Information System Strategy.

Added on - 21 Sep 2019

  • 12

    Pages

  • 3119

    Words

  • 201

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 4 of 12 pages
Information System StrategyAssignmentNameSubmitted toDate
Information System StrategyTable of ContentsQuestion A.......................................................................................................................................2Question B.......................................................................................................................................4Question C.......................................................................................................................................7Question D.......................................................................................................................................9Question E.......................................................................................................................................9References......................................................................................................................................101
Information System StrategyQuestion AThe following threats have been mentioned as per the priority:1.Cloud services:The organizations have been highly dependent on the cloud services.The cybercriminals have been seeking ways to exploit corporate security policies forprotecting cloud services. The cloud services have been providing immense risk of databeing disclosed deliberately or accidentally. The hosting companies have a greater easeof control over the private data and information and can even communicate between theend user and access his user data even without his permission. Therefore this threat has tobe placed at the highest priority. Additionally, the cloud providers have the authority tothe share information with any of the third parties even without any warrant. All theseactivities poses privacy concerns as the data can be access on the cloud anywhere andanytime where the information can be deleted, or even altered. All these activities havefurther left a room for potential unwanted disclosure of data and information on thecloud. Thus using cloud services in an organization poses a threat to exploitation andstealing of confidential data by theircompetitors, cybercriminals and vigilante justiceseekers (Shaikh, F. B., & Haider, S., 2011).2.Attacks through employee systems:As the companies are issues various policies andprocedures in order to improve their security systems and are even implementing latestsecurity technologies, a direct attack has become difficult on the business networks.Therefore, the attackers are shifting their focus on the home and public networks of theemployees as their only pathways into the confidential information related to business.Due to the fact that the home systems of the employees’ will be relatively less insecure,the attackers are more likely to access the corporate networks using their systems. A new2
Information System Strategyresearch study has stated that out of various ways of infiltrating an enterprise the biggestweakness of any organizations are their employees themselves. Additionally, a surveywas conducted by the YouGov for QA, where it was revealed that there is a gap betweenthe employee’s personal and office like as a quarter of surveys presented that work filesare being transferred from office to home, posing more security threats to theorganization (Lawrence, J., 2013). Therefore, it has been placed in the second position.3.Integrity Attacks:The integrity attacks of the system and data of the companies are oneof the most significant attacks these days. The transaction or the data gets modified oreven seized in the perpetrator’s favor. These attacks are highly difficult to defend andeven detect provided the critical data and its pervasiveness. The attacks are althoughsubtle most of the times, these can devastating to the organization being victimized. If notcontrolled, the cyber criminals will begin to mount data integrity attacks-either forcommitting fraud on commercial parties’ like corrupting an important data orinformation, granting rights or quotas which will be placed in breach of legislation aswell as regulations. Due to the discrete and selective nature of the attacks, it is verydifficult to prevent, detect or correct them. Therefore, a tremendous amount of victimangst and loss have been seen in such cases, placing the cyber threat on the third positionin my priority list.(Giani, A. et. Al, 2011)4.Wearable:All the wearable devices are seen to store personal information of theirwearable which can easily be targeted by the cyber attackers who can compromise theirsmartphones and use the information. The wearable are not presenting risks towards thephysical health but with tracking and storing of data in their proprietary software, thereare high chances of privacy issues and data breaches. And the most interesting thing3
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document