Friday, May 10, 2019
Management info Systems Discussion WK5 Essay Example | Topics and Well Written Essays - 250 words
Management info Systems Discussion WK5 - Es secernate ExampleFurthermore, a computer software hostage organization should be put in place to protect theft of software and useful applications on the same. On the other hand, a guarantor system should intergrate an online transaction security as well as a computer emergency response team in times of a red alert (Wright, 2009). Therefore, the in a higher place summary includes some of the vital guidelines for a comprehensive security system.The most important guideline is the condescension because it ensures safety of computer data that is stored away from the computer. It is significant because it forms a restore point incase data is stolen or destroyed by a virus. Moreover, in case of fire and the computer system is burn down down, the backup would be used to retrieve all relevant information that was in use previously. It would to a fault act as a software backup hence its importance as compared to the rest.The physical securit y measures could be eliminated and the system would not be weakened.this is because the physical security protects the hardware but not the software of the computer system. The most difficult measure to enforce is the biometric system because humans can access it say a workmate who knows the systems passwords. On the other hand, due to advancement in technology, hackers have better their hacking tactics and can hack a security system provided that they have a right tools to do so.In conclusion, a comprehensive security system is important because it protects the computer system from damage, theft, virus fervidness and provision of a restore point (backup). Therefore, the guidelines should be followed keenly to ensure a comprehensive security
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.