Vegan Garden is a small restaurant in the quiet city of Dawnsville. The restaurant has been operating for the past five years. Currently manual systems such as cash registers are being used for capturing sales and old filing cabinets are used for storing the sales reports for each month and other business documents such as employee and supplier information. The owner of Vegan Garden has decided to implement an information system. He sought the services of an IT company to build an information system that would align to the current business processes of the Vegan Garden. You are the appointed project manager for the development of the Vegan Garden information system. As the project manager of the development project, educate the owner of Vegan Garden on the security concerns regarding the information systems. Explain ANY FIVE (5) common security threats affecting information systems.
The Vegan Garden is a small restaurant in the quiet city of Dawnsville. The restaurant has been operating for the past five years. Currently manual systems such as cash registers are being used for capturing sales and old filing cabinets are used for storing the sales reports for each month and other business documents such as employee and supplier information. The owner of Vegan Garden has decided to implement an
You are the appointed project manager for the development of the Vegan Garden information system.
As the project manager of the development project, educate the owner of Vegan Garden on the security concerns regarding the information systems. Explain ANY FIVE (5) common security threats affecting information systems.
As use of internet and related telecommunications technologies and systems has become pervasive ,use of these networks now creates a new vulnerability for organizations or companies .These networks can be infiltrated or subverted a number of ways .As a result ,organizations or companies will faced threats that affect and vulnerable to information system security . Threats to information system can come from a variety of places inside and external to an organizations or companies .In order to secure system and information ,each company or organization should analyze the types of threats that will be faced and how the threats affect information system security.
Step by step
Solved in 2 steps