A Report on Apple Inc.'s Information Systems and Risk Management

Verified

Added on  2023/06/05

|11
|2566
|165
Report
AI Summary
This report provides a detailed analysis of Apple Inc.'s information systems and risk management practices. It identifies various assets vulnerable to destruction, abuse, error, and system quality issues, including international operation risks, inventory risks, and cyber threats like unauthorized access and computer viruses. The report evaluates Apple's risk management techniques, focusing on risk identification, assessment, and control, emphasizing the importance of enterprise risk management for maintaining availability, reliability, confidentiality, security, and integrity. It also illustrates general management controls and application controls necessary for minimizing disasters and security breaches. Furthermore, the audit plan and processes, including PESTLE, SWOT, and Porter's Five Forces analysis, are examined to understand Apple's competitive position. The impact of human factors on risk management and security is also considered, highlighting the differences in assessing risks for machines and people. The report concludes by underscoring the need for Apple Inc. to continually refine its risk management strategies to protect its assets and maintain its competitive edge.
Document Page
Running head: INFORMATION SYSTEMS OF APPLE INC
1
Information Systems of Apple Inc
Name of the Student
Name of the Instructor
Course Code
Date
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INFORMATION SYSTEM OF APPLE INC 2
1.0 Introduction
Any kind of successful business organizations tries to implement both small and large
sized technologies for managing their overall business activities followed by the act of making
business decisions. These kinds of organizations mostly utilize information systems for
collecting as well as processing data based on the requirements of the managers, business
owners, and analyst. It can be seen that the business processes are getting operated more
effectively with the utilization of varied information systems for interacting with the partners and
customers thereby generating revenues and curtailing costs. Information systems have managed
to acquire the importance of processing any kind of data from the organizational inputs thereby
generating information which are worthy of managing the overall operations of the organization.
Primarily, the research concentrates on the information systems that are being utilized by
Apple Inc. The research concentrates on the lists of assets of Apple Inc. that is vulnerable to
destruction, abuse, error, and system quality issues. The report then focuses on risk management
techniques adopted by Apple Inc. for ensuring availability, reliability, confidentiality, security of
the digital business processes, and integrity. The discussion then continues with the evaluation of
the risk management including risk identification, risk assessment, and risk control for Apple
Inc. followed by the Illustration and identification of the general management controls and
application controls for Apple Inc. The report concentrates on the audit plan and processes of
Apple Inc and the impact of human factors on risk management and security. Finally, the report
ends with a conclusion.
Document Page
INFORMATION SYSTEM OF APPLE INC 3
2.0 Lists of assets of Apple Inc. that is vulnerable to destruction, abuse, error,
and system quality issues
According to the research, it has been identified that there are various kinds of assets
belonging to Apple Inc. which are vulnerable to destruction, abuse, error, and system quality
issues (Mogensen 2018). The list of assets of Apple Inc. that are vulnerable to destruction, abuse,
error, and system quality issues includes international operation risks, inventory risks,
competition risks, market risks, economic uncertainties, and raw material risks. The threats that
are related to the information system of Apple Inc. include unauthorized access, theft, computer
viruses, denial of service attacks, identity theft and data theft (Laudon and Laudon, 2016).
The most important kind of security risks related to the computer information systems is
any kind of unauthorized access towards the confidential data. The primary aim of the hackers is
to break the security of the computers that are being manufactured by Apple Inc. thereby
affecting the information system as a whole. Moreover, it can be seen that the loss of crucial
data, software and hardware results in affecting the effectiveness of Apple Inc. The information
systems of Apple Inc are also getting affected due to the computer viruses which enter into the
computer without informing or providing knowledge to the user regarding the duplicity. The
primary aim of the denial of service attacks is to hamper the targeted network thereby allowing
the network to deny the service which is being operated by the legitimate users (Zaidi et al.
2016).
Apple Inc. is also vulnerable to identity theft which is regarded as the stealing of personal
information that includes credit card numbers driving licenses numbers and various kinds of
personal related information. Finally, it can be said that Apple Inc. is also one able to detect
Document Page
INFORMATION SYSTEM OF APPLE INC 4
which happens due to the copying of important files without hampering the original copy and
this information is being used for getting the access of the system of victims (Carroll 2014).
3.0 Risk management techniques adopted by Apple Inc. for ensuring
availability, reliability, confidentiality, security of the digital business
processes, and integrity
For bring the technology and increasing the competition in the field of the technology
industry it is necessary for Apple Inc. to initiate their plan of enterprise risk management
Answering the availability, reliability, confidentiality, security of the digital business processes,
and integrity. Implementation of the enterprise resource management is becoming an innovative
trend within the marketplace and several competitors of Apple Inc. are starting to develop their
own risk management plan for competing with Apple Inc. Thus, it is quite crucial for Apple Inc.
to introduce their own risk management plan for getting a leading position (Dryden et al. 2016).
4.0 Evaluation of the risk management including risk identification, risk
assessment, and risk control for Apple Inc.
During the research, it has been found that the enterprise risk management allows Apple
Inc. to analyze any kinds of risk followed by the impacts of those risks that are been identified.
The implementation of the action plan for Apple Inc. is going to manage the identified risk in an
effective manner with the allocation of available resources thereby reinforcing the decisions
towards risk response for reducing the operational losses (Doorley and Garcia, 2015). Having the
enterprise risk management within the organization will help in developing a risk awareness
culture followed by the sharing of standard and common objectives regarding the risk
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INFORMATION SYSTEM OF APPLE INC 5
management. It is quite necessary to develop the enterprise risk management followed by
evaluation of that enterprise risk management plan within all the levels of the organization that
can be recognized by all the persons working within the organization (Fong, Wheeler and
Henninger, 2016).
5.0 Illustration and identification of the general management controls and
application controls for Apple Inc.
For minimizing the disasters, error, beaches of security, and computer crime it is
necessary for Apple Inc. to design and implement information systems. The blend of manual and
robotized estimates that protect data frameworks furthermore, guarantee that they perform as per
administration gauges is named controls. Controls comprise of the considerable number of
strategies, arrangements, and authoritative methods that guarantee the security of the
association's advantages, the exactness and unwavering quality of its bookkeeping records,
what's more, operational adherence to administration gauges (Gharabally 2015). Before, the
control of data frameworks was dealt with as an idea in retrospect, tended to just toward the
finish of usage, just before the framework was introduced. Today, associations are so basically
subject to data frameworks that vulnerabilities also, control issues must be recognized as right on
time as would be prudent (Zibouh, Dalli and Drissi, 2016). The control of a data framework must
be a vital piece of its plan. Clients and developers of frameworks must give careful consideration
to controls all through the framework's life expectancy. In the research, it has been found that the
computer system is being controlled by the addition of both general controls and application
controls.
Document Page
INFORMATION SYSTEM OF APPLE INC 6
Thus, it can be said that Apple Inc. needs to introduce both the general controls and
application controls for controlling their computer systems. General controls are considered to be
those which helps in controlling the plan, security, and utilization of PC programs and the
security of information records when all is said in done all through the association. All in all,
general controls apply to all modernized applications and comprise of a mix of framework
programming and manual strategies that make a general control condition (Susanto and
Almunawar, 2018). Application controls are particular controls one of a kind to each automated
application, for example, finance, records of sales, and request handling. They comprise of the
two controls connected from the client utilitarian region of a specific framework and from
modified systems.
6.0 Audit plan and processes of Apple Inc
The audit plan for Apple Inc. consists of various kinds of analysis including PESTLE
analysis SWOT analysis, Porter five forces analysis, and STP analysis. All this analysis helps in
understanding the overview of Apple Inc. thereby helping to understand the position of the
organization in comparison with the other competitors (Laudon and Laudon, 2016). It likewise
causes us to comprehend the explanation for the aggressive edge and the motivation behind why
Apple Inc. appreciates an exceptional cost. With the Porters Model, we could decide the powers
that follow up on Apple Inc. from various merchants, providers, markets, client, and so forth and
how does Apple Inc. support them (Singh, Jeong, and Park, 2016).
After the advertising audit, we have proposed an administration improvement of a current
administration that is the cloud-based mobiles and workstations. This would be an administration
Document Page
INFORMATION SYSTEM OF APPLE INC 7
at first, yet later even the equipment identified with it should be presented and they would go as
an inseparable unit (Salisbury, Ferratt, and Wynn, 2015).
7.0 Impact of human factors on risk management and security
In the research, it has been found that the risk management is the way toward estimating
or evaluating danger and after those creating methodologies to deal with the hazard. The
procedures utilized incorporate exchanging the hazard to another gathering, evading the hazard,
lessening the negative impact of the hazard, and tolerating a few or the majority of the results of
a specific hazard (Sharma et al. 2017). Customary hazard administration centers on dangers
coming from physical or lawful causes. It doesn't make a difference the sort of hazard
administration; every single expansive organization has chance administration groups. Both the
machines and people are liable to mistakes and impact the nature of an item. The way hazard is
evaluated for machines and people is altogether different. Mechanized procedures - done by
machines - are presented to a couple of outer impacts, which are known and can be controlled. A
machine conveys factual information (Schell and Haggerty, 2015).
8.0 Conclusion
After the analysis of the overall research, it can be concluded that any kind of successful
business organizations tries to implement both small and large sized technologies for managing
their overall business activities followed by the act of making business decisions. The list of
assets of Apple Inc. that are vulnerable to destruction, abuse, error, and system quality issues
includes international operation risks, inventory risks, competition risks, market risks, economic
uncertainties, and raw material risks. Moreover, it has been found that implementation of the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INFORMATION SYSTEM OF APPLE INC 8
enterprise resource management is becoming an innovative trend within the marketplace and
several competitors of Apple Inc. are starting to develop their own risk management plan for
competing with Apple Inc. For minimizing the disasters, error, beaches of security, and
computer crime it is necessary for Apple Inc. to design and implement information systems. The
audit plan for Apple Inc. consists of various kinds of analysis including PESTLE analysis SWOT
analysis, Porter five forces analysis, and STP analysis.
Document Page
INFORMATION SYSTEM OF APPLE INC 9
9.0 References
Carroll, J.M., 2014. Computer security. Butterworth-Heinemann.
Curts, R.J. and Campbell, D.E., 2015. Cybersecurity requires a clear systems engineering
approach as a basis for its cyberstrategy. Cybersecurity policies and strategies for cyberwarfare
prevention (pp. 102-120). IGI Global.
Doorley, J. and Garcia, H.F., 2015. Reputation management: The key to successful public
relations and corporate communication. Routledge.
Dryden, J., Grammich, C., Mele, J., Nelson, W., Orrie, R., Shontz, D. and Szafran, A., 2016,
April. Issues With Access to Acquisition Data and Information in the Department of Defense:
Doing Data Right in Weapon System Acquisition. In Thirteenth Annual Acquisition Research
Symposium. Naval Postgraduate School.
Fong, E.K.H., Wheeler, D.A. and Henninger, A.E., 2016. State-of-the-Art Resources (SOAR) for
Software Vulnerability Detection, Test, and Evaluation 2016.
Gharabally, S., Apple Inc, 2015. Devices with profile-based operating mode controls. U.S.
Patent 9,183,534.
Laudon, K.C., and Laudon, J.P., 2016. Management information system. Pearson Education
India.
Laudon, K.C., and Laudon, J.P., 2016. Management information system. Pearson Education
India.
Document Page
INFORMATION SYSTEM OF APPLE INC 10
Mogensen, B.G., 2018. Managing Corporate Legitimacy Through CSR Reporting: A Qualitative
Case Study of Apple Inc.’s Supplier Responsibility Reports (Master's thesis).
Salisbury, W.D., Ferratt, T.W. and Wynn, D.E., 2015. Assessing the Emphasis on Information
Security in the Systems Analysis and Design Course. Communications of the Association for
Information Systems, 36(18).
Schell, S.V. and Haggerty, D.T., Apple Inc, 2015. Management systems for multiple access
control entities. U.S. Patent 9,100,810.
Sharma, P.K., Kaushik, P.S., Agarwal, P., Jain, P., Agarwal, S. and Dixit, K., 2017, October.
Issues and challenges of data security in a cloud computing environment. In Ubiquitous
Computing, Electronics and Mobile Communication Conference (UEMCON), 2017 IEEE 8th
Annual (pp. 560-566). IEEE.
Singh, S., Jeong, Y.S. and Park, J.H., 2016. A survey on cloud computing security: Issues,
threats, and solutions. Journal of Network and Computer Applications, 75, pp.200-222.
Susanto, H. and Almunawar, M.N., 2018. Information Security Management Systems: A Novel
Framework and Software as a Tool for Compliance with Information Security Standard. CRC
Press.
Zaidi, S.F.A., Shah, M.A., Kamran, M., Javaid, Q. and Zhang, S., 2016. A survey on security for
a smartphone device. International journal of advanced computer science and applications, 7(4),
pp.206-219.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INFORMATION SYSTEM OF APPLE INC 11
Zibouh, O., Dalli, A. and Drissi, H., 2016. CLOUD COMPUTING SECURITY THROUGH
PARALLELIZING FULLY HOMOMORPHIC ENCRYPTION APPLIED TO MULTI-CLOUD
APPROACH. Journal of Theoretical & Applied Information Technology, 87(2).
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]