In 600-700 words original only please with at least three references help with the following
Assume that you have been asked to consult for a company that has branch offices in four continents. You have implemented a management information system that will enable its managers to exchange information about various company activities in the areas of marketing, sales, HR, finance, and administration. As part of the implementation process, you are required to make a recommendation on the types of security measures that should be taken with implementation of this system.
Answer the following questions indept
1. What are some of the potential security threats to managing information related to these activities across multiple locations?
2. What strategies or tools could be used to minimize these types of threats upon implementing a system in this situation?
As the organization has remote offices in numerous locations, it will be implementing web based marketing information systems that can be accessed by authorized users or office personnel across the branches. It will also make use of virtual private networks to share or exchange data across offices. Further, the local systems in each office can also be made accessible to users in other locations via various software tools and technologies.
One of the major security threats in such a situation is leakage of confidential information due to intrusion into the network by hackers or intruders. Hackers can break into the network and get access to confidential information about the company and misuse such information for personal benefits. They can also cause harm to the organization's data by breaking into the network or accessing systems on the network.
Further, virus attacks can also cause harm to the network and systems used by the organization ...
Discusses the security threats due to implementation of management information system across multiple locations in the organization.
Information Systems Security
1. For each of the following concepts, research the internet for information on the topic and
provide an explanation as to: (a) what the concept means, (b)
how is it realized mathematically, and (c) what are its practical benefits. Identify the
source(s) for your information.
i. Blind signatures
ii. Identity-based encryption
iii. Threshold cryptography
iv. Key escrow
v. Side channel analysis
Guideline: Your answer should clearly explain the concept along the three aspects identified above to any of your classmates who did not undertake this exercise themselves.View Full Posting Details