-
QUESTION
Title:
Business Information Systmes - Discussion Questions
Paper Details
1) How can a company participating in ebusiness keep its information secure?
2) What technologies can a company use to safeguard information?
Subject | Business | Pages | 3 | Style | APA |
---|
Answer
Business Information Systems
Business Information Systems (BIS) is a programme that focuses on electronic trading otherwise known as e-commerce. Due to the advancement in the levels of technology as well as growth in market demands and dynamism, traders have been forced to major on e-commerce (Bocij, Greasley& Hickie, 2015:p.92) However there are various things that must be done so as to ensure that the process of electronic trading is smooth. While electronic trading across the globe using the computer network is very profitable, it can also be porous to certain challenges that may jeopardize the smooth process. In order to ensure that information is secure while trading online, companies that engage in this kind of trade can do the following;
Using Of Stronger Passwords
While passwords are good ways through information can be protected, information thieves have mastered the various ways through which it can be tampered with so as to access information without authority. It is therefore not enough to have passwords, but they should be serialized in an effort to sophisticate them and bar malicious individuals from accessing them (Bocij, Greasley& Hickie, 2015:p.97).
Have regular Screening
This can be achieved by designing the system such that all those who log in are required to answer certain questions before they are allowed to transact. Beside this, the system should be able to sense face. This can help in restricting the people who are allowed to access information in the system.
Having Multiple Backups for the Information in the System
Being that the information stored in the system can be tampered with by unauthorized individuals, it is prudent that a proper back-up be put in place to cater for a loss. Besides this, stored information can allow the administrator of the system to refresh it any time they sense malice that threatens the safety of information in the system.
Regular Updating of the System
This will help in meeting the current requirements in terms of accessing the information in the system as well as securing the information in the system. For this to take place, the users of the system must be thoroughly trained on how to join hands in protecting the information in the system (Bocij, Greasley& Hickie, 2015:p.92. It is worth to note that security threat of the information in the system can even be caused by the legitimate users of the system. It is therefore important that they also be trained on how to protect their information and the importance of securing information.
Guarding Information through Technology
As has been stated earlier, information in the system is susceptible to various threats which therefore calls for using of the various ways available to protect the information. Technology has provided various ways through which information in the system can be protected (Bocij, Greasley& Hickie, 2015:p.101). Some of the specific ways through which information can be protected include;
Usage of Cloud Computing
This is the process through which information is stored using secluded or else remote servers which are within the internet to store information. Other than data storage, this kind of technology can manage and process data remotely. This is one of the brand innovation in the field of technology in an effort to secure information in the system.
Endpoint Detection and Response (EDR)
According to Bocij, Greasley& Hickie (2015:p.112),this one of the ways that has been introduced by the information specialists, where information is protected through detection by (Chief Information Security Officers) CISCO on any security threats and initiate an appropriate response immediately. This helps in reduction of the magnitude of malice that can be caused by the information thieves. These among other ways are some technological applications in information protection.
References
Bocij, P., Greasley, A., & Hickie, S. (2015). Business Information Systems, 5th Edn: Technology, Development and Management for the E-Business. Harlow, England: Pearson.
|