Information System and Security: Analyzing Problems and Solutions

Verified

Added on  2023/06/08

|6
|989
|407
Report
AI Summary
This report focuses on the importance of information system security within organizations, highlighting issues stemming from technological advancements. It addresses problems such as data breaches, data alteration, and threats like hardware/software failures, user errors, and malicious software. The report emphasizes the need for secure and efficient management techniques to restrict unauthorized access and maintain data integrity. It evaluates the impact of these issues on organizational efficiency and productivity, particularly concerning cloud and private server storage. Specific threats like spamming, jamming, and viruses such as 'code red' are discussed, along with identity theft and spoofing. The report concludes by recommending the incorporation of internet service provider security policies, enforcement of anti-spam laws, and regular updates to firewalls and anti-virus programs to mitigate these security challenges.
Document Page
Running head: INFORMATION SYSTEM AND SECURITY
Information System and Security
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
INFORMATION SYSTEM AND SECURITY
Table of Contents
Introduction................................................................................................................................2
Issues and Problems...................................................................................................................2
Critical evaluation of all relevant issues....................................................................................2
Recommendations......................................................................................................................3
Conclusion..................................................................................................................................4
Document Page
2
INFORMATION SYSTEM AND SECURITY
Introduction
The primary determination of this report is to focus on the importance of information
system and security in any kinds of organization. The extensive development in the field of
science and technology has many benefits and issues as well as it questions the integrity of
the organization. This report will be focusing on the issues related to the information security.
Issues and Problems
In any business enterprises, both internal and external stakeholders work together in
an integrated way which is the main reasons behind the need for a secure and efficient
management technique regarding the information security (Crossler et al. 2013). The security
measures will be help in restricting the unauthorized access to the private networks of the
organization. The disclosure of the agreements is maintained by the security measures. The
application of the security measure will also help in decreasing different type of disruptions
in an organization and also helps the organization to modify their rules and regulations
according to the requirements (Dotcenko, Vladyko and Letenko 2014). The information
assets of any company can be maintained with the help of specific information security
measures.
Critical evaluation of all relevant issues
The extensive use of the information systems made our life much easier. The problem
regarding the information system are the illegals activities such as data breach and data
alteration. These issues are common when data are stored in the cloud servers as well as in
private servers. The efficiency and productivity of the organization is maintained if their vital
Document Page
3
INFORMATION SYSTEM AND SECURITY
data can be stored and retrieved in an efficient way (Enck et al. 2014). These unethical
activities can have a huge impact on the organization who heavily relies on the Information
system to accomplish their daily activities. The threats related to the information security
such as hardware failure, software failure, user errors, telecommunication problems and
server issues are the most common issues in every organizations. Spamming and Jamming
are the latest crimes related to the information security of the global corporations, effective
steps are necessary for mitigating those issues. The use of malicious software by the cyber
criminals are the other issues of information security (Von Solms and Van Nieker 2013). All
these issues infect the entire network system and make it inoperable disabling most of the
applications, it destroys or alters the crucial data and cause huge loss to the organization. The
operating system gets affects by these issues and often it is found the database of the
organization is undersized during those issues.
The other issue associated with the injection of a virus named as “code red” which are
injected by hackers slows down the performance of the system in an organization. The other
important threats of information security are the sniffing which gives access to the
unauthorized users in a private network and spoofing in which a spoofer uses personal
information such as credit card number, residential address, birthdates and social security
number for personal benefits. Identity theft is also a significant issue in most business
enterprises where illegal users gain access to stolen electronic records by the process known
as Conning.
Recommendations
All the issues need to be resolved in an effective way so that these issues do not cause
any problem in the future. The security policies provided by the internet service providers
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
INFORMATION SYSTEM AND SECURITY
need to be incorporated into the systems. The practice anti-spam law should be encouraged
more so that the criminals are aware of the consequences of their unethical activity (Yang,
Shieh and Tzen, 2013). The default firewall and the anti-virus programs installed in the
systems should be updated so that it can restrict the activities for the malicious software.
Conclusion
From the above report, it can be concluded that every organization who uses internet
facility faces different types of issues related to the information security and system. This
report thus focuses on the resolving techniques regarding these issues.
Document Page
5
INFORMATION SYSTEM AND SECURITY
Reference
Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M. and Baskerville, R.,
2013. Future directions for behavioral information security research. computers &
security, 32, pp.90-101.
Dotcenko, S., Vladyko, A. and Letenko, I., 2014, February. A fuzzy logic-based information
security management for software-defined networks. In Advanced Communication
Technology (ICACT), 2014 16th International Conference on(pp. 167-171). IEEE
Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P.
and Sheth, A.N., 2014. TaintDroid: an information-flow tracking system for realtime privacy
monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2), p.5.
Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber
security. computers & security, 38, pp.97-102.
Yang, Y.P.O., Shieh, H.M. and Tzeng, G.H., 2013. A VIKOR technique based on
DEMATEL and ANP for information security risk control assessment. Information
Sciences, 232, pp.482-500.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]