CLASS TALK 4
Doing security business can be a costly venture for organizations.It entails safeguarding the information using resources that do notexceed the value of the information. As a result, many organizationseach year invest millions to safeguard technology. Informationsystems today textbook is an example of technological safeguardsthat companies and organizations implement to ensure that the companysecured. According to Valacich andSchneider (2013), IT systems are expanding within allorganizational aspects today. The book breaks down six methods ofsafeguarding through technology. Of the six, restriction physicalaccess is amongst the best methods of applying security and mostcostly. It is amongst the oldest but also a timeless method ofsafeguarding organizations. However, it is too costly and providesminimal benefits especially to today’s digital organizations(Valacich & Schneider, 2013). Cyber crimes have grown toanother level and out do physical access restrictions. Therestriction of physical access to outsiders is not enough as long asthe insiders can access data. Outsiders can hack the data and tamperwith the hardware devices for each station leaving the companyunsecured argues Shajahan.Wastage of money and yet information is leaked to external sources isnot worth the cost.
In response to the student’s post, I accept that audit controlsoftware is a costly and limited way of safeguarding the companyinformation. It single role of providing an audit trail is anadvantage that many companies enjoy but as it remains imperative tothe company, it is also too limited. This limitation according toChris keeps an individual trail to a minimum, which is not what thecompany is looking for to safeguard its information. According toJessup et al. (2006), there is a need for organizations to invest intechnological safeguards that suit the cost and appropriate securityservices.
Another method of technological safeguarding is the firewall. Justas the term suggests, firewall is a defense mechanism that protectsand safeguards computer networks. According to Valacich& Schneider (2014), firewall is the part of a computerthat inspects and detects access of private network into the system.The importance if this detection is acting like a security wall toprevent external intrusion and act as a defense for computersecurity. With increased hacking of network hacking and externalattacks on the privacy of computer securities, a firewall is asuitable software program. I agree that companies should use it asone of the safeguarding technologies largely.
The combination of hardware and software program if implemented canmake a perfect safeguard system. Through the using firewall, multiplecomputers connected to the same network are secured(Valacich and Schneider, 2014). The firewall acts as afiltration whereby messages that leave or enter the network passthrough the firewall and are blocked or allowed to pass. It acts likea filtration allowing passage or blocking passage to the network.Organizations that have many computer systems are thus advantaged andprotected from intrusion. This intrusion is not safe for the companyas it puts a company’s information at risk of contamination andgreatly threatens a company’s confidentiality. Firewall preventsthe possible destruction of computer security defense mechanisms. Itis worth investing in firewall safeguard systems bearing in mind thepotential risks that may occur if a company fails to secure theircomputer networks.
Jessup, L. M., Valacich, J. S., &Wade, M. (2006). Informationsystems today. Toronto:Pearson Prentice Hall.
Shajahan, S. P. R.(n.d.). Managementinformation systems.
Valacich, Joe, & Schneider,Christoph. (2013). InformationSystems Today: Managing in the Digital World, Student Value Edition.Pearson College Div.
Valacich, J., & Schneider, C.(2014). InformationSystems Today, Managing in the Digital World.(6th ed). (Upper Saddle River, NJ: Pearson Education