Business Finance Homework Help

UOP Apple Plans for the Obscure Security Threats of the Next Five Years Discussion

 

I’m studying for my Business class and don’t understand how to answer this. Can you help me study?

How does Apple plan for the most threatening security threats for the next five years?

Here’s some information on the subject.

With the increase of security threats, security is so tied to the success or failure of Apple in achieving its mission and should be seen as an investment. Any business should look at security as a business problem, not merely a technological one. Many businesses are required by law to adopt a number of security measures. Few necessary steps are required to reach an information-centric strategy: creation and communication of an enterprise software security framework, knowledge management training, securing the information infrastructure, assuring internal security policy and external regulator compliance, and governance.

Information security has become an important management topic, but trade-offs have to be assessed. Further, security is a business problem, and management needs to make sure that all employees follow security policies. The biggest security challenges include managing increasing complexity, assessing

potential risks, raising the level of user awareness, enforcing security policies, and protecting against breaches. The effectiveness of security management also depends on external factors such as available vendor products and services, the commitment of partners, and the regulatory framework.

Implementing an effective information security strategy requires substantial resources and should therefore be viewed as part of the core competency of the organization. Apple should provide ongoing messages and awareness to prevent constant ongoing threats from outside the company.

Schuetz, Sebastian W.; Benjamin Lowry, Paul; Pienta, Daniel A.; Bennett Thatcher, Jason. Journal

of Management Information Systems. 2020, Vol. 37 Issue 3, p723-757. 35p. 1 Illustration, 9 Charts, 1 Graph. DOI: 10.1080/07421222.2020.1790187. Retrieved from the UOP Business Source Complete database.