International Information System Security Of A Global Essay

International Information System Security of a Global Enterprise IT Network

Managing the security for an international network that supports key enterprise applications including marketing, sales, human resources, finance and administration across four continents must be coordinated with a strategic security information systems plan. The intent of this analysis is to show what some of the potential security threats are to managing a diverse IT network across diverse geographic locations, and what strategies or tools can be used to mitigate and even in some cases eliminate these threats altogether.

Analysis of Global IT Strategic Planning

There are a myriad of potential threats that could impact a global IT infrastructure, especially one distributed across four nations, supporting several key enterprise applications. The most common and potentially lethal threat is the network's perimeter is compromised through access of a corporate server at a firewall location. Hacking through authentication proxy servers has become...

...

This threat is beyond the scope of common phishing and individual productivity-based attacks. The approach taken with these strategic threats is to impersonate the packet on a company network down to the TCP/IP registration level so it is imperceptible to packet sniffing technologies and firewalls (Chang, Wang, 2011). This type of security threat can quickly infiltrate throughout an entire network, creating a platform for future access at any time. In conjunction with this treat is the evolving nature of packet redirection transaction-based workflows throughout an organization. This often occurs within Enterprise Resource Planning (ERP) systems that have e-commerce front-ends or electronic storefronts that can easily be hacked and have specific codes embedded in their front-end applications (Gillies, 2011). The hacking of an ERP system will in turn provide access to catalog management, order management, pricing and services costing across a very wide spectrum of locations. Once an…

Sources Used in Documents:

References

Chang, K., & Wang, C. (2011). Information systems resources and information security. Information Systems Frontiers, 13(4), 579-593.

Gillies, A. (2011). Improving the quality of information security management systems with ISO27000. TQM Journal, 23(4), 367-376.

Pernul, G. (1995). Information systems security: Scope, state-of-the-art, and evaluation of techniques. International Journal of Information Management, 15(3), 165-165.


Cite this Document:

"International Information System Security Of A Global" (2013, February 08) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/international-information-system-security-85773

"International Information System Security Of A Global" 08 February 2013. Web.26 April. 2024. <
https://www.paperdue.com/essay/international-information-system-security-85773>

"International Information System Security Of A Global", 08 February 2013, Accessed.26 April. 2024,
https://www.paperdue.com/essay/international-information-system-security-85773

Related Documents

Information Systems Outsourcing Advantage and Risks There appears to be some confusion and trepidation about the use of outsourcing for Information Systems in today's organizations. While some advocate for the use of IS outsourcing still others state claims that it is not an effective or efficient organizational practice. The objective of the research contained in this study is to determine the effectiveness and efficiency of information systems outsourcing practices. The significance of the

The company's consistent top line revenue growth also illustrates it has been successful in transforming its supplier network into one that operates more on knowledge, less on purely price or product decisions. As a result the company is capable of competing more at the process level and less at the purely price-driven one (Reese, 2007). In terms of the company's factors for success, the greater opportunities is to move into

Third, the information systems implications also need to concentrate on how to manage pricing and discounting across product groups and also across payment methods. This is an area where small businesses can gain significant competitive advantage and one that is consistently ignored or not undertaken at all. For the payment card strategies in small businesses to be profitable, information systems, specifically applications, need to be created and managed to ensure

They have a moral obligation to the South African people in this area for many reasons. First, they have an obligation to make certain that they can participate in the global economy to give their citizens the same chances for advancement as other nations. Secondly, they have a moral obligation to do everything possible to keep their citizens safe. When one discusses the topic of security in Information and Communication

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are: