100%(1)1 out of 1 people found this document helpful
This preview shows page 1 - 3 out of 5 pages.
Week 7 Discussions:Day 1Why are information systems vulnerable to destruction, error, and abuse? What are the most common threats against information systems?Information systems is vulnerable to destruction, error, and abuse because it is one type of digital data. When you have large amounts of digital data stored in an electronic form, they are more vulnerable to many more kinds of threats than in a manual form. Currently, most data exist in different locations and that has a higher increase in potential vulnerability in unauthorized access, abuse, or even fraud. The most common treats against information system are:Unauthorized AccessErrorsTappingSniffingMessage alterationThreat and fraudRadiationHackingMalwareTheft and fraudVandalismDenial-of-service attacksThreat of dataCopying dataAlternation of dataHardware failureSoftware failureReference:Laudon, K. C., & Laudon, J. P., (2016) . Management Information Systems: Managing the Digital Firm. Retrieved from: Day 2What is the business value of security and control?“Security, control, and electronic records management have become essential for responding to legal actions.” (Laudon & Laudonk, 2016). Currently, evidence is usually stock fraud, theft of company trade secrets, embezzlement, computer crime, and many other civil cases in a digital form. Also, many legal cases today are increasingly relying on evidence in the form of digital data stored on portable devices, CDs, and other computerhard disk drives. Other forms can also include instant messaging, e-mail, and e-commerce transactions over theInternet. Computer forensics is used heavily in today’s society since most of our communications are in a digital form. Computer forensics is the scientific collection, examination, preservation, authentication, and analysis of data
that is held on or retrieved from storage media from a computer or other sources. This data can be used as evidence in a court of law. The following problems can be:Recovering data from computers while preserving evidential integritySecurely storing and handling recovered electronic dataFinding significant information in a large volume of electronic dataPresenting the information to a court of lawReference:Laudon, K. C., & Laudon, J. P., (2016) . Management Information Systems: Managing the Digital Firm. Retrieved from: Day 3What are the components of an organizational framework for security and control?“Even with the best security tools, your information systems won’t be reliable and secure unless you know how and where to deploy them. You’ll need to know where your company is at risk and what controls you must havein place to protect your information systems. You’ll also need to develop a security policy and plans for keepingyour business running if your information systems aren’t operational.” (Laudon & Laudon, 2016)The following are the different components of an organizational framework for security and control: