Facebook Pixel Code

Threats to Information Systems in the Cyberspace

This is a preview of the 10-page document
Read full text

Information plays a critical role in Eazee Shopping’ s business decision – making and any threats to information security should be considered as a direct threat to smooth functioning, business growth and sustainable development of the supermarket business. As far as Eazee Shopping information security strategy is concerned, it should be pointed out that supermarket chain is required to train its IT workers so that they could become physically and mentally prepare regarding the use of new operational, executive and decision support systems. Then, the company needs to employ different strategies such as continuous system monitoring, performance appraisal framework for systems’ assessment/evaluation and Acceptable Use Policy (AUP) to ensure physical systems’ and network security.

The above-mentioned policies will be discussed in detail in a separate chapter. For instance, Eazee Shopping should maximise internal systems’ security by using stronger Oracle Applications, by informing organisational members in advance about certain programming flaws and defects, by building security profiles and storing in Authorisation Management Systems, and by using organisation-wide and division-wide system security approaches. The above-mentioned plans will also be discussed in detail in a separate chapter to provide readers with an insight into the implementation of various system security plans by Eazee Shopping.

As far as the perceived threats are for Eazee Shopping supermarket chain are concerned, it should be pointed out that the UK based chain has been shifting towards an online business model because of increment in internet users and potential online buyers. The debit, credit, visa and e-cards are normally used by consumers to shop online, which is viewed as relatively convenient, reliable and hassle-free shopping nowadays. In addition, online shopping saves time and reduce transportation/travelling expenses.

It is worthwhile to mention that consumers will provide their private business account information, credit card numbers and contact details that will be stored in a management information system (MIS) of the Easy Shopping supermarket chain.  

This is a preview of the 10-page document
Open full text
Close ✕
Tracy Smith Editor&Proofreader
Expert in: Information Technology, Agriculture, Engineering and Construction
Hire an Editor
Matt Hamilton Writer
Expert in: Information Technology, Military, Technology
Hire a Writer
preview essay on Threats to Information Systems in the Cyberspace
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples

Contact Us