Professional Documents
Culture Documents
School of Information Technology
School of Information Technology
Assignment on
Identifying the challenges faced by an information system manager
who works with the Information Systems of an enterprise in terms of
Risk, Threat, Vulnerability, Exposure and Attack.
Submitted by:
Ritvik Gupta (18BIT0218)
Aditya Kumar(18BIT0235)
Who is an Information System Manager?
Information systems managers oversee technology use in a business or
organization. They make decisions about installation, maintenance and
upgrades on the electronic devices used in the workplace. Because they
must understand how to work with computer hardware, software, and
security.
• Executive Support System (ESS): Executive Support Systems (ESS) supply the
necessary tools to senior management. The decisions at this level of the company are
usually never structured and could be described as “educated guesses.” Executives rely
as much, if not more so, on external data than they do on data internal to their
organization. Decisions must be made in the context of the world outside the
organization. The problems and situations senior executives face are very fluid, always
changing, so the system must be flexible and easy to manipulate.
Challenges faced by an Information System Manager
These are the two main drives behind the endeavour of information management for an
organization. Compliance and efficiency.
email attachments
files on removable storage devices
visits to infected websites.
Hackers use malware to control our computer remotely, steal or destroy information, corrupt
hardware and software, or spread malware.
Spam or junk emails promote fake or non-existent products and services such as get-rich-quick
schemes, false prize or lottery wins, or fraudulent and poor-quality goods.
Cookies track our website visits and can build a profile of our online interests and buying habits,
and report these details to third parties.
Phishing uses fraudulent emails claiming to be from a trusted sender, such as a bank, to 'fish' for
information. Pharming occurs when a hacker infects our computer with a malicious code and
directs us or our customers to a fake website. Both are used for online identity theft or cyber fraud.
Conclusion
The above is a brief report of the various challenges and responsibilities of an Information
System Manager. The main goal is to increase the efficiency, productivity and
responsiveness of the system while ensuring the security of critical technological platforms
the business depends on. After overcoming the challenges, the system undergoes
vigorous testing in order to find vulnerabilities and for future development of the system.