logo

Information System Strategy Assignment

12 Pages3119 Words435 Views
   

Added on  2019-09-21

About This Document

This assignment covers the priority of threats, social media strategies for organizations like Westpac Bank, Coca Cola Amatil, Domino’s Pizza, JB Hi-Fi, AV Jennings, and Tabcorp Holdings, creating new business models, co-creating with customers, green IT, and change management in IT.

Information System Strategy Assignment

   Added on 2019-09-21

ShareRelated Documents
Information System StrategyAssignmentNameSubmitted toDate
Information System Strategy Assignment_1
Information System StrategyTable of ContentsQuestion A.......................................................................................................................................2Question B.......................................................................................................................................4Question C.......................................................................................................................................7Question D.......................................................................................................................................9Question E.......................................................................................................................................9References......................................................................................................................................101
Information System Strategy Assignment_2
Information System StrategyQuestion AThe following threats have been mentioned as per the priority:1.Cloud services: The organizations have been highly dependent on the cloud services. The cybercriminals have been seeking ways to exploit corporate security policies for protecting cloud services. The cloud services have been providing immense risk of data being disclosed deliberately or accidentally. The hosting companies have a greater ease of control over the private data and information and can even communicate between the end user and access his user data even without his permission. Therefore this threat has tobe placed at the highest priority. Additionally, the cloud providers have the authority to the share information with any of the third parties even without any warrant. All these activities poses privacy concerns as the data can be access on the cloud anywhere and anytime where the information can be deleted, or even altered. All these activities have further left a room for potential unwanted disclosure of data and information on the cloud. Thus using cloud services in an organization poses a threat to exploitation and stealing of confidential data by their competitors, cybercriminals and vigilante justice seekers (Shaikh, F. B., & Haider, S., 2011).2.Attacks through employee systems: As the companies are issues various policies and procedures in order to improve their security systems and are even implementing latest security technologies, a direct attack has become difficult on the business networks. Therefore, the attackers are shifting their focus on the home and public networks of the employees as their only pathways into the confidential information related to business. Due to the fact that the home systems of the employees’ will be relatively less insecure, the attackers are more likely to access the corporate networks using their systems. A new 2
Information System Strategy Assignment_3
Information System Strategyresearch study has stated that out of various ways of infiltrating an enterprise the biggest weakness of any organizations are their employees themselves. Additionally, a survey was conducted by the YouGov for QA, where it was revealed that there is a gap between the employee’s personal and office like as a quarter of surveys presented that work files are being transferred from office to home, posing more security threats to the organization (Lawrence, J., 2013). Therefore, it has been placed in the second position.3.Integrity Attacks: The integrity attacks of the system and data of the companies are one of the most significant attacks these days. The transaction or the data gets modified or even seized in the perpetrator’s favor. These attacks are highly difficult to defend and even detect provided the critical data and its pervasiveness. The attacks are although subtle most of the times, these can devastating to the organization being victimized. If notcontrolled, the cyber criminals will begin to mount data integrity attacks-either for committing fraud on commercial parties’ like corrupting an important data or information, granting rights or quotas which will be placed in breach of legislation as well as regulations. Due to the discrete and selective nature of the attacks, it is very difficult to prevent, detect or correct them. Therefore, a tremendous amount of victim angst and loss have been seen in such cases, placing the cyber threat on the third position in my priority list. (Giani, A. et. Al, 2011)4.Wearable: All the wearable devices are seen to store personal information of their wearable which can easily be targeted by the cyber attackers who can compromise their smartphones and use the information. The wearable are not presenting risks towards the physical health but with tracking and storing of data in their proprietary software, there are high chances of privacy issues and data breaches. And the most interesting thing 3
Information System Strategy Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information System Strategy Assignment
|11
|2857
|441

Data Breach
|4
|786
|33

Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274

IS Security and Risk Management Assignment PDF
|10
|3410
|84

Advanced System and Network Security | Assignment
|18
|4395
|360

Host and Application Security
|9
|1653
|308