What problems would arise in the organization

Assignment Help Management Information Sys
Reference no: EM131417730

Discussion -Security Controls

Formal systems are generally defined by messages arriving from external parties, suppliers, customers, regulatory agencies, and financial institutions. Informal systems augment formal systems since people generally need to engage in informal communication.

Technical systems provide the automation of part of a formal system

Choose one of the following organizations and describe the problems and successes they may experience. The specifications for the organizations are as follows:

• Organization A has an informal system and a formal system, but no technical system.

• Organization B has a formal system and a technical system, but no informal system.

• Organization C has only a formal system.

• Organization D has an informal system and a technical system, but no formal system.

For the organization you chose, answer the following three questions:

1. What problems would arise in the organization? Why do you think so?

2. What breaches of security could occur as a result of the missing system? Give at least two examples of security breaches in this context.

3. Could the organization still function successfully? Why or why not?

Course Text

Dhillon, G. (2007). Principles of information systems security: Text and cases. Hoboken, NJ: Wiley.

Chapter 1, "Information Systems Security: Nature and Scope"

Reference no: EM131417730

Questions Cloud

Implementation of the uniform commercial code : Prior to the implementation of the Uniform Commercial Code (UCC), under the common law a party considering an offer had to accept that offer exactly as the offer was made. What is the name of the legal rule that embodied this requirement?
What is the next step in moving the nation : What is the next step in moving the nation towards its founding principles of "one nation, under God, with liberty and justice for all"
Stock extra supplies of a particular medicine : Andrew, a pharmacist, realized that he should stock extra supplies of a particular medicine to respond to an outbreak of a particular infection in the city. Lacking sufficient capital to purchase the extra inventory, he borrowed a predetermined su..
Identify the key functions of stained gclass windows : Identify the key functions of stained gclass windows in the Gothic style in Europe's cathedral architecture. Identify two (2) differences between the Romanesque and Gothic cathedral structures
What problems would arise in the organization : Formal systems are generally defined by messages arriving from external parties, suppliers, customers, regulatory agencies, and financial institutions. Informal systems augment formal systems since people generally need to engage in informal comm..
Analyze at least three elements of cinematography : Analyze at least three elements of cinematography and editing (e.g., lighting, color, shots, focus, transitions, and types of cuts) by evaluating the dramatic impact of the scene.
Capital requirements to the bank manager : Arnold approached a bank to get a loan for a business he planned to launch later that year. He explained his business idea and its capital requirements to the bank manager.
What are the pros and cons of raising prices at bulls eye : The manager is unsure of this strategy as recent data points to increasing numbers of individuals shopping more and more. What are the pros and cons of raising the prices at Bulls Eye and would that strategy be profitable?
Why has the arab-israeli conflict been so persistent : Why has the Arab-Israeli conflict been so persistent? What religious and cultural factors have contributed to the persistent state of unrest in the Middle East and, in particular, in what some people refer to as the Holy Land

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe business continuity planning

"Disaster Recovery (DR), Business Continuity Planning (BCP), and Software as a Service (SaaS) Options", Explain in your own words the difference between disaster recovery and business continuity planning efforts and whether or not you believe these..

  Analyze the information security incident management plan

As an Information Security Manager conduct a study (of any organization from your choice) to analyze the information security Incident Management plan that they apply in their organization

  Define the policies to apply to documents

Define the policies to apply to documents so that document-related actions are audited, documents are retained or disposed of properly, and content important to the organization is protected.How documents are converted as they transition from one ..

  Logistics criteria for decision making

Would the logistics criteria for decision making be the same as for mass merchandising? Why or why not

  Question about technologyhow is the trend toward open

question about technologyhow is the trend toward open systems connectivity and interoperability related to business use

  Under what circumstances might service times be constant

Do doctors' offices generally have random arrival rates for patients? Are service times random? Under what circumstances might service times be constant?

  Explain the complexities of auditing a cloud computing

Explain the complexities of auditing a cloud computing deployment that uses the public model

  What were the prevailing characteristics of the team leaders

The Williams, Parker, and Turner (2010) article discusses teams that perform proactively. Think about a time when you worked on a proactive team and another time when you worked on a reactive team. What were the prevailing characteristics of the..

  Question about software as a serviceplaying devils advocate

question about software as a serviceplaying devils advocate for a while could not one argue that software as a service

  Why are there so many versions of os

As a system administrator who is responsible for your company's network, you understand that operating systems (OS) are various. Discuss the following queries: Why are there so many versions of OS

  Write about the negative aspects of social computing

Prepare a Power Point, Discussion Points to lead/engage the audiance, and a 2 page paper, summarizing the points All about The negative aspects of Social Computing

  Cincinnatti software and scheduling technique

Cincinnatti Software: Scheduling Technique - If you were the project manager, which method would you use, and why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd