Information Use

It is very Important to protect the information of organizations today due to the high levels of fraud that is being committed out there. Imagine going too bank and someone left their computer unlocked for others to gain Information to. If your personal information was on that screen and someone else took down or noted your social security number or date of birth, it would make you feel really leery about doing business with that bank. At my employer we are forced to lock our computers before we leave our desks. It is being monitored by video review and we can lose mints on our audit if we are caught leaving our workstations unlocked.

When people provide Information, especially personal Information, they trust that the organization will protect that Information that Is given so that It does not get Into the wrong hands. The basic elements to protect information today is firewalls, and security software programs that help prevent intruders from attaching companies private information. Firewalls help protect connections on local devices where information may be retrieved. Control Alt and delete also help lock our workstations from people possibly aiming access to personal or business information.

I believe it’s important for organizations to protect their information because network security threats are becoming more eminent with the dramatic evolution of technology. Old methods take new form; I read not too long ago that there’s a new method of pickpocket called “electronic pickpocket”–Welch exploits the RIFF card embedded within newer credit cards. This allows the thief to access private account Information and process transactions. Now this Is Just example is on a smaller scale, so try and Imagine the name type of security breach but with sensitive company documents.

Company’s like Sony suffered a major breach not too long ago causing the USN network to shutdown for fear of further attacks. Customer information was obtained leading company experts to believe that their credit info was the primary target. Issues such as these create uneasy feelings for customers, and It’s hard to repair a reputation once you take a hit of this magnitude. Some basic elements that help prevent cybercafés are firewalls and intrusion detection systems (IDS). Firewalls control the access of private networks, only allowing access to secure or approved websites.

Id’s monitor the traffic within a network and raise alerts when suspicious or fraudulent activity Is taking place. These countermeasures assist In protecting private or valuable information, regardless If Its on a personal or professional level. Management Information systems (MIS) deliver routine reports and summaries to transaction-level data to middle- and operational- level managers to provide answers to structured and semi-structured decision problems. They help managers control the business by providing information on the rim’s performance.

They produce fixed, regularly scheduled reports based on data extracted and summarized from the firm’s underlying transaction processing systems (TAPS). Traditional MIS produce primarily hard-copy reports; however, many of the generated on demand. Decision support systems (ADS) provide analytical models or tools for analyzing large quantities of data and supportive interactive queries for middle managers who face semi-structured decision situations. ADS support semi- structured and unstructured problem analysis. The earliest ADS were heavily model river, using some type of model to perform “what if” and other kinds of analysis.

In a “what if” analysis, a model is developed, various input factors are changed, and the output changes are measured. ADS analysis capabilities were based on a strong theory or model combined with a good user interface that made the system easy to use. Some contemporary ADS are data driven, using online analytical processing (OLAP) and data mining to analyze large pools of data in major corporate systems. They support decision making by enabling users to extract useful information that as previously buried in large quantities of data.