logo

Developing Corporate IT Structure

   

Added on  2019-09-21

11 Pages2857 Words441 Views
Business DevelopmentFinance
 | 
 | 
 | 
Information System StrategyAssignmentNameSubmitted toDate
Developing Corporate IT Structure_1

Information System StrategyTable of ContentsQuestion A.......................................................................................................................................2Question B.......................................................................................................................................4Question C.......................................................................................................................................7Question D.......................................................................................................................................9Question E.......................................................................................................................................9References......................................................................................................................................101
Developing Corporate IT Structure_2

Information System StrategyQuestion AThe following threats have been mentioned as per the priority:1.Cloud services: The organizations have been highly dependent on the cloud services. The cybercriminals have been seeking ways to exploit corporate security policies for protecting cloud services. The cloud services have been providing immense risk of data being disclosed deliberately or accidentally. The hosting companies have a greater ease of control over the private data and information and can even communicate between the end user and access his user data even without his permission. Therefore this threat has tobe placed at the highest priority. Additionally, the cloud providers have the authority to the share information with any of the third parties even without any warrant. All these activities poses privacy concerns as the data can be access on the cloud anywhere and anytime where the information can be deleted, or even altered. All these activities have further left a room for potential unwanted disclosure of data and information on the cloud. Thus using cloud services in an organization poses a threat to exploitation and stealing of confidential data by their competitors, cybercriminals and vigilante justice seekers (Shaikh, F. B., & Haider, S., 2011).2.Attacks through employee systems: As the companies are issues various policies and procedures in order to improve their security systems and are even implementing latest security technologies, a direct attack has become difficult on the business networks. Therefore, the attackers are shifting their focus on the home and public networks of the employees as their only pathways into the confidential information related to business. Due to the fact that the home systems of the employees’ will be relatively less insecure, the attackers are more likely to access the corporate networks using their systems. A new 2
Developing Corporate IT Structure_3

Information System Strategyresearch study has stated that out of various ways of infiltrating an enterprise the biggest weakness of any organizations are their employees themselves. Additionally, a survey was conducted by the YouGov for QA, where it was revealed that there is a gap between the employee’s personal and office like as a quarter of surveys presented that work files are being transferred from office to home, posing more security threats to the organization (Lawrence, J., 2013). Therefore, it has been placed in the second position.3.Integrity Attacks: The integrity attacks of the system and data of the companies are one of the most significant attacks these days. The transaction or the data gets modified or even seized in the perpetrator’s favor. These attacks are highly difficult to defend and even detect provided the critical data and its pervasiveness. The attacks are although subtle most of the times, these can devastating to the organization being victimized. If notcontrolled, the cyber criminals will begin to mount data integrity attacks-either for committing fraud on commercial parties’ like corrupting an important data or information, granting rights or quotas which will be placed in breach of legislation as well as regulations. Due to the discrete and selective nature of the attacks, it is very difficult to prevent, detect or correct them. Therefore, a tremendous amount of victim angst and loss have been seen in such cases, placing the cyber threat on the third position in my priority list. (Giani, A. et. Al, 2011)4.Wearable: All the wearable devices are seen to store personal information of their wearable which can easily be targeted by the cyber attackers who can compromise their smartphones and use the information. The wearable are not presenting risks towards the physical health but with tracking and storing of data in their proprietary software, there are high chances of privacy issues and data breaches. And the most interesting thing 3
Developing Corporate IT Structure_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Strategies for Creating Sustainable Business Models through IT Infrastructure
|12
|3119
|435

Data Breach
|4
|786
|33

Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274

IT Security Management Program for a Shipping Agency Database
|13
|1987
|279

IS Security and Risk Management Assignment PDF
|10
|3410
|84

Advanced System and Network Security | Assignment
|18
|4395
|360