In at least 8-10 sentences, explain how your company can be threatened by the 5 most common threats to information systems security. Then explain how you can safeguard your information system from exposure to these threats. Be sure to relate your discussion specifically to your company’s proposed information system.
- In IS Security the 5 most common threats are Accidents & Natural Disasters, Employees & Consultants, Links to Outside Business Contacts, Outsiders/Hackers, and Viruses. Accidents & Natural disasters can be threatened by this because if a natural disaster happens it can destroy all of our customer data for good. The only safeguard that can help with this is backing up our information. The next one Employees & Consultants can effect our Pharmacy because they have access to electronic files within our organization. The safeguard for this would be Access Control Software, which is used to keep stored information secured. Links to Outside Business contacts could be dangerous to the health of our company because our electronic information could be at risk when we send it between businesses. The safeguards for this would be Firewalls & VPN. Firewalls will add an extra level of security so our information is not easily taken. VPN or Virtual Private Network does pretty much the same thing as a firewall, it adds extra security. Next we have Outsiders/Hackers. These individuals penetrate neworks and computers in order to snoop for information or cause damage. In our case, this is a very bad thing if someone is trying to get a hold of another persons medical records. The way to stop this is by having IDs. Having IDs would limit the amount of people who were allowed in our secured areas. Lastly Viruses or destructive programs that disrupt the normal functioning of computers. In our case viruses can make it so our systems don't work which could easily put us out of business if we couldn't access our customers files. The safeguard for viruses could be a firewall. This would provide extra security for our information.
No comments:
Post a Comment