Business Finance Homework Help

Keiser University Cost of Safeguarding Organizations Information Systems Discussion

 

PART 1

Discussion is Discussion in Class Talk

The Cost of Doing Security Business

Providing security for an organization can be a costly venture. The cost of safeguarding our information and resources should never exceed the value of that information and resource.  As an MIS manager we are forced to make some very tough decisions each day.  Based on what you read in chapter 10 or researched online, select a security measure that you feel may be too costly and/or provides only minimized benefit and explain why.  Try to discuss this from a different perspective than your classmates, if possible.

To get minimum credit in our collaborative discussion, a minimum of three well researched posts on at least three separate days of the week is required for each topic. To make this collaborative, an initial post early in the week is necessary and then followed with at least two subsequent posts that could include any rebuttal comments on the position that other students have taken.

PART 2

Deliverables 

Answer the EVEN OR ODD “Chapter Review Questions” at the end of Chapters 10, 11, and 12 (see pages 320, 351, and 381) in complete, grammatically correct sentences. Number each question to correspond to the number on the question being answered and submit one Microsoft Word compatible document with all answers.

PART 3

RESPOND TO Bethany Griffith

The Cost of Doing Security Business

When we are thinking about information technology in an organization, we generally think of laptop and desktop computers, their servers, routers, and the switches that form the computer network. Information technology also includes fax machines, phone and voice mail systems, cellular phones, and other electronic systems. A growing reliance on computers to work and communicate has made the control of computer networks an important part of information security within any organization. Although unauthorized access to paper documents or phone conversations is still an information security concern for any organization, the real challenge has become protecting the security of the company’s computer networks, especially when they are connected to the Internet. Most large organizations have their own local computer network, or intranet, that links their computers together to share resources and support the communications of employees and any other member of the organization who has a need for access. Almost all of these networks are connected to the Internet and allow employees to go “online” and interact with one another. Investing more money into security for paper documents or phone records only provides minimum benefits these days because almost everything relies on the Internet. The need to control and protect information has grown exponentially now that data can be easily transmitted, stored, copied, manipulated, and destroyed. It would be too costly to spend a lot of money protecting the paper aspects of a company when the importance lies in the digital aspects.

References

Wallace, P. M. (2018). Introduction to Information Systems (3rd ed.).

RESPOND TO Jorge Gabriel Prieto Rojas

Cyber-attacks are inevitable in the current era. For this reason, organizations and individuals impose security measures to retain performance and efficiency despite the endangering risks. However, cyber-attack measures may be costly when compared to business value and profitability levels. Two-factor authentication is one of the costly security measures compared to the benefits and risks it covers. According to Yin et al. (2020), a two-factor authentication is a security approach that requires a user to offer two security codes before accessing entry into a network. It promotes the security level by requiring users to provide two correct passcodes. Otherwise, the system denies access. The typical example of two-factor authentication is e-mail verification when one tries to log in from another device (Pandey et al., 2019). There are free authenticators, such as google authentication; however, a large business requires a subscribed two authentication that is payable per user on monthly and annually deals.

Implementing two-factor authentication may seem inexpensive, but it becomes costly when an individual looks at the benefits and the number of risks it covers. Two-factor authentication prevents only authorized access to network resources via the provision of two different credentials. However, several other security threats, including phishing, ears dropping, malware attacks, spyware, and man in the middle attack, undermine safety (Filkins et al., 2016). It becomes costly as the company grows and the number of users increases since it has to cover the annual costs of every user. It is almost uneconomic to incur lumpsum on one security measure, whereas a firm needs several other security measures to promote data safety and integrity. Despite the cost ineffectiveness, two-factor authentication plays a crucial role in protecting sensitive personal information. Therefore, companies with a need for solid security measures should not be afraid of the cost.

References

Filkins, B. L., Kim, J. Y., Roberts, B., Armstrong, W., Miller, M. A., Hultner, M. L., … & Steinhubl, S. R. (2016). Privacy and security in the era of digital health: what should translational researchers know and do about it?. American journal of translational research, 8(3), 1560.

Pandey, S., Taffese, T., Huang, M., & Byrne, M. D. (2019). Human Performance in Google’s Two-factor Authentication Setup Process. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 63, No. 1, pp. 2221-2225). Sage CA: Los Angeles, CA: SAGE Publications.

Yin, X., He, J., Guo, Y., Han, D., Li, K. C., & Castiglione, A. (2020). An efficient two-factor authentication scheme based on the Merkle tree. Sensors, 20(20), 5735.