Week 7 Discussions.docx - Week 7 Discussions Day 1 Why are...

This preview shows page 1 - 3 out of 5 pages.

Week 7 Discussions: Day 1 Why are information systems vulnerable to destruction, error, and abuse? What are the most common threats against information systems? Information systems is vulnerable to destruction, error, and abuse because it is one type of digital data. When you have large amounts of digital data stored in an electronic form, they are more vulnerable to many more kinds of threats than in a manual form. Currently, most data exist in different locations and that has a higher increase in potential vulnerability in unauthorized access, abuse, or even fraud. The most common treats against information system are: Unauthorized Access Errors Tapping Sniffing Message alteration Threat and fraud Radiation Hacking Malware Theft and fraud Vandalism Denial-of-service attacks Threat of data Copying data Alternation of data Hardware failure Software failure Reference: Laudon, K. C., & Laudon, J. P., (2016) . Management Information Systems: Managing the Digital Firm. Retrieved from: Day 2 What is the business value of security and control? Security, control, and electronic records management have become essential for responding to legal actions.” (Laudon & Laudonk, 2016). Currently, evidence is usually stock fraud, theft of company trade secrets, embezzlement, computer crime, and many other civil cases in a digital form. Also, many legal cases today are increasingly relying on evidence in the form of digital data stored on portable devices, CDs, and other computer hard disk drives. Other forms can also include instant messaging, e-mail, and e-commerce transactions over the Internet. Computer forensics is used heavily in today’s society since most of our communications are in a digital form. Computer forensics is the scientific collection, examination, preservation, authentication, and analysis of data
that is held on or retrieved from storage media from a computer or other sources. This data can be used as evidence in a court of law. The following problems can be: Recovering data from computers while preserving evidential integrity Securely storing and handling recovered electronic data Finding significant information in a large volume of electronic data Presenting the information to a court of law Reference: Laudon, K. C., & Laudon, J. P., (2016) . Management Information Systems: Managing the Digital Firm. Retrieved from: Day 3 What are the components of an organizational framework for security and control? “Even with the best security tools, your information systems won’t be reliable and secure unless you know how and where to deploy them. You’ll need to know where your company is at risk and what controls you must have in place to protect your information systems. You’ll also need to develop a security policy and plans for keeping your business running if your information systems aren’t operational.” (Laudon & Laudon, 2016) The following are the different components of an organizational framework for security and control:

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture