Experiencing MIS
Experiencing MIS
8th Edition
ISBN: 9780134792736
Author: KROENKE
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 5.3, Problem 4SW

Explanation of Solution

Security:

Security plays an important role in protecting the digital information from the unauthorized user.

Organization that would place greater value on security:

Some example organization that would place greater value on the security is Health care services and Law enforcement agencies.

Security in Health care Services and Law enforcement agencies:

Health care services are focused in storing the patient data and the information stored about the patient needs to be secured because they are data based on the federal regulations.

Law enforcement agencies are focused on storing information regarding the criminals and those data needs to be secured for performing investigations on the criminals such that no tampering is made and it should ensure proper custody chain.

The above mentioned data present in the health care services and Law enforcement agencies are needs to be secured because they deal with the federal regulation and hence they are concentrated in the security than the convenience...

Blurred answer
Students have asked these similar questions
Security breaches in information systems are very commonplace these days even though some organizations have what they believe is good security controls. Because of their vulnerability to threats from hackers, internal personnel, and poor management of Hardware and software devices, security controls always need revisiting.From my perspective as manager of the Accounts and Finance department, every security breach affects this department even if it is just down time to be at meetings, to discuss strategies and costs to repair damages. When the breaches occur, unauthorized access is gained to either, do something malicious to the organization's resources to steal or sabotage data for financial gain.This usually results in the company's reputation/integrity being damaged, Loss of revenue during downtime, high costs to repair and restructure. legal ramifications are expected as well if guilty persons are found or if customers decide to sew for breach of contract and losses.Two Reasons…
1. Develop a list of items (in the framework of IT and security) that you would find necessary to consider when bringing on a new employee. For example, What technical items need to be considered? What accounts might need to be setup? How fast should someone be given access to materials? What type of security should be implemented? Provide examples - Write a step-by-step process that a company should take to make sure all security steps are covered. Be detailed in what you expect the company to do and the employee to do.
In the area of Information systems security, there are a number of phases that a business will follow to conduct this security. Two of the phases are "Implement controls" and "Review & Update security process". What is the relationship between these two phases regarding their purposes? Do not just state or explain what each of these are, but regarding their overall purposes explain their relationship.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,