Preview

Management Information System

Good Essays
Open Document
Open Document
569 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Management Information System
Management and Information System
a) Security/threats and its issues-

Name of the company: TJX Inc.
Date of impact: December 2006
Impact of security breach: 45 million credit cards information exposed.
TJX failed to upgrade its data encryption system when the electronic eavesdropping began in July 2005. More than 45 million credit and debit cards exposed after the central database was breached. The investigation also stated that TJX had kept too much of customer’s personal information for far too long.
Key points the management should consider: -
1. The management should have considered improving their security system.
2. Should hire better personnel to upgrade the defense mechanism without being too concerned about the expense. Main reasons behind breach: -
1. Weak encryption protection technology to secure the database.
2. Storing customer information for far too long not making sure its security.
Ways to avoid these types of breaches: -
1. Multi-layered defense system which will protect the data from the moment it’s being created.
2. There must be strong encryption at the core of the database defense system. Better programmers can be hired to create the encryption and also hackers can be paid to test the system’s reliability.
3. Data should be encryption and ultimately destroyed when no longer needed. This highly reduces the risk of customer data being stolen.

b) Global Management Information System/ Risks

Name of the company: Blackberry
Date of impact: 7th October, 2013.
Impact of Global MIS failure and risk: 10m of the 70m blackberry users were affected by the incident. Reputation hampered. Stock exchange values decreased.

One of the leading smart phone companies BlackBerry suffered one of the biggest breakdowns in the history which left millions of its users unable to send or receive emails, browse internet or use instant messaging. The incident left a bad dent on the company’s reputation in comparison to its

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3350 week 1

    • 287 Words
    • 3 Pages

    9. Security controls and security countermeasures to help protect the Master SQL Database that houses customer privacy data and intellectual property assets.…

    • 287 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Data is stored in a distributed way, Data partitioned in this scheme is already implicitly secured and each packet is stored distributed in different servers, log structure is maintained to keep track of each data block. Reconstruction of the data packet makes use of the log files.…

    • 470 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Cp Case Study

    • 976 Words
    • 4 Pages

    | * Data soon became available after authentication breach * Revealed hole in ChoicePoint security system * Trust of security standards instantly lost…

    • 976 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    6. Which of the following should be considered while implementing a layered access security approach?…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IS3230 Final Exam Answers

    • 939 Words
    • 4 Pages

    6. Which of the following should be considered while implementing a layered access security approach?…

    • 939 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Unit 18 - Database P1, M1

    • 995 Words
    • 4 Pages

    Every database management system should have these feature to protect and ensure the data is safe and accuracy.…

    • 995 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    The ChoicePoint data breach occurred in 2005. This insider data breach brought to light how a company can still be vulnerable to having data stolen from its databases even without any type of hacking of their system. By not properly vetting request for new accounts and request for information led to the theft of over a hundred thousand records of people’s personal information.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The data must be kept secure against unlawful or unauthorised processing, accidental loss or erasure.…

    • 1120 Words
    • 5 Pages
    Good Essays
  • Good Essays

    1)Data protection: Ensure all information is stored in a secure place and no information is given out if unsure.…

    • 1527 Words
    • 7 Pages
    Good Essays
  • Good Essays

    MMPS is currently dealing with having their system crash frequently, with customers also losing access to email. It does cost each time when the system goes down, so it is very expensive for the business. Another issue MMPS currently have is their provider is not able to solve the current problem and does not think there is one. Before it is possible to figure out the problem, it is very important to understand what the current problem is for the constant crash and loss of email along with it. The primary task for MMPS is to find a better telecommunication network company to help with the problems and to reduce their expenses.…

    • 940 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ethics Case Study

    • 2206 Words
    • 9 Pages

    BlackBerry maker Research in Motion announced late April 19 that it has determined the apparent cause of the shutdown that stopped e-mail service to BlackBerry users throughout North America earlier in the week.…

    • 2206 Words
    • 9 Pages
    Good Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Target a large retail corporation that operates over 1,700 stores across the United States. They also operate as an online retailer at target.com. In 2012 the retailer earned more than $73 billion dollars in revenue and grew their sales by 5.1% from the previous year. Looking at the revenue and sales growth rate it is hard to fathom that more money could not be spent to ensure that consumer data is protected as much as possible. As information security specialists one of the worst things that can happen is our network gets infiltrated and customer information is stolen. On December 19, 2013 Target released a statement stating that they have had an information security breach and suggested that as much as 70 million credit card information had been stolen.…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Good Essays

    JetBlue Crisis

    • 1651 Words
    • 7 Pages

    On Valentine’s Day 2007, JetBlue decided to follow its airline policy to ensure most flights are completed and opted out to canceling flights in hopes the weather would past fast. Instead, the weather got worse, while many were stranded on flights for hours. JetBlue should have just done a massive cancelation of flights for the day rather than a case by case basis when it was too late. To determine the causes of the failure of JetBlue’s CRM system during the crisis on Valentine’s Day 2007, we first have to evaluate JetBlue’s operating system independently before the crisis took place.…

    • 1651 Words
    • 7 Pages
    Good Essays