This assignment shows how technology impacting the world of business and how does it support the business initiatives (Kessler, 2012). Information systems address support to all discipline whether it is manufacturing, operations management, marketing, sales, human resources or finance and accounting (Doherty and Fulford, 2006). The mutual goals that are related to projects of information technology are improvement in productivity, reduction in cost, improvement in consumer satisfaction thereby increasing loyalty, etc (Haag, Baltzan and Phillips, 2006).
The security policies are instructions from management which indicates the predetermined set of actions or a process to handle a situation or an issue. Information security plan or ISP is intended to safeguard the resources which are critical and informational from extensive business stability, reduction of risk and increasing return on the investments. When the security codes are in correct hands and all information and data is privately maintained only than the organization will accept the policies.
The acceptable use policy (AUP) is the policy which the user has to be in the agreement in order to get the access to the internet or the network. A contractual condition called Nonrepudiation is maintained to ensure that the participants of the e-business don’t deny their online activity (Reed, 2007). This is a clause that is contained in the AUP. The business organizations require their employees to give their signature on the acceptable policy to gain the internet access. When they sign on ISP than each of the customer is given an AUP that states that they have agreed to follow the conditions.
The conditions can be:
Bank is a financial institution where monetary transaction is high which in turn increases the risk. Following can be the security that a bank can implement and the affects of it:
The company should expect that there will be online mishandling of data where the security may be breached by any of the member of the organization. Other issues can virus attack, malware, Trojan horse, worm and IP attacks.
The three ways to prevent the identity theft are:
In case of HP, Chairperson Patricia C. Dunn stepped down because of manipulating data by using unethical methods of information security system of the organization.
Key security areas are:
Application layer security measure is taken to prevent gaps in security policy. (Messner, 2007) Network layer security measure is taken to protect the physical interface between the network hardware and host computer (Dacey, 2003). Finally the ethical layer security measures are taken to see which sources are disrupting the network by hacking into it (Hacking Exposed (TM) Web 2.0: Web 2.0 security secrets and solutions, 2008). Viruses are programs that affect the users by duplicating themselves and attacking the files in the computers. Worms are self-generated programs that spread in the computer but only affect when the user opens the link or a particular file (Web services security, 2003).
Corporate mail is a common term in an organization. Any formal interactions between the employees and the management or management to management are done through corporate mail. This is because these mails need a different approach from informal mails. It was recently seen that companies are firing employee who are not following the protocol of sending corporate mails. Now many organizations are hiring people who will monitor the mails send to the management which are corporate mails. Thus it means that we are not only the ones who are accessing the mails but there are people who are keeping an eye on our mails. There are many regulatory, financial and legal issues mentioned in the mails. The companies surveyed that there was email leak and breach of confidentiality. So the companies put some policies which the employees should follow:
Corporate mail is vital for transmitting formal and important messages. A wrong use of corporate mail can hamper the working of the company. Policies are made for employees but if they don’t follow than they are putting themselves and also the company at risk.
Dacey, R. (2003). Information security. Washington, D.C.: U.S. General Accounting Office.
Doherty, N. and Fulford, H. (2006). Aligning the information security policy with the strategic information systems plan. Computers & Security, 25(1), pp.55-63.
Haag, S., Baltzan, P. and Phillips, A. (2006). Business driven technology. New York, N.Y.: McGraw-Hill/Irwin.
Hacking Exposed (TM) Web 2.0: Web 2.0 security secrets and solutions. (2008). Choice Reviews Online, 46(02), pp.46-0929-46-0929.
Harold, L. and Thenmozhi, M. (2014). The development and application of information system driven value creation in Indian financial services sector. IJBIS, 17(2), p.198.
Kessler, G. (2012). Information Security: New Threats or Familiar Problems?. Computer, 45(2), pp.59-65.
Messner, W. (2007). Justifying information system value: Development of a method for measuring customer advisory system effectiveness. Business Information Review, 24(2), pp.126-134.
Reed, B. (2007). Implementing Information Lifecycle Security (ILS)*. Information Systems Security, 16(3), pp.177-181.
Web services security. (2003). Computer Fraud & Security, 2003(3), pp.15-17.
MyAssignmenthelp.com delivers assignment help to millions of students of USA. We have in-house teams of assignment writers who are experts on wide ranges of subjects. We have appointed teams of native writers who provide assignment help to students in New York City and all over the USA. They are skilled assignment writers who successfully cater to search terms like do my assignment in the USA
You are required to write a researched argument essay that convinces persuades the reader of your position / stance. This is an academic, researched and referenced do...Read More
Executive Summary The purpose of this report is to elaborate the factors which are considered by individuals before selecting an occupation. Choosing an occupati...Read More
Introduction With the increase enhancement in the field of technology, it has been considered essential by the businesses to implement such technology in their b...Read More
Executive Summary In a merger & acquisition, role of an HR has emerged as a very critical function. At each stage of merger and acquisition process, HR plays a s...Read More
Introduction In this competitive business environment where every business organization is trying to attract the customers of each other, it becomes essential for ...Read More