NowtAdminCase Studiesmodule1Module2Module3Module4Module5Module6Glossary

 
nowtOrganisational StructureLife Cycle of MISCorperate StrategyInformation Data and KnowledgeManagement of ChangeLegal IssuesTrainingProject ManagementInformation and the Professionalnowt
endlegal AspectsAudit RequirementsDisaster RecoveryControlling the SystemRisk AnalysisLegislationH&SQuestions 1Questions 2end
 

Disaster Recovery Management

An Information System is vulnerable to a wide variety of threats to its security.

Physical The system and its data are susceptible to physical damage from flood or fire and from theft and vandalism.
Document Documents within the system may be lost or fraudulently altered. The data may be incorrectly copied from the document
Personnel Personnel may have access to inappropriate files or they may be able to copy or alter data in an unauthorised way. Unauthorised individuals may have access to hardware and data
Hardware The hardware is vulnerable to physical damage and theft. It is also vulnerable to breakdown due to normal wear and tear or to electrical spikes.
Communications The system may be vulnerable to hackers or virus attack through a communications link. In addition lightening strikes on network cable may damage computers linked to that cable. Data transmitted through a network is particularly vulnerable to interception which is very difficult to detect.
Software The software used by the system may contain bugs or an employee or hacker may have altered it for fraudulent purposes.
File Data stored in files is vulnerable to unauthorised changes and unauthorised individuals can obtain confidential information

A large number of these threats and measures suitable for protecting against them or their effects have been dealt with in other sections. We will look at some of the operational and administrative controls that can be used to ensure the secure and accurate processing of data within the system.

   

© LEV