Wednesday, November 17, 2010

Blog Entry 7.1: IS Security

            In at least 8-10 sentences, explain how your company can be threatened by the 5  most common threats to information systems security.  Then explain how you can safeguard your information system from exposure to these threats.  Be sure to relate your discussion specifically to your company’s proposed information system.
 
  •     In IS Security the 5 most common threats are Accidents & Natural Disasters, Employees & Consultants, Links to Outside Business Contacts, Outsiders/Hackers, and Viruses.  Accidents & Natural disasters can be threatened by this because if a natural disaster happens it can destroy all of our customer data for good.  The only safeguard that can help with this is backing up our information.  The next one Employees & Consultants can effect our Pharmacy because they have access to electronic files within our organization.  The safeguard for this would be Access Control Software, which is used to keep stored information secured.  Links to Outside Business contacts could be dangerous to the health of our company because our electronic information could be at risk when we send it between businesses.  The safeguards for this would be Firewalls & VPN.  Firewalls will add an extra level of security so our information is not easily taken.  VPN or Virtual Private Network does pretty much the same thing as a firewall, it adds extra security.  Next we have Outsiders/Hackers.  These individuals penetrate neworks and computers in order to snoop for information or cause damage.  In our case, this is a very bad thing if someone is trying to get a hold of another persons medical records.  The way to stop this is by having IDs.  Having IDs would limit the amount of people who were allowed in our secured areas.  Lastly Viruses or destructive programs that disrupt the normal functioning of computers.  In our case viruses can make it so our systems don't work which could easily put us out of business if we couldn't access our customers files.  The safeguard for viruses could be a firewall.  This would provide extra security for our information. 

Tuesday, November 16, 2010

Blog Entry 6.1- Web 2.0

Explain in 5-8 sentences explaining how your company could utilize the Web 2.0 Pillars.  Name and define the pillars, then explain them in relation to your company.
         The 3 Pillars of Web 2.0 are Utilizing the Web As a Platform, Harnessing Collective Intelligence, Leveraging Data, and Implementing Innovative Web Capabilities.  By utilizing the web as a platform our business can use peer-to-peer technology to standardize how we access the web.  By harnessing collective intelligence we allow users to contribute to improve our content.  For example we could have a pharmacy forum where individuals go and make suggestions about different medicines.  By leveraging the data our business is successful because of its knowledge of medicines and products. Our company can implement innovative web capabilities to keep our business ahead of the game.  For example adding a Pharmacy Hot line we can make sure that customers are updated on our new and upcoming medicines and products.