Skip to main content

SECURITY AND CONTROL IN MIS

Why Systems Are Vulnerable

Information systems are vulnerable to technical, organizational, and environmental threats from internal and external sources. The weakest link in the chain is poor system management. If managers at all levels don't make security and reliability their number one priority, then the threats to an information system can easily become real. The figure below gives you an idea of some of the threats to each component of a typical network.









Internet Vulnerabilities

"If electronic business is to prosper and truly move into the mainstream of commerce, everyone involved — merchants, financial institutions, software vendors, and security suppliers such as VeriSign — has to make security a top priority, starting right now. Security is very hard to get right under the best of circumstances and just about impossible when it isn't the focus of attention. If the industry doesn't get this right — and fast — it's setting the stage for a catastrophic loss of confidence." (Business Week, March 26, 2001)

"A top U.S. Air Force official has warned Microsoft to dramatically improve the security of its software or risk losing the Air Force as a customer. Reacting to rising criti

cism from the Air Force and others, Microsoft Chairman Bill Gates in mid-January issued a directive making security the software giant's No. 1 priority. Gates directed 7,000 programmers to spend February scouring the Windows operating system for openings hackers might exploit to steal data or shut down systems." (USA Today, March 10, 2002)

With distributed computing used extensively in network systems, you have more points of entry, which can make attacking the system easy. The more people you have using the system, the more potential for fraud and abuse of the information maintained in that system. That's why y

ou have to make it everybody's business to protect the system. It's easy for people to say that they are only one person and therefore they won't make much difference. But it only takes one person to disable a system or destroy data.

Wireless Security Challenges

It's a difficult balancing act when it comes to mak

ing wireless systems easy to access and yet difficult to penetrate. Internet cafes, airports, hotels, and other hotspot access points need to make it easy for users to use the network systems with the 802.11 standard. Yet, because it is so easy, hackers and crackers can easily access unsuspecting users' systems and steal data or use the entry point as a way to spread malicious programs. The hackers can use war driving techniques to gain access to wireless networks not only in hotels and airports, but private businesses and government centers.


NOOPUR GARG

BBA/4536/07


Comments

Popular posts from this blog

Advantages and Disadvantages of EIS Advantages of EIS Easy for upper-level executives to use, extensive computer experience is not required in operations Provides timely delivery of company summary information Information that is provided is better understood Filters data for management Improves to tracking information Offers efficiency to decision makers Disadvantages of EIS System dependent Limited functionality, by design Information overload for some managers Benefits hard to quantify High implementation costs System may become slow, large, and hard to manage Need good internal processes for data management May lead to less reliable and less secure data

Inter-Organizational Value Chain

The value chain of   a company is part of over all value chain. The over all competitive advantage of an organization is not just dependent on the quality and efficiency of the company and quality of products but also upon the that of its suppliers and wholesalers and retailers it may use. The analysis of overall supply chain is called the value system. Different parts of the value chain 1.  Supplier     2.  Firm       3.   Channel 4 .   Buyer

CONCEPTUAL VIEW OF MIS

The concept is a blend of principles, theories and practices of management, information and system giving rise to a single product called MANAGEMENT INFORMATION SYSTEM . The concept of management gives high regard to the individual and his ability to use the information. MIS gives information through data analysis. While analyzing the information, it relies on many academic disciplines like management science, OR, organization behavior, psychology, etc. The foundation of MIS is the principles of management and its practices. MIS uses the concept of management control in its design and relies heavily on the fact that the decision maker is a human being and is a human processor of information. A MIS can be evolved for a specific objective it is evolved after systematic planning and design. It calls for an analysis of business, management views and policies, organization culture and the management style. The MIS,therefore relies heavily on systems theory.The systems theory offers soluti