logo

Information Systems of Apple Inc

11 Pages2566 Words165 Views
   

Added on  2023-06-05

About This Document

This research report focuses on the information systems that are being utilized by Apple Inc. The report concentrates on the lists of assets of Apple Inc. that is vulnerable to destruction, abuse, error, and system quality issues. It also discusses the risk management techniques adopted by Apple Inc. for ensuring availability, reliability, confidentiality, security of the digital business processes, and integrity. The report evaluates the risk management including risk identification, risk assessment, and risk control for Apple Inc. followed by the Illustration and identification of the general management controls and application controls for Apple Inc. The report concentrates on the audit plan and processes of Apple Inc and the impact of human factors on risk management and security.

Information Systems of Apple Inc

   Added on 2023-06-05

ShareRelated Documents
Running head: INFORMATION SYSTEMS OF APPLE INC
1
Information Systems of Apple Inc
Name of the Student
Name of the Instructor
Course Code
Date
Information Systems of Apple Inc_1
INFORMATION SYSTEM OF APPLE INC 2
1.0 Introduction
Any kind of successful business organizations tries to implement both small and large
sized technologies for managing their overall business activities followed by the act of making
business decisions. These kinds of organizations mostly utilize information systems for
collecting as well as processing data based on the requirements of the managers, business
owners, and analyst. It can be seen that the business processes are getting operated more
effectively with the utilization of varied information systems for interacting with the partners and
customers thereby generating revenues and curtailing costs. Information systems have managed
to acquire the importance of processing any kind of data from the organizational inputs thereby
generating information which are worthy of managing the overall operations of the organization.
Primarily, the research concentrates on the information systems that are being utilized by
Apple Inc. The research concentrates on the lists of assets of Apple Inc. that is vulnerable to
destruction, abuse, error, and system quality issues. The report then focuses on risk management
techniques adopted by Apple Inc. for ensuring availability, reliability, confidentiality, security of
the digital business processes, and integrity. The discussion then continues with the evaluation of
the risk management including risk identification, risk assessment, and risk control for Apple
Inc. followed by the Illustration and identification of the general management controls and
application controls for Apple Inc. The report concentrates on the audit plan and processes of
Apple Inc and the impact of human factors on risk management and security. Finally, the report
ends with a conclusion.
Information Systems of Apple Inc_2
INFORMATION SYSTEM OF APPLE INC 3
2.0 Lists of assets of Apple Inc. that is vulnerable to destruction, abuse, error,
and system quality issues
According to the research, it has been identified that there are various kinds of assets
belonging to Apple Inc. which are vulnerable to destruction, abuse, error, and system quality
issues (Mogensen 2018). The list of assets of Apple Inc. that are vulnerable to destruction, abuse,
error, and system quality issues includes international operation risks, inventory risks,
competition risks, market risks, economic uncertainties, and raw material risks. The threats that
are related to the information system of Apple Inc. include unauthorized access, theft, computer
viruses, denial of service attacks, identity theft and data theft (Laudon and Laudon, 2016).
The most important kind of security risks related to the computer information systems is
any kind of unauthorized access towards the confidential data. The primary aim of the hackers is
to break the security of the computers that are being manufactured by Apple Inc. thereby
affecting the information system as a whole. Moreover, it can be seen that the loss of crucial
data, software and hardware results in affecting the effectiveness of Apple Inc. The information
systems of Apple Inc are also getting affected due to the computer viruses which enter into the
computer without informing or providing knowledge to the user regarding the duplicity. The
primary aim of the denial of service attacks is to hamper the targeted network thereby allowing
the network to deny the service which is being operated by the legitimate users (Zaidi et al.
2016).
Apple Inc. is also vulnerable to identity theft which is regarded as the stealing of personal
information that includes credit card numbers driving licenses numbers and various kinds of
personal related information. Finally, it can be said that Apple Inc. is also one able to detect
Information Systems of Apple Inc_3
INFORMATION SYSTEM OF APPLE INC 4
which happens due to the copying of important files without hampering the original copy and
this information is being used for getting the access of the system of victims (Carroll 2014).
3.0 Risk management techniques adopted by Apple Inc. for ensuring
availability, reliability, confidentiality, security of the digital business
processes, and integrity
For bring the technology and increasing the competition in the field of the technology
industry it is necessary for Apple Inc. to initiate their plan of enterprise risk management
Answering the availability, reliability, confidentiality, security of the digital business processes,
and integrity. Implementation of the enterprise resource management is becoming an innovative
trend within the marketplace and several competitors of Apple Inc. are starting to develop their
own risk management plan for competing with Apple Inc. Thus, it is quite crucial for Apple Inc.
to introduce their own risk management plan for getting a leading position (Dryden et al. 2016).
4.0 Evaluation of the risk management including risk identification, risk
assessment, and risk control for Apple Inc.
During the research, it has been found that the enterprise risk management allows Apple
Inc. to analyze any kinds of risk followed by the impacts of those risks that are been identified.
The implementation of the action plan for Apple Inc. is going to manage the identified risk in an
effective manner with the allocation of available resources thereby reinforcing the decisions
towards risk response for reducing the operational losses (Doorley and Garcia, 2015). Having the
enterprise risk management within the organization will help in developing a risk awareness
culture followed by the sharing of standard and common objectives regarding the risk
Information Systems of Apple Inc_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Essay on Network Management in Organization
|7
|1286
|32

Sample Assignment on IS Security
|5
|1001
|31

Fundamental Concepts of Digital Security and Security Mechanisms in a Digitally Networked Environment
|9
|1488
|52

Host and Application Security
|9
|1653
|308

Professional Skills In Information Communication Technology: Cyber Security
|20
|6717
|27

Explanation of Meltdown and Spectre Vulnerabilities
|11
|3042
|21