Discussion Questions
1-2 paragraph response
"Providing Security Over Data"
Please respond to the following:
The CIA triad (confidentiality, integrity, and availability) offers three (3) security tenets that allow data owners the framework to secure data. Considering your place of employment or your home computing environment, discuss in detail the primary means in which each of the three (3) tenets are addressed to mitigate risk and enhance security in your chosen environment.
Confidentiality refers to the privacy of information. Attaining confidentiality is achieved through several ways in my work place. There are several measures employed in the systems and networks used at my work place aimed at preventing sensitive information from reaching unauthorized people while ensuring that the authorized people attain the information. The organization has strong passwords and usernames that are assigned to the right people for access to the system. Additionally, all the information relayed through the information system is heavily encrypted. There are several access control measures used by the organization in attaining confidentiality such as two-factor authentication procedures.
Accuracy, trustworthiness and consistency of data and information are attained through access control methods that target data and information integrity. The organization employs the use of such methods as strict file permissions and user access controls. Version controls have been employed to deter erroneous alterations or accidental deletion of data. The organization attains data availability through rigorous hardware maintenance, hardware repairs and attaining the correct functioning operating systems. Other techniques employed include failover, high availability clusters and redundancy.
The proliferation of mobile devices to create or access data has had a significant effect on the security concerns surrounding personal and corporate data. From the selected e-Activity article, summarize the attack, and determine the key ways in which you would consider mitigating the threat.
The use of mobile devices to access data through mobile apps presents firms with new threats to their data and business processes as well. Mobile apps are used in different ways to perform attacks and system breaches across the globe. One of the major attack techniques is embedding or creating a backdoor to the mobile app which attackers use to gain access to private and corporate data. One way of mitigating the effects of such attacks is to ensure to download and use only certified applications. Additionally, most of the applications take advantage of rooted mobile phones or devices. It is imperative to read and understand the terms and conditions of a mobile app before installing it so as to ensure that it is give only the required permissions.
Discussion Questions
CIS336
Discussion 1
1-2 paragraph response
"Social Information Technology (IT) and Business Frameworks"
Please respond to the following:
Consider collaboration as one of the social IT categories in which Facebook, LinkedIn, blogs, and Twitter are used to extend the reach of stakeholders and employees. Determine at least three business functions that could be used by this social IT. Predict possible problems that you foresee.
Collaboration between more than two organizations presents new and more business functions to the social IT. One of the functions will entail enhancing data and information sharing among the organizations involved. Additionally, collaboration presents the organizations with an opportunity to share strategy before technology. These business functions present several risk to the organization given that there is a possibility of sharing private and sensitive information that should remain private.
The Leavitt Business Diamond framework consists of four crucial components. Suppose we added an IS / IT component that sits in the middle of the diamond, thus creating a variation of the framework. Examine five relationships that the IS / IT components could facilitate between the other four components. Determine which relationship would be the strongest and which one would be the weakest. Support your reasoning.
The framework asserts that an organization is composed of four crucial components: tasks, people, technology and structure. It is the relationship and interaction between these components that ensures the success of the organization. Introduction of Information System or Information Technology presents additional component for interaction. The interaction between people and IT or IS would mean that their functions are made simple as opposed to manual operation. On the other hand, interaction between task and IT and IS would be stronger as compared to the other components. The strongest interaction would be between task and IT or IS while the weakest interaction would be between people and IT or IS.
Discussion 2
1-2 paragraph response
"Resources Frameworks and Plenitude"
Please respond to the following:
One might argue that value is not always realized when using resource-based view (RBV) framework, especially when considering the IT infrastructure and Information Repository. Determine whether you agree or disagree with this viewpoint. Provide three examples to support your position.
This model is a competitive advantage based model which makes use of valuable organizations resources; both tangible and intangible resources. It employs the use of these resources to create a competitive advantage to the organization, thus allowing an organization to be competitive against its peers. As a result it adds value to the organization given that competitive advantage means high profits as well as sustainability.
Some of the IT resources that can be modeled in quantifiable terms that show value include applications, IT infrastructure, Database, Networks, Organization-wide IT expertise and IT skills.