-
Essay / Threats to Information Security - 868
Many organizations now face enormous threats to their stored information. This puts organizations and individuals at risk of losing their privacy. There are factors that contribute to informational vulnerability at an organization and at the personal level. In addition, measures are put in place to help secure information. Factors that pose a threat to information may include interconnectivity and wireless applications used in businesses (Rainer and Turban, 2009, p. 1). There is massive communication of computers as a result of interconnectivity, which introduces many challenges in managing information security (Rainer & Turban, 2009, p. 1). Massive interconnectivity has served as a breeding ground for many attackers and malware. This gave rise to the idea of trusted and untrusted networks that operate outside of business applications (Rainer & Turban, 2009, p. 1). Research has shown that wireless communication is the riskiest in terms of information security, yet it is the most effective since it allows employees to access information from any party of the world (Rainer & Turban, 2009, p. 1). Some government legislation also affects information security. The government mandates that a company's financial information be publicly available (Rainer & Turban, 2009, p. 1). In the process of releasing information to the public, a company is vulnerable to attacks from hackers or malware. Another factor is the growing technology in the field of storage devices. Devices are becoming smaller, cheaper and portable; they have increased storage capacity (Rainer & Turban, 2009, p. 1). This has put organizations at risk... middle of paper ... malware systems, whitelists and blacklists, and intrusion detection systems (Reynolds & Stair, 2005, p. 42). In conclusion, information systems and resources must be protected at all times. Information protection must be initiated by a company and reinforced by its employees and their customers. Application control ensures that information, data, and all applications used within an organization are protected. Works Cited O'Brien, J. and Marakas, G. (2008). Management Information Systems with Source MI 2007. New York, NY: McGraw-Hill Laudon. Rainer, R. K. Jr. and Turban, E. (2009). Introduction to information systems: supporting and transforming the business (3rd ed.). Available at http://edugen.wiley.com/edugen/student/mainfr.uniReynolds, G. and Stair, R. (2005). Principles of Information Systems (7th ed.). Boston, MA: Technology Course.