MIS 535 Information Systems Security Threats

$5.00

MIS 535 Information Systems Security Threats
MIS 535 Information Systems Security Threats Discussions 2 Week 7 All Posts 57 Pages
MIS 535 Why are information systems vulnerable to destruction, error, and abuse…

Description

MIS 535 Information Systems Security Threats

MIS 535 Information Systems Security Threats

MIS 535 Information Systems Security Threats Discussions 2 Week 7 All Posts 57 Pages

A. Information systems security threats(Section 8.1, pp.305-318)

 Why are information systems vulnerable to destruction, error, and abuse? What are the most common threats against information systems?  In addition to phishing, what are some other threats we face from malicious software, hackers, and computer crime?  Select ONE item, identify it and suggest a defense against it.

B. System vulnerability and abuse

Major corporations, governments, and other organizations are hacked each week, mostly by means of phishing attacks.
Describe how users and IT organizations should arm themselves against these attacks

What antivirus protection do you use? Are you satisfied with it? Would you recommend it?

Class, what do you use to protect yourself?  Is part of it your process for evaluating / filtering emails? Is it commercial software?  If so, will you identify it?  Would you recommend it to others?

Discuss the issue of security challenges on the Internet as that issue applies to the global enterprise. What are some of these security challenges? Also, several of you chose to pursue cloud computing technologies in your Course Project.  Did you address security in your report to management?

We’ve all read about information systems that did not work as expected.  However, most systems, especially those being built today, have an established set of controls.  Table 8-4 in our text (Laudon, 2015, p. 321) identifies six types of controls.  To your knowledge, are all implemented in your firm?

If you can separate them, which ONE would you consider most important?  Why?

What are some considerations that determine how much control is cost-effective to build into a system?…

MIS 535 Information Systems Security Threats

MIS 535 Information Systems Security Threats

MIS 535 Information Systems Security Threats Discussions 2 Week 7 All Posts 57 Pages

A. Information systems security threats(Section 8.1, pp.305-318)

 Why are information systems vulnerable to destruction, error, and abuse? What are the most common threats against information systems?  In addition to phishing, what are some other threats we face from malicious software, hackers, and computer crime?  Select ONE item, identify it and suggest a defense against it.

B. System vulnerability and abuse

Major corporations, governments, and other organizations are hacked each week, mostly by means of phishing attacks.
Describe how users and IT organizations should arm themselves against these attacks

What antivirus protection do you use? Are you satisfied with it? Would you recommend it?

Class, what do you use to protect yourself?  Is part of it your process for evaluating / filtering emails? Is it commercial software?  If so, will you identify it?  Would you recommend it to others?

Discuss the issue of security challenges on the Internet as that issue applies to the global enterprise. What are some of these security challenges? Also, several of you chose to pursue cloud computing technologies in your Course Project.  Did you address security in your report to management?

We’ve all read about information systems that did not work as expected.  However, most systems, especially those being built today, have an established set of controls.  Table 8-4 in our text (Laudon, 2015, p. 321) identifies six types of controls.  To your knowledge, are all implemented in your firm?

If you can separate them, which ONE would you consider most important?  Why?

What are some considerations that determine how much control is cost-effective to build into a system?…