,32, pp.90-101. Dotcenko, S., Vladyko, A. and Letenko, I., 2014, February. A fuzzy logic-based information securitymanagementforsoftware-definednetworks.InAdvancedCommunication Technology (ICACT), 2014 16th International Conference on(pp. 167-171). IEEE Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P. and Sheth, A.N., 2014. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones.ACM Transactions on Computer Systems (TOCS),32(2), p.5. VonSolms,R.andVanNiekerk,J.,2013.Frominformationsecuritytocyber security.computers & security,38, pp.97-102. Yang,Y.P.O.,Shieh,H.M.andTzeng,G.H.,2013.AVIKORtechniquebasedon DEMATELandANPforinformationsecurityriskcontrolassessment.Information Sciences,232, pp.482-500.