Chapter 1 Assignment: Save files as: (your last name first initial) CH1A Format
ID: 426067 • Letter: C
Question
Chapter 1 Assignment: Save files as: (your last name first initial) CH1A Format Requirements: Times New Roman; 12 pt. font e You need to use Microsoft Word or have software that will save the file as .doc or .docx. . All information has to be written in your own words. . Report your findings (at least 400 words) (not including cover page and work cited). . Remember you have to use APA o See examples. o Include at least one work cited on its own page Your name and assignment due date must be on all assignments. Assignment Due Date: Each week has a specific date, check under Home. When the assignment is completed, it will be turned in through WebCampus under Home and related assignment located on the left-hand side of the screen on the class homepage. Work Cited: Include at least one work cited that you viewed for more information. You do not necessarily have to use it as reference. Work cited has to be listed on a separate page. See example paper information on APA. Plagiarism: Plagiarism occurs when you use another student's paper or you create a paper that is not in your own words and is not properly documented. Avoid plagiarism at all costs. All assignments will be uploaded into a plagiarism checker. Assignment: Use the Internet to research the risks that companies face because of their use of information systems. What kind of damage can each of these risks cause to a company's operations? What can a company do to protect their information systems from cyber criminals?Explanation / Answer
The risks companies face because of information systems
The key risks/ threats companies face due to the following:
The information systems are installed for ensuring high security and controls in the organization. It is responsible for the integrity, the safety of systems, resources, and activities. All organization in developed countries is predominantly dependent on information systems. These include services like water supply, air traffic control, power supply etc. Financial systems are also dependent totally on information systems, which include fund transfers that are vulnerable to the cyber crimes as large amount of financial information is sent through networks.
The need to use secure networks is critical, strict controls have to be implemented, regular countermeasures and audits must be conducted.
The ways to control risks are as follows:
A contingency plan is in place to take care of emergencies in telecommunication, network and software failures. Disaster plans are part of the business contingency plans to take care of business interruptions due to earthquake, floods, fires etc.
Computer crimes cost the world economy billions of dollars worldwide. The unethical use of information and hacking of information include theft of customer information, government and corporate espionage, sabotage and cyberwar. The methods used are malware, phishing, virus, Trojan horse etc.
The organizations can take following measures to protect from cybercrime:
To sum it up in the world which is getting more and more dependent on information technology, the need to put in controls and prevent cybercrime is critical to ensure the safety of information in the organizations.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.