Explore BrainMass

Computer and Information Systems Security

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

1. What specific security measures would need to be addressed during the implementation of an ecommerce? How security considerations impact the development of a Gantt chart. What influence does have your job (as computer and information systems manager) have?
2. Security is not simply a technology issue; it is also a business issue. Discuss the implications of this statement.

© BrainMass Inc. brainmass.com October 25, 2018, 7:40 am ad1c9bdddf

Solution Preview

1. A computer and information systems manager would need to address the security of data when implementing an ecommerce site. This includes the data the consumer personally inputs, including contact and payment information, but it also includes general site information, so that the site is protected from others, and protected for use by the company. A computer and information systems manager needs to set up encrypted WEB transaction ability and install a firewall to allow only users with specific characteristics access to the protected network. To further protect the information a computer and information systems manager must utilize encryption to ensure confidentiality. ...

Solution Summary

This solution outlines specific security measures that need to be addressed during implementation of e-commerce. It also discusses how security considerations impact the development of a Gantt chart, the the influence a computer and information system manager has on security measures.
The solution discusses the statement: " Security is not simply a technology issue; it is also a business issue".
APA references are included.

See Also This Related BrainMass Solution

Evaluation of computer system security: business v. vendor

Auditors test the computer controls for effectiveness through inquiry and observation. Auditors also review the computer security programs, risk policies, procedures, and standards on all major systems and facilities. They further check on who is responsible for monitoring, backups, log-ins, passwords, and vulnerabilities. In addition, auditors should check for the risk of errors, risk of fraud, effectiveness of application controls, risk of financial statement misstatements regarding security of data and assets, and relevant components of internal control.

In 1998 and 1999, Y2K was a term that was used to describe an anticipated computer problem that would occur in the year 2000. When reading the year, computers were originally designed to read two numbers instead of four numbers. Many people thought items that were run by computers would be unable to read the year 2000 and would revert back to the year 1900, potentially causing systems to fail. Many industries had to implement disaster recovery or contingency plans in preparation for this failure. As a result, auditors had to be prepared to review those plans.

Auditors must be prepared to test the effectiveness of controls and be able to evaluate a disaster recovery or contingency plan. Read the information provided in the Week 7 Application Form (linked below) about Anthony's Orchard's information system.

Week 7 Application Form
Evaluate the organizational structure and access to system program controls for Anthony's Orchard. Write a 2- to 3-page paper discussing the MDAC system and controls. Consider the following:

How would you delegate duties differently?

Did the organization use enough methods of asset protection and control provided by those methods?

What are the risks associated with the system?

What would you have done differently with system program control to improve asset protection?

Overall, does Anthony's Orchard have an effective disaster recovery/contingency plan? Your 2- to 3-page paper should reflect the application of the resources presented this week, as well as knowledge gained from previous weeks' required or optional readings.

View Full Posting Details