Purchase Solution

Information systems and security

Not what you're looking for?

Ask Custom Question

In 600-700 words original only please with at least three references help with the following

Assume that you have been asked to consult for a company that has branch offices in four continents. You have implemented a management information system that will enable its managers to exchange information about various company activities in the areas of marketing, sales, HR, finance, and administration. As part of the implementation process, you are required to make a recommendation on the types of security measures that should be taken with implementation of this system.

Answer the following questions indept

1. What are some of the potential security threats to managing information related to these activities across multiple locations?
2. What strategies or tools could be used to minimize these types of threats upon implementing a system in this situation?

Purchase this Solution

Solution Summary

Discusses the security threats due to implementation of management information system across multiple locations in the organization.

Solution Preview

As the organization has remote offices in numerous locations, it will be implementing web based marketing information systems that can be accessed by authorized users or office personnel across the branches. It will also make use of virtual private networks to share or exchange data across offices. Further, the local systems in each office can also be made accessible to users in other locations via various software tools and technologies.

One of the major security threats in such a situation is leakage of confidential information due to intrusion into the network by hackers or intruders. Hackers can break into the network and get access to confidential information about the company and misuse such information for personal benefits. They can also cause harm to the organization's data by breaking into the network or accessing systems on the network.

Further, virus attacks can also cause harm to the network and systems used by the organization ...

Solution provided by:
Education
  • BCom, SGTB Khalsa College, University of Delhi
  • MBA, Rochester Institute of Technology
Recent Feedback
  • "Thank you. "
  • "Thank you"
  • "Thank you. I got 20/20 last week for my discussion you help me out with."
  • "Thank you. Great Job. "
  • "Thank you. Great Job. "
Purchase this Solution


Free BrainMass Quizzes
Word 2010: Table of Contents

Ever wondered where a Table of Contents in a Word document comes from? Maybe you need a refresher on the topic? This quiz will remind you of the keywords and options used when working with a T.O.C. in Word 2010.

C# variables and classes

This quiz contains questions about C# classes and variables.

Basic Computer Terms

We use many basic terms like bit, pixel in our usual conversations about computers. Are we aware of what these mean? This little quiz is an attempt towards discovering that.

Java loops

This quiz checks your knowledge of for and while loops in Java. For and while loops are essential building blocks for all Java programs. Having a solid understanding of these constructs is critical for success in programming Java.

Basic Networking Questions

This quiz consists of some basic networking questions.