Many organizations today face enormous threats to their stored information. This is putting organizations and individuals at risk of losing their privacy. There are factors that contribute to information vulnerability at an organizational and personal level. Additionally, measures are put in place to help protect your information. Factors that pose a threat to information may include interconnectivity and wireless applications used in business (Rainer & Turban, 2009, p. 1). There is massive communication between computers as a result of interconnectivity and this introduces many challenges in information security management (Rainer & Turban, 2009, p. 1). Massive interconnectivity has been a breeding ground for many attackers and malicious programs. This has led to the rise of the idea of trusted and untrusted networks that operate outside of enterprise applications (Rainer & Turban, 2009, p. 1). Research has shown that wireless communication is the riskiest in terms of information security, but is nevertheless the most effective as it allows employees to access information from anywhere in the world (Rainer & Turban, 2009, p. 1). Some government legislation also affects information security. The government stipulates that a company's financial information should be available to the public (Rainer & Turban, 2009, p. 1). Publishing information to the public makes the company vulnerable to attacks by hackers or malicious programs. Another factor is the growing technology in the field of storage devices. Devices are becoming smaller, cheaper and more portable; they have a greater storage capacity (Rainer & Turban, 2009, p. 1). This has put organizations in a situation of risk… middle of paper… ti-malware systems, black and white lists, and intrusion detection systems (Reynolds & Stair, 2005, p. 42). In conclusion, computer systems and resources should be protected at all times. Information protection should be initiated by a company and enforced by its employees and their customers. Application control ensures that information, data, and all applications used within an organization are protected. Works Cited O'Brien, J., & Marakas, G. (2008). Management Information Systems Source MI 2007. New York, NY: McGraw-Hill Laudon.Rainer, R.K. Jr., & Turban, E. (2009). Introduction to Information Systems: Supporting and Transforming Business (3rd ed.). Available from http://edugen.wiley.com/edugen/student/mainfr.uniReynolds, G., & Stair, R. (2005). Principles of information systems (7th ed.). Boston, MA: Technology Course.
tags