Discussion: Reliable Information systems.

Discussion: Reliable Information systems.

Discussion: Reliable Information systems.

The daily operations and decision-making of almost every single company are dependent on reliable Information systems. Every piece of the daily operations within a company is closely connected with each other by using a reliable information system. Any errors could have a huge impact on all aspects of a company. For example, some banks store their customers’ data in a big data center, any unexpected incidents, no matter how small they might be, could affect millions of users across the country. Hundreds of millions of dollars could be lost due to the delay in transactions and payments.

A reliable design and implementation of internal controls are vital to protect information resources within organizations. Technologies like firewalls and DMZ can effectively protect an organization’s network security. Multi-factor Authentication is another widely used technology to protect a company’s system from being accessed by unauthorized sources. In addition, a strong password policy should also be implemented. This is very easy to design and does not take much time and effort to implement. It can be as easy as requiring employees to change passwords every 90 days with at least 10 digits.

As a leader, it is important to make sure all those internal controls that protect the information systems can operate effectively. That means management is supposed to establish a process to monitor the implementation of these protections. A detailed written policy should be prepared by the management and published on the intranet. All the implementation of the controls should be regularly reviewed. Training should be designed for all levels of employees to enhance their security awareness.

Reply#2

Many companies now use file encryption to protect data security.

For example, the encrypted file system EFS has always been provided by Microsoft Windows operating systems. The built-in full disk encryption BitLocker after Windows Vista/Server 2008 can protect the security of the entire disk data. Even the word processing software Office, after the 2003 version was released, can also be used with Windows Server. Integrating the file authority control service IRM/RMS can achieve a file protection effect. The file formats or open application software we are familiar with also have many built-in encryption functions, and most of them use passwords to restrict the opening of the file content, such as PDF files, RAR and ZIP files. Discussion: Reliable Information systems.

Another well-known brand is SafeNet. The company\’s ProtectFile and ProtectDrive software correspond to file and disk encryption functions respectively. The company also has a product, ProtectV, which is quite special. It is aimed at data security in the cloud environment. The system is built with a pre-set image file to protect the virtual machines in the public cloud vendor environment or the enterprise private cloud environment. It supports Amazon EC2 (Elastic Compute Cloud) and VPC (Virtual Private Cloud), as well as the virtualization platform VMware vCenter.

Mullane(2020) stated: \”An effective governance model ensures that good cybersecurity and practices and procedures are maintained properly.\” I can\’t agree more with this statement as an organization’s leader does play an important role in defining the values of an organization (Links to an external site.). He or she has the power and influence to make cybersecurity an important part of the organizational culture.

ORDER NOW FOR CUSTOMIZED, PLAGIARISM-FREE PAPERS


 

smilesmilePLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT

get-your-custom-paper



You cannot copy content of this page

Open chat
1
You can get in touch with our live agent via WhatsApp! on +19142470710
Feel free to ask questions, clarifications or discounts available when placing your order