Monday, May 6, 2019
Ismg 3000 chapter 15&16 Essay Example | Topics and Well Written Essays - 1000 words
Ismg 3000 chapter 15&16 - Essay Examplepatronage the fact that blogs have passwords to restrict data access, the passwords can still be manipulated by experts so that they atomic number 18 able to access the stored data. For example, when the IVK community training system failed, the competitors of the IVK beau monde, took advantage of the situation and wrote in their blogs about how the IVK Company had failed to upgrade its information system warrantor. Although IVK realized this, the come with employee decided to remain silent about the issue, just now instead made plans of how to be upgrading the security system regularly. IVK Company employees realized that the person who had written wild information about the IVK Company was a competitor and, therefore, the employees did not confront the writer. The manager promised the employees that such a problem in the information system failure would not occur in future. The Manager of the IVK Company promised to ensure that a polic y on IVK Company information system was prepared as in short as possible. The policy would specify the kind of information that the IVK Company IT system would have to store. The IVK Company learnt a lesson because, when the information system failed, competitors utilized the information stored in the information system to spread false information about the company to the public. The manager withal assured the IVK employees that the company would be purchasing the latest security systems to protect the company information. This was because cases of hacking and attacking by virus were becoming serious and a threat to the companys information system. The manager also revealed that the company was to use the social network such as Facebook and you tube to improve collaboration within the company (Richard 445)After the IVK Company information system collapsed, Barton and Davies, had a lot of problems trying to put the system back to normal. Not only were they to put it back, but also u pgrade it so that it was secure from hackers and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.