Define a set of policies and procedures

Assignment Help Management Information Sys
Reference no: EM131435185 , Length: 2

Read the Case Study at the end of Chapter 7. Perform the following and present the results in a 1- to 2-page report:

Hackers broke into a computer at the University of California at Berkley recently and gained access to 1.4 million names, Social Security numbers, addresses, and dates of birth that were being used as part of research project. The FBI, the California Highway Patrol, and California Department of Social Services were investigating the incident which happened in August 2004.

Security personnel were performing a routine test of intrusion detection when they noticed that an unauthorized user was attempting to gain access to the computer. A database with a known security flaw was exploited, and a patch was available that would have prevented the attack.

The negligence in attending to the known security flaw appears to be a common mistake among institutes of higher learning in the state. Banks, government agencies, and schools are known to be the top targets for hackers. Hackers may attack financial institutions in an effort to profit from the crime, and government agencies to gain notoriety.

Private companies generally have made at least some effort to ensure that data is secure, but hackers attack institutes of higher learning often because there are frequent lapses in security. This presents a problem not only for the university, but also is a danger to other entities, since denial-of-service attacks may be generated from the compromised university computers.

One of the problems at universities may be the lack of accountability or overreaching department that has authority to oversee all systems, and limit modifications. In the name of learning, many lesser qualified individuals, sometimes students, are given authority make modifications to operating systems and applications. This presents a continuing problem for administrators and represents a threat to all who access the Internet.

UC Berkeley Case Study

Financial and government organizations store a good deal of personal information, such as Social Security numbers, birth dates, and addresses. As a result, they have been attractive targets for hackers. Because most of these institutions have improved their access controls, hackers may choose instead to attack organizations with similarly valuable data but lower security.

Read the Case Study at the end of Chapter 7. Perform the following and present the results in a 1- to 2-page report:

· Define a set of policies and procedures that would allow educational institutions to limit vulnerabilities while still allowing students access to academic systems.

· Determine who should be ultimately accountable for ensuring that a security policy is in place and is enforced.

· Identify the person at your school who is responsible for maintaining the security policy and prepare your recommendations as a memo to him or her.

Reference no: EM131435185

Questions Cloud

Warehouse manager of a large auto parts company : You are the warehouse manager of a large auto parts company. The inventory turns over at least three times every year. Your task is to recommend either a decentralized or centralized system. What would you recommend and why?
Explain the management of human capital in the organization : Briefly describe the management of human capital in the organization. Describe three employment laws and the consequences of non-compliance.
Write a expression for the relative velocity along the line : a) Write a expression for the relative velocity along the line of sight at Galactic longitude for all observed objects at any radius R, in terms of the rotation velocity at that radius V(R), the angle L and our radius R0?
Practical and convenient ways to look at stock valuation : Discuss why growth rate models are practical and convenient ways to look at stock valuation? Explanation must be included with formula of growth rate?
Define a set of policies and procedures : Hackers broke into a computer at the University of California at Berkley recently and gained access to 1.4 million names, Social Security numbers, addresses, and dates of birth that were being used as part of research project. The FBI, the Califor..
In information systems what is competitive advantage : In information systems what is competitive advantage? Why is importan? Examples? What is digital economy(e commerce)? Why is important ? Give some examples?
Assignment on implementing the budget : Write a three to four (3-4) page paper addressing the criteria below. (Note: Change the title of the report to reflect the selected agency's name and the years to 2013-2014.)
How does a kanban system overcome given disadvantage : From an internal, operational perspective, if JIT is strictly adhered to, what is one downside to making everything literally "to order?" How does a Kanban system overcome this disadvantage? How exactly does a Kanban system of visual scheduling work..
Determine the future value of a target venture : Determine the future value of a target venture which has net income expected to be $50,000 at the end of four years from now. A comparable firm currently has a stock price of $20.00 per shares; 100,000 shares outstanding; and net income of $50,00..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd