preview

Strategic Analysis Decisions

Decent Essays

Many organizations are working with large amounts of data and important information that can be detrimental to the survival of their business, and organizations typically rely on information systems to manage and carry out their operations. Information systems can be described as an integrated set of components used for storing, collecting and processing data for providing information, digital products and knowledge (IMGI, 2006). For this paper, the strategic analysis decisions along with what we may need to watch out for pertaining URL for the IT field is discussed, along with the impact that these decisions will have on the company. Furthermore, the potential changes in IT related to innovation and organizational process is also reviewed, …show more content…

The first example is known as a cyberattacks, which is an offensive exploitation of computer systems, technology-dependent enterprises, and networks (Whittle, 2008). This type of attack uses malicious codes to change computer codes, dada, or logic which typically results in adverse consequences that can lead to cybercrimes. To mitigate this type of attack would be to monitor employees closely and pay attention to employees who may potentially abuse their positions. Managers could make the decision to use automatic safeguards and password management to help prevent such attack. Social engineering is another example of an internal information security risk. This is an attack that relies on human interaction and involves tricking others into breaking their normal security procedures. To mitigate this type of attack, managers should educate their employees not to provide their passwords over the phone or email. Information leaking is another internal information security risk. This is known to be one of the most popular types of risks, as it can be easy to leak information accidently. Digital cameras, cellphone and USB drives are examples of how information and be leaked from an organization since they are easily portable (Whittle, 2008). To prevent this sort of risk from happening, it has been suggested for employers to block access to web-based email and data storage …show more content…

An external risk typically is the result of an event that cannot be controlled by the company, however there are ways to help prevent such attacks. Examples of external information security risks are economic, natural, political, competitor, emergent technology, and changes in environment (Whittle, 2008). Although there may not be many useful tactics to help mitigate external security threats, it has been suggested to plan, prepare a backup plan, knowing one’s competitor’s capabilities, and keeping an eyes open. According to Whittle (2008), engineers are building cloud-based designs that are more disaster-tolerant to protect a potential threat from outsides

Get Access