Preview

Information Use

Good Essays
Open Document
Open Document
726 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Use
It is very important to protect the information of organizations today due to the high levels of fraud that is being committed out there. Imagine going to a bank and someone left their computer unlocked for others to gain information to. If your personal information was on that screen and someone else took down or noted your social security number or date of birth, it would make you feel really leery about doing business with that bank. At my employer we are forced to lock our computers before we leave our desks. It is being monitored by video review and we can lose points on our audit if we are caught leaving our workstations unlocked. When people provide information, especially personal information, they trust that the organization will protect that information that is given so that it does not get into the wrong hands.

The basic elements to protect information today is firewalls, and security software programs that help prevent intruders from attaching companies private information. Firewalls help protect connections on local devices where information may be retrieved. Control Alt and delete also help lock our workstations from people possibly gaining access to personal or business information.
I believe it 's important for organizations to protect their information because network security threats are becoming more eminent with the dramatic evolution of technology. Old methods take new form; I read not too long ago that there 's a new method of pickpocketing called "electronic pickpocketing"--which exploits the RFID card embedded within newer credit cards. This allows the thief to access private account information and process transactions. Now this is just example is on a smaller scale, so try and imagine the same type of security breach but with sensitive company documents. Company 's like Sony suffered a major breach not too long ago causing the PSN network to shutdown for fear of further attacks. Customer information was obtained leading



References: Laudon, J. P., & Laudon, K. C. (2008). Essentials of management information systems (8th ed.). Upper Saddle River, NJ: Prentice Hall.

You May Also Find These Documents Helpful