We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Business Information Systems Essay Sample

The whole doc is available only for registered users OPEN DOC
  • Pages:
  • Word count: 945
  • Category: business

Get Full Essay

Get access to this section to get all the help you need with your essay and educational goals.

Get Access

Business Information Systems Essay Sample

Provide an analysis of the reasons why it is important to keep data safe and secure.

It is important to keep data safe and secure because if a company do not do so, then the data is vulnerable to other people and companies. This is very dangerous for the company as that data may be financial data or their customer’s data. If another company steals the data then they are likely to know the important details of the

Company they have stolen the data from and may take advantage of that data.

If a company do not use a login system, which allows only authorised users to view such confidential data by using usernames and passwords then they would be more vulnerable to unauthorised users therefore they allow their confidential data to be viewable to unauthorised users.

For example if a travel agent lose their data it is very dangerous for the company as their data contains personal details on their customers and all their prices for their tickets also the ticket details of future booking which is all very vital data.

If another travel agent company finds that lost data of a travel agents they can see the company’s prices of tickets, customer details and special offers.

The travel agents can take advantage of that lost data by decreasing its prices slightly than the other travel agents which would allow more customers to buy tickets from this travel agents. Also the travel agents could use the lost data by viewing all the customers’ details and contacting them saying to come to their travel agency to buy tickets. Also the travel agents can take advantage of the lost data by giving their customers much better special offers than the other travel agents from where they found the data, which in return would make more customers, buy tickets from this travel agency.

Provide an analysis of what might happen if security issues were not considered when using the Internet.

If you do not use security software when you use the Internet then you are putting yourself at risk by helping unauthorised users such as hackers to enter your computer and destroy all your important data. Also you would allow viruses to damage your computer system.

If you do not use spam protection for your email inbox then you may receive unwanted junk mail. This junk mail can be offensive material such as pornography including both text and images. These things can promote sexism, violence and personal abuse.

If you do not use anti-virus software such as Norton anti-virus or MacAfee anti-virus when using the internet then you are dangerously putting yourself at risks. This is because viruses are spread mainly on the Internet and where there is no kind of anti-virus protection, the virus can spread to that computer system. By doing so it can corrupt the file on your computer, stop programs not functioning properly or at all and can damage the whole computer system.

If you do not use firewall software when using the Internet then you would allow unauthorised users such as hackers or intruders to hack into computer systems.

This would result in the hackers to view all your confidential data and it would allow them to edit the data or permanently delete the data. Worst of all a hacker can damage your whole computer system.

If an organisation offers Internet services such as online shopping where customers credit card details is used to pay for products. The organisation should use a secure server. A secure server is when a user provides personal data to a website, he or she needs to know that the information cannot be read by anyone else. This is not only to comply with the data protection act, but also so that the user feels safe about providing their credit card details for online shopping. If a secure server was not used it may lead to customers credit card details to be misused by other users and can lead to a business having a bad reputation.

A secure server is used by the website to collect the data. This encrypts all the data so that if anyone does gain illegal access to it they will not be able to understand or use the data. Secure servers are used for all financial transactions over the Internet.

Describe measures to protect against Internet security threats.

There are two types of software’s to protect you from Internet security threats; these are anti-virus software and firewall software.

Anti-virus software helps to protect your computer from viruses while using the Internet by finding a virus if it occurs onto your computer and automatically destroying the virus itself or it would let you know before doing so.

Anti-virus software also scans for any types of viruses on your computer system and deletes them if it has found any. If a virus has already affected your computer then anti-virus software can fix it by recovering the infected program or file.

Examples of anti-virus software are Norton Anti-Virus and MacAfee Anti-Virus.

Firewall software helps to protect your computer from hackers and intruders while you are using the Internet. If a hacker were to hack into your computer system, firewall software would prevent him or her from doing so by blocking the network from him or her and your computer.

Examples of firewall software are Norton Firewall and MacAfee Firewall protection.

By using both anti-virus protection and a firewall software your computer is protected from the danger the Internet has to offer.

We can write a custom essay

According to Your Specific Requirements

Order an essay

You May Also Find These Documents Helpful

A Business Plan for an It Start-Up

The company is an ITES startup that makes apps and websites for third party. The business aims at targeting the lesser exploited markets of grocery stores, schools and medical stores. For doing the on-ground marketing of our services, we have planned to hire a salesman. We’ll train him well and make him enough knowledgeable about our business so that he can give us our potential...

Ethical and Legal Issues Revolving

A civil action film is a based on true life experiences that revolve around the good scenarios and issues that are bound to be tried by legal bodies. It is based on the true stories that were taking part in the year 1980s when the environmental pollution took place and better parts of Woburn. There was the ethical issue revolving around the film as there...

Business Ethics - International Trade Administration

As experts in business ethics, your expertise can be used to help breakdown a situation good or bad. In situations we can come in and erase the bad and replace with good or simple reinforce the good that is being done. In this case, we will be doing a lot of erasing for many reasons. This branch of the bank was not doing what it...

Wace Group’s To Scaling A Business

M&S was highly specific about the quality of paper, size of paper, cuts as well as delivery schedule. Though quality standards and technical skills were forte of Wace Group, yet some of the major changes that the company had to accompany in its order schedule, capacity schedule and delivery schedule. Most importantly were of important concern which on one hand can pose risks to the...

Business Accounting and Assurance Coursework

The conceptual framework has been defined as ‘a coherent system of interrelated objectives and fundamentals that is expected to lead to consistent standards.’ (FASB 1978) Answer the following questions in relation to the International Accounting Standards Board’s Conceptual Framework, 2010. Q1. What is meant by general purpose financial reporting and how does it differ from special purpose financial reporting?​The financial report implies noticing down the monetary exercise...

Get Access To The Full Essay
Materials Daily
100,000+ Subjects
2000+ Topics
Free Plagiarism
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access

Become a member

Your Answer Is Very Helpful For Us
Thank You A Lot!


Emma Taylor


Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59
Become a Member