Preview

Mis Assignment

Satisfactory Essays
Open Document
Open Document
465 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mis Assignment
Kingdom of Saudi Arabia | | المملكة العربية السعودية | Royal Commission at Yanbu | | الهيئة الملكية ينبع | University College – Yanbu (Women's Campus) | | الكلية الجامعية-ينبع )حرم البنين( | Yanbu Al-Sinaiyah | | ينبع الصناعية |

Essentials of Management Information System (MIS-203) Semester 2012 Total Marks | Marks Obtained | 10 | | Name: _______sara_hadi_mujally_ __________ Section: __1___ Student ID | 1 | 0 | 1 | 2 | 0 | 0 | 7 | 8 |

ASSIGNMENT 2 |

* Discuss the following Sentence: 1. Security isn’t simply a technology issue, it’s a business issue.

The use of technology can be seen in both security issues and business issues.
Businesses today, as always, must consider what amount of technology can be used in maintaining security for a company, government, family or individual.
Whether the technology used for security is a lock, a motion sensor, or a camera the choices made are usually related with the value of what is being secured and the amount of resources available for allocation to security. security is also critical to ensure that integrity of organization's data is maintained and confidential information about clients or customers is not leaked, thereby ensuring the privacy of customers ,In making the choices it would unfair to categorize the decisions as either wholly a technology issue or wholly a business issue anymore than the choices regarding accounting might be categorized as either wholly a technology issue or wholly a business issue.

________________________________________________________________________________

2. It has been said that within the next few years, smart phones will become the single most important digital device we own.

1 - A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone A smartphone can be considered as a Personal Pocket Computer (PPC) with mobile phone functions, because

You May Also Find These Documents Helpful

  • Good Essays

    I would like to start off by saying that there are various threats when discussing about computer security the word threat would mean something that can indicate a danger when in relation to computer security. In this task I will be showing the Malicious damage, counterfeit goods, (software/hardware) human errors, phishing and hacking, theft of equipment, threats related to e – commerce and technical failure.…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    IS3350 week 1

    • 287 Words
    • 3 Pages

    5. Customer privacy data and intellectual property assets are critical because they hold personal information that can pose a potential threat if exposed.…

    • 287 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Describe how an organization can properly manage its information security efforts using proper risk management techniques and cost-benefit analyses for these information security efforts.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Confidentiality and information security are key factors for an organisation. It allows organisations to ensure they preserve these along with…

    • 2721 Words
    • 11 Pages
    Satisfactory Essays
  • Good Essays

    For instance, most cell phones are now smartphones that combine features of personal computing and a mobile, handheld device. One can now access the internet from the phone with a touch of the hand. Most family members presently have smartphones for better access.…

    • 679 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    209

    • 584 Words
    • 2 Pages

    It is very important to keep information secure and private that individuals and staffs private information will stay protected from unauthorised viewing. It is their right to to have their private information to be protected. It is important to protect information to avoid indentity theft. As well as to keep service users trust between services and service users. To gain their trust, they have to know that their private information is safe and protected and can`t be used against them or seen by someone who has no permission to see it. Without all these things services can`t have confidentiality and trust from service users and their services wouldn`t have any users as people wouldn`t be able to feel safe and protected and would leave them feeling vulnarable as their information could be accessed by anyone.…

    • 584 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It is important to have secure systems in place in respect of information handling in order to…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    As an organization grows so must the security, and it has to be on the top of the list. When considering what type of security to choose, either proprietary or contact, they need to look at the value of the organization? This value within the organization will need some sort of protection to deter theft, vandalism, and destruction. The boardroom conversation could to from, “We have nice stuff” to “How are we going to protect it.” Leadership will need to decide how they will handle the issue of protecting their items that the business owns. In the process we will need to look at the pros and cons of both proprietary and contract security. Both of them have very big advantages associated with them but most of the time only one meets the needs of the organization. We have established that the organization has nice stuff, they need to protect it, we assume they have the month to support either option and they have a choice to make. This issues come down to management, and cost. One option provides for maximum control whereas the other does not allow for much control. The costs are different also. One option there is a set cost, but it could be high and other option the cost could depend upon the capabilities of the office and how many people are hired for the organization. We have defined the problem and lay out the possible options. We will explore the outcomes, their advantages, and their disadvantages. It comes down to what the right fit for the organization. Additionally we will look at these differences between proprietary versus contract security as it compares to consistency, effectiveness, and obligation (COHEN (1979). Choosing Contract or Proprietary Security).…

    • 1284 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Bananas

    • 344 Words
    • 2 Pages

    Based on the following information, assess where and when cryptography is needed within a typical IT infrastructure to be in compliance with policies and laws.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Business

    • 350 Words
    • 2 Pages

    It's always been absolutely key for business to protect their data, it's protecting their intellectual capital, their brand image, it's protecting their customer data and there employees data, and it's absolutely critical for business to do that in a secure way to be able to not only back up for store and retrieve data according to their business requirements and according to the requirement s laid down by regulators. We're living in a digital age and we're surrounded by media telling us how risky the world is for example, pandemic, terrorism, security threats and climate change might be making more frequent occurrences such as hurricanes or floods which can prevent people from continuing to do business or even prevent employees from getting into work and so it's really key for business to have a plan that enable them to get back to work continue with their operations and continue brining in revenue.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sensitive Items

    • 798 Words
    • 4 Pages

    It is very important to secure all your sensitive equipment and items, and maintain accountability. The reason simply is to keep very important high cost…

    • 798 Words
    • 4 Pages
    Good Essays
  • Good Essays

    internal and external users to whom access to the organization’s network, data or other sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Web Security

    • 4247 Words
    • 17 Pages

    Security concerns are in some ways peripheral to normal business working, but serve to highlight just how…

    • 4247 Words
    • 17 Pages
    Good Essays