An information system can monitor access and utilization of sites or functions t
ID: 442641 • Letter: A
Question
An information system can monitor access and utilization of sites or functions that fall outside the daily responsibilities or functions of the organization. By integrating algorithms to identify this behavior, the system is essentially protecting itself from outside/fraudulent activity from outside threats. A company should minimize the use of company devices for personal use. The reason being is that as information systems become more complex and full of information, the more outside websites and information sharing activates cause a potential threats to those systems.
Discuss this briefly. Give examples
Explanation / Answer
Information system is a very powerful tool in today's world of dynamic business scenario. However, information systems are also susceptible to harmful viruses, hacking, and other external threats which have the potential to destroy the capabilites of the information system.
Thus, an organization should take steps to protect its information systems. For example, many comapnies like Evalueserve ( a consultancy firm with offices in USA, Brazil, Europe and India) do not allow its employees to bring devices like pen drive and CD in the office. They also do not allow use of websites like facebook, gmail etc.
Thus, by reducing its exposure to external elements, the company is protecting its information systems.
Many companies require the employees to share folders on key projects on a central server. These folders are password protected and access are usually given to employees associated with the project. This ensures that information and knowledge is safe and there is no potential for fraudulent activity.