Verified Document

International Information System Security Of A Global Essay

International Information System Security of a Global Enterprise IT Network

Managing the security for an international network that supports key enterprise applications including marketing, sales, human resources, finance and administration across four continents must be coordinated with a strategic security information systems plan. The intent of this analysis is to show what some of the potential security threats are to managing a diverse IT network across diverse geographic locations, and what strategies or tools can be used to mitigate and even in some cases eliminate these threats altogether.

Analysis of Global IT Strategic Planning

There are a myriad of potential threats that could impact a global IT infrastructure, especially one distributed across four nations, supporting several key enterprise applications. The most common and potentially lethal threat is the network's perimeter is compromised through access of a corporate server at a firewall location. Hacking through authentication proxy servers has become...

This threat is beyond the scope of common phishing and individual productivity-based attacks. The approach taken with these strategic threats is to impersonate the packet on a company network down to the TCP/IP registration level so it is imperceptible to packet sniffing technologies and firewalls (Chang, Wang, 2011). This type of security threat can quickly infiltrate throughout an entire network, creating a platform for future access at any time. In conjunction with this treat is the evolving nature of packet redirection transaction-based workflows throughout an organization. This often occurs within Enterprise Resource Planning (ERP) systems that have e-commerce front-ends or electronic storefronts that can easily be hacked and have specific codes embedded in their front-end applications (Gillies, 2011). The hacking of an ERP system will in turn provide access to catalog management, order management, pricing and services costing across a very wide spectrum of locations. Once an…

Sources used in this document:
References

Chang, K., & Wang, C. (2011). Information systems resources and information security. Information Systems Frontiers, 13(4), 579-593.

Gillies, A. (2011). Improving the quality of information security management systems with ISO27000. TQM Journal, 23(4), 367-376.

Pernul, G. (1995). Information systems security: Scope, state-of-the-art, and evaluation of techniques. International Journal of Information Management, 15(3), 165-165.
Cite this Document:
Copy Bibliography Citation

Related Documents

Information System on Ethical and
Words: 6479 Length: 15 Document Type: Research Paper

They have a moral obligation to the South African people in this area for many reasons. First, they have an obligation to make certain that they can participate in the global economy to give their citizens the same chances for advancement as other nations. Secondly, they have a moral obligation to do everything possible to keep their citizens safe. When one discusses the topic of security in Information and Communication

Security Information Is the Power. The Importance
Words: 5012 Length: 15 Document Type: Term Paper

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

What Information System Holds in Accounting Industry's Future
Words: 7679 Length: 20 Document Type: Term Paper

Information System holds in Accounting Industry's future? Looking through the glass and estimating what the future holds for any individual or profession is always a difficult exercise as the trends in any business or profession may change and so the path of development. It is better to look at the experience of some companies whose systems have changed over the past few years and thus try to estimate what is

Functions of an Information System. List and
Words: 3167 Length: 10 Document Type: Essay

functions of an information system. List and describe three types of enterprise systems. The four basic functions of an information system are gathering data, storing data, processing that data into information, and outputting the information (O'Leary & O'Leary, 2008). The system has to be able to collect data, or have the data placed into it, or it does not have anything with which it can work and with which it

Management Information System MIS in BAE Systems Inc
Words: 2147 Length: 6 Document Type: Research Paper

The role of Risk Management Information System (RMIS) in BAE Systems, Inc. With its headquarters in Virginia’s Arlington County, BAE Systems Incorporated has units in America, Britain, Mexico, Israel, Sweden, and South Africa that employ around 43,000 individuals. Its mounting yearly earnings suggest that it may be counted as one of the top global defense firms (Winzelberg, 1). Its extensive operations cover air, naval and land electronic systems, services, and platforms.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now