Technical System

Improved Essays
Organization B has a formal system and a technical system, but no informal system.

1. What problems would arise in the organization? Why do you think so?
For an organization with only a formal system and a technical system, multiple problems may arise within the institution. It has been discovered that most insecurity cases involving information handling occur from the employees within. Many at times the employees are not aware that they are breaking company policies when they engage in informal communication in a public setting.
Problems that may arise include;
(i) The organization has no control over how much information or the sensitivity of the information being spread to the public. This poses a major threat as the company operates
…show more content…
(ii) Failure by the company to allocate enough resources to technical and formal controls in proportion to its criticality.
(iii) Failure by the company to implement non-employee clauses in their employment program such that when an individual cease to be an employee, he/she cannot discuss information about the organization.

2. What breaches of security could occur as a result of the missing system? Give at least two examples of security breaches in this context.
An informal system is designed to ensure that the formal system works. People unconsciously engage in informal communication and might end up slipping information that is not meant for the public ear. This kind of information breach may aid certain individuals to bypass the underlying security mechanisms in the organization and access unauthorized data among other vulnerabilities and sensitive data.
Examples of breaches:
(i) Unauthorized access to sensitive data by un-cleared personnel. This poses major threats to the organization.
(ii) Un-cleared personnel my alter sensitive data and this causes inconsistency with the information held within the organization's

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    All information written must be clear and relevant and should never be discussed outside of the work place. If an individual’s personal information is discussed outside of work to someone who is not their colleague, supervisor, or manager, then it is breaching the rules and conducts of this law and will be exploiting the service users confidentiality and…

    • 1741 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    The communication privacy theory focuses on privacy boundaries and what information one chooses to withhold from another person. This privacy management system is focused on three parts: privacy ownership, privacy control, and privacy turbulence. Privacy ownership is our private information that only we know and others do not. This also encompasses our personal privacy boundaries. Depending on the person, our privacy boundaries could either be thin and porous, or thick and hard to break through (Griffin p. 151).…

    • 1200 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    An administrator came to realize that their credentials had been used to run a query that they would not normally run, this would be a violation of separation of duties; which means that “any task in which vulnerabilities exist, steps within the tasks are assigned to different positions with different management”. Meaning that the attacker would have only been able to use this vulnerability through this employee because of their role in the copy, and other employee would have not had the ability to run this query. The attacker used job listing sites to narrow down what software Anthem uses to house their data; from their they used this public information to sort out over 100 employees that had access to this data. The attacker then used malware to get a hand full of employee’s credentials. Even though it is said that to keep all the personal information stored in Anthem’s computer system encrypted would have not stopped or prevented this attack because these attackers had done their research and knew what credentials they would need to perform the attack, no matter how the information was stored they still would have been able to access it.…

    • 536 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Consumer Data Breach

    • 1523 Words
    • 7 Pages

    In 2010, a Ponemon Institute study found that 85 percent of American companies fell victim to an organizational data breach during 2009 (Zurich, 2010, p. 2). The Ponemon Institute findings illustrate a necessity for businesses to expect to be a target for nefarious actors who seek to procure sensitive customer data. In the assignment scenario, the retail store unwittingly became a member in the growing percentage of organizations faced with customer data breaches. In an attempt to dissect and analyze the retail store’s customer data breach, I will begin this essay with the legal obligations and repercussions that the company faces, both criminal and civil.…

    • 1523 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Ehr Disadvantages

    • 505 Words
    • 3 Pages

    On the other hand, it is critical for nurses in the 21st century to have the ability to use technology to incorporate into patient care (Barnard & Sandelowski, 2012). In order to keep up with the competitive edge, nurses have to keep up with such changes. This can be a struggle for some nurses, especially for the older generation nurses (baby boomers). Another disadvantage is troubleshooting when technology malfunction. Nurses were not trained to fix the machine when it malfunctions.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The study also explains the fact that for most healthcare organizations the confidence level in its employees to actually notice a data breach is next to none. If they can’t detect the breach then they are not capable of notifying anyone in the event of one. A data breach can go undetected for quite some time before anyone is even aware of it. Another problem is there are so much time and money spent on policies and procedures and not enough money spent on enforcing them. It is important that healthcare personnel understand all of the laws regarding patient confidentiality.…

    • 1294 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Anybody working in a childcare setting should maintain a high level of confidentiality and should be well informed and familiar with current legislation. All schools will gather relevant information from parents and carers such as health and medical information, records from previous schools and records of any needs or disabilities the child may have. Any information that the school may need to pass on will need the child’s next of king’s consent. Under the data protection act 1998, any organisation that holds personal information and does not follow the correct procedure, will be abusing their professional position as well as breaching the human rights act 1998.…

    • 436 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Introduction ( thesis ) - James Zeigler, Justin Sanford The use of monitoring software in a business setting carries ethical questions about the level of monitoring conducted by employers and how this monitoring and restriction of access effects employee morale, and corporate trust. Employees will shop, do their banking, check up on personal emails, catch up on social media, tweet and in extreme cases watch their favorite Netflix series or television show. While some of these employees do this on occasion or on a short break such as lunch, others will abuse this access creating a problem for the company. Access to information comes easy these days and with the ability to obtain this information with just the click of a button can create hostile, unproductive environments in the workplace and even cause legal issues within the company.…

    • 2171 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Centuries ago confidentiality was not considered to be of upmost importance when it came to keeping peoples’ information from spreading throughout the community. There was no organized way of keeping records, which made information easy to assess and spread. In recent decades, the use of digital media in various careers has become popular and accepted by society. People are able to assess their medical records by signing onto an online network and pulling up their information. Going to the mailbox is soon to be a thing of the past, because we are now able to receive bills and important records through a computer system.…

    • 1760 Words
    • 7 Pages
    Superior Essays