Monday, October 7, 2019
Ismg 3000 chapter 15&16 Essay Example | Topics and Well Written Essays - 1000 words
Ismg 3000 chapter 15 - Essay Example Despite the fact that blogs have passwords to restrict data access, the passwords can still be manipulated by experts so that they are able to access the stored data. For example, when the IVK Company information system failed, the competitors of the IVK Company, took advantage of the situation and wrote in their blogs about how the IVK Company had failed to upgrade its information system security. Although IVK realized this, the company employee decided to remain silent about the issue, but instead made plans of how to be upgrading the security system regularly. IVK Company employees realized that the person who had written false information about the IVK Company was a competitor and, therefore, the employees did not confront the writer. The manager promised the employees that such a problem in the information system failure would not occur in future. The Manager of the IVK Company promised to ensure that a policy on IVK Company information system was prepared as soon as possible. T he policy would specify the kind of information that the IVK Company IT system would have to store. The IVK Company learnt a lesson because, when the information system failed, competitors utilized the information stored in the information system to spread false information about the company to the public. The manager also assured the IVK employees that the company would be purchasing the latest security systems to protect the company information. This was because; cases of hacking and attacking by virus were becoming serious and a threat to the companyââ¬â¢s information system. The manager also revealed that the company was to use the social network such as Facebook and you tube to improve collaboration within the company (Richard 445) After the IVK Company information system collapsed, Barton and Davies, had a lot of problems trying to put the system back to normal. Not only were they to put it back, but also upgrade it so that it was secure from hackers and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.