Amidst
the rise of a more connected business, entities also needs to be aware of any
threat coming in form of cybersecurity issue. Digital data are really
vulnerable to destruction, misuse, error, fraud, and hardware or software
failures. The Internet is designed to be an open system and makes internal
corporate systems more vulnerable to actions from outsiders.
Furthermore,
lack of sound security and control can cause firms relying on computer systems
for their core business functions to lose sales and productivity. Information
assets, such as confidential employee records, trade secrets, or business
plans, lose much of their value if they are revealed to outsiders or if they
expose the firm to legal liability. Several well-known case in the past
includes Yahoo and Marriott.
To
prevent any wrongdoings happened from this issue, firms need to establish a
good set of both general and application controls for their information
systems. A risk assessment, corporate security policy, and comprehensive and
systematic information systems auditing is several ways that entities could do.
Tools
and technologies that are essentially needed for safeguarding information
resources includes firewall; intrusion detection system; passwords, tokens,
smart cards and biometric authentication; antivirus software; antispyware;
encryption, coding, and scrambling of message; digital certificates combined
with public key encryption; fault-tolerant computer systems; and use of
software metrics and rigorous software testing.
---------------------------------------
This post is uploaded as part of
Management Information System course assignment.
Comments
Post a Comment