Preview

Mis Assignment

Satisfactory Essays
Open Document
Open Document
465 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mis Assignment
Kingdom of Saudi Arabia | | المملكة العربية السعودية | Royal Commission at Yanbu | | الهيئة الملكية ينبع | University College – Yanbu (Women's Campus) | | الكلية الجامعية-ينبع )حرم البنين( | Yanbu Al-Sinaiyah | | ينبع الصناعية |

Essentials of Management Information System (MIS-203) Semester 2012 Total Marks | Marks Obtained | 10 | | Name: _______sara_hadi_mujally_ __________ Section: __1___ Student ID | 1 | 0 | 1 | 2 | 0 | 0 | 7 | 8 |

ASSIGNMENT 2 |

* Discuss the following Sentence: 1. Security isn’t simply a technology issue, it’s a business issue.

The use of technology can be seen in both security issues and business issues.
Businesses today, as always, must consider what amount of technology can be used in maintaining security for a company, government, family or individual.
Whether the technology used for security is a lock, a motion sensor, or a camera the choices made are usually related with the value of what is being secured and the amount of resources available for allocation to security. security is also critical to ensure that integrity of organization's data is maintained and confidential information about clients or customers is not leaked, thereby ensuring the privacy of customers ,In making the choices it would unfair to categorize the decisions as either wholly a technology issue or wholly a business issue anymore than the choices regarding accounting might be categorized as either wholly a technology issue or wholly a business issue.

________________________________________________________________________________

2. It has been said that within the next few years, smart phones will become the single most important digital device we own.

1 - A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone A smartphone can be considered as a Personal Pocket Computer (PPC) with mobile phone functions, because

You May Also Find These Documents Helpful

  • Good Essays

    I would like to start off by saying that there are various threats when discussing about computer security the word threat would mean something that can indicate a danger when in relation to computer security. In this task I will be showing the Malicious damage, counterfeit goods, (software/hardware) human errors, phishing and hacking, theft of equipment, threats related to e – commerce and technical failure.…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Having the proper security measures is very critical when running a business. It can be very expensive for an organization to keep an updated security system but in the end, it is well worth the money. No manager should want to even take the risk of letting hackers or viruses into the organizations information system. To fully understand why it is critical to have security measures, you first need to understand the different threats a network can face. Having a good secure network can prevent things such as malware, social engineering attacks, spam, and phishing. All of these can be very dangerous and damaging to your network. As a manager it is also very important to have a thorough security policy that states the precautions and also the steps to take in case of a security breach. When choosing security controls for your business you must consider three things; what security controls does your business need to safeguard the information systems, the safety and protection that security controls should provide, and existing security controls and how they have been implemented.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Assignment 209 NVQ 2

    • 272 Words
    • 2 Pages

    Aii. Explain why it is important to have secure systems for recording and storing information in a…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It is important to have secure systems in place in respect of information handling in order to…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    internal and external users to whom access to the organization’s network, data or other sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    Describe how an organization can properly manage its information security efforts using proper risk management techniques and cost-benefit analyses for these information security efforts.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Bananas

    • 344 Words
    • 2 Pages

    Based on the following information, assess where and when cryptography is needed within a typical IT infrastructure to be in compliance with policies and laws.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Why: Management should define the policies for the reason to use the Internet, how to use the Internet, responsibilities of the person online, and consequences for in appropriate use. This will allow the IS department to take measures to ensure security over the Web, while still allowing for successful business to be conducted.…

    • 545 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    For instance, most cell phones are now smartphones that combine features of personal computing and a mobile, handheld device. One can now access the internet from the phone with a touch of the hand. Most family members presently have smartphones for better access.…

    • 679 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Annotated Bib

    • 335 Words
    • 2 Pages

    This article discusses statistics associated with smart phone users. The number of smart phone users is expected to increase to at least one billion within the next year. Dufau explains how the use of smart phones will continue to revolutionize.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sensitive Items

    • 798 Words
    • 4 Pages

    It is very important to secure all your sensitive equipment and items, and maintain accountability. The reason simply is to keep very important high cost…

    • 798 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    As an organization grows so must the security, and it has to be on the top of the list. When considering what type of security to choose, either proprietary or contact, they need to look at the value of the organization? This value within the organization will need some sort of protection to deter theft, vandalism, and destruction. The boardroom conversation could to from, “We have nice stuff” to “How are we going to protect it.” Leadership will need to decide how they will handle the issue of protecting their items that the business owns. In the process we will need to look at the pros and cons of both proprietary and contract security. Both of them have very big advantages associated with them but most of the time only one meets the needs of the organization. We have established that the organization has nice stuff, they need to protect it, we assume they have the month to support either option and they have a choice to make. This issues come down to management, and cost. One option provides for maximum control whereas the other does not allow for much control. The costs are different also. One option there is a set cost, but it could be high and other option the cost could depend upon the capabilities of the office and how many people are hired for the organization. We have defined the problem and lay out the possible options. We will explore the outcomes, their advantages, and their disadvantages. It comes down to what the right fit for the organization. Additionally we will look at these differences between proprietary versus contract security as it compares to consistency, effectiveness, and obligation (COHEN (1979). Choosing Contract or Proprietary Security).…

    • 1284 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Business

    • 350 Words
    • 2 Pages

    It's always been absolutely key for business to protect their data, it's protecting their intellectual capital, their brand image, it's protecting their customer data and there employees data, and it's absolutely critical for business to do that in a secure way to be able to not only back up for store and retrieve data according to their business requirements and according to the requirement s laid down by regulators. We're living in a digital age and we're surrounded by media telling us how risky the world is for example, pandemic, terrorism, security threats and climate change might be making more frequent occurrences such as hurricanes or floods which can prevent people from continuing to do business or even prevent employees from getting into work and so it's really key for business to have a plan that enable them to get back to work continue with their operations and continue brining in revenue.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Web Security

    • 4247 Words
    • 17 Pages

    Security concerns are in some ways peripheral to normal business working, but serve to highlight just how…

    • 4247 Words
    • 17 Pages
    Good Essays