It-205 Wk 5 Dq 1 and 2

Related Essays

It/205 Wk 1 Info System Business Problem Dimensions Check Point
There are three dimension problems a business may have. All three problems are signficantly major and if a business does not address the issues of these
It 205 Wk 8
Dorfman Pacific Rolls Out a New Wireless Warehouse The problem with the Dorfman Pacific operations is the inability to keep up with the increased demand for
Acct 205
ACCT 205 Wk 1 Dis. 1 E1-21 & E1-26 Question E1-21 KEY: A/R = Accounts Receivable A/P = Accounts Payable Indicate the effects of the following
Love
Participation | Individual | Main | Ongoing-4 days per wk |  DQ 1 | Individual | Main | Day 3(Thurs) |  DQ 2 | Individual | Main | Day 5(Sat) |  Educational

Submitted by to the category Business and Industry on 11/23/2012 09:12 AM

A breach in a business could expectantly become disastrous. “Computer crimes” have affects on a business in different ways (2011, Laudon et., al). Most of the crimes done over computers are too contravene others private information, give a virus that can cause harm to the computer, fraud, and others.

Confidential company information is desired by many hackers. Possible social security numbers, credit card numbers, address and other employee and customer information can be sold or distributed. Proper set up of security and adequate maintenance of security is one way to safeguard your firm from hackers.

Internal threats involving a computer and employee access to private data and abusing the privilege has been known to happen. “Studies have found that user lack of knowledge is the single greatest cause of network security breaches” (2011). Employees have given out their personal passwords or confidential information, “which compromises the system” (2011).

Hackers continue to find ways of breaching private data. Some measurements can be taken to greatly reduce the risk of a breach. Protection of a company’s private data consists of firewalls, Intrusion Detection Systems and Antivirus software. Firewalls deny access to “unauthorized users accessing private networks”(2011). Intrusion Detection systems are in place to monitor ‘hot spots’ of a business. Where hackers would most likely to attack is the main focus of this system. It is a tool used to “protect against suspicious network traffic and attempts to access files and databases” (2011). Antivirus software detects viruses that may have slipped through the cracks.

Reference:

Laudon, J. P., & Laudon, K. C. (2011). Essentials of management information systems (9th ed.). Upper Saddle River, NJ: Prentice Hall.

Wiki is a collaborative site that can be viewed and edited by anyone. Wiki is full of information that is used often. It is a quick resource to use to grab a definition or the year a president was...

View Full Essay
Full Essay Stats...
  • Words: 558
  • Pages: 3
  • Views: 198