Professional Documents
Culture Documents
Management Information Systems Assignment 01 Amogne Assaye ID MBAO494814B PDF
Management Information Systems Assignment 01 Amogne Assaye ID MBAO494814B PDF
Management Information Systems Assignment 01 Amogne Assaye ID MBAO494814B PDF
B: The information system that company X use has security issue. Information should be secured
from access by unauthorized users. The basic tenets of information security are confidentiality,
integrity, availability, authenticity, and non-repudiation. Every element of the information
security program must be designed to implement one or more of these principles. Together they
are called the CIA Triad. Good information security policy has the following seven characteristics:
Endorsed – The policy has the support of management.
Relevant - The policy is applicable to the organization.
Realistic – The policy makes sense.
Attainable – The policy can be successfully implemented.
Adaptable – The policy can accommodate change
An effective information security system comprises of four elements: Protection, Detection,
Verification & Reaction. These are the essential principles for effective information security on
any site, whether it's a small independent business with a single site, or a large multinational
corporation with hundreds of locations. The five information security goals are confidentiality,
availability, integrity, accountability, and assurance.
C: The information system that company X use is over complex or not simple. It is very difficult
to use it for decision making easily. information system should be integrated set of components
for collecting, storing, and processing data and for providing information, knowledge, and
digital products. Information should be too simple, not complex. More detailed information
might not have needed. Since too much information can cause information overload weather a
decision maker has too much information and is unable to determine what is really important or
not.
D: The information system that company X produced to their customer has accessibility issue.
Information need to me easily accessible by authorized customers only. Information should be
access by the User or its Employee to the System using an Employee account, where the User is
aware of and authorizes that Level of access to the System. Unauthorized access is when a person
gains entry to a computer network, system, application software, data, or other resources
without permission. Any access to an information system or network that violates the owner or
operator's stated security policy is considered unauthorized access. Hacking Is known as
unauthorized access into others system. Unauthorized Access & Hacking. Unauthorized Access
or Hacking is nothing but unauthorized attempts to bypass the security mechanisms of an
information system or network. It is the most popularize form and commonly known cyber-crime.
Question number 3. Based on the brief descriptions provided below identify specific IS
characteristics and briefly explain them:
a. An information system developed by a Four Star Hotel was found to be difficult to
interact with based on the feedback obtained from guests of the Hotel.
b. YIC has been using an HRMS developed in Windows 7, recently a latest computer
with Windows 10 was procured by YIC and it was found difficult to transfer the
system from Windows 7 to Windows 10.
c. Employees who are working at the Registrar Office have been found to complain
about a new implemented system that the system failed to interact with the existing
printers, finance system and procedures in place.
d. YIC has a student community geographically dispersed across different locations.
Review of YIC technical teams of LMS identified that students complained the fact
that they failed to get the service from their respective location and time zone.
Answers for question # 3
A: The developed information system that a Four Star Hotel user for their customer has a
reliability issue. Relevant information is data that can be applied to solve a problem. This is a
particular issue when determining the format and content of an entity's financial statements,
since the proper layout and level of detail of information can adjust the opinions of users
regarding the future direction of a business. Relevant information is any information that would
have an impact on the decision. Relevant information can come in the form of costs or revenues,
or be nonfinancial in form. For information regarding costs, this means determining which costs
are avoidable and which are unavoidable. We can identify relevant information by below some
methods. These are: census data, institutional records, private correspondence, oral testimony,
research diary, original datasets, reports and dissertations.
B: YIC HRMS Windows was developed from Window 7 to Windows 10 and it was found difficulty
to transfer the system from Windows 7 to Windows 10. This is window information system
upgrading related issue. As of January 2020, Microsoft is no longer supporting Windows 7. It is
highly recommended upgrading to Windows 10, per the instructions to continue receiving
security updates and technical support. YIC Information system professionals shall follow the
steps and upgrade the windows to new computer system which uses windows 10. Then,
transferring old system back up all important documents, apps, and data from Windows 7 and
installing new printer on computer for networking and configuration on new system.
Finally, an IT professional should consider minimum system requirements to run Windows 10 and
arrange the role-based access control (RBAC) based on their roles and level of responsibility.
This role-based access control is a method of restricting network access based on the roles of
individual users within an organization.
Employees are only allowed to access the information necessary to effectively perform their job
duties. Access can be based on several factors, such as authority, responsibility, and job
competency. In addition, access to computer resources can be limited to specific tasks such as
the ability to view, create, or modify a file.
Generally, an IT professional should follow the basic characteristics of Information system;
1. Availability/accessibility: Information should be easy to obtain or access for all YIC
Financial Management members based on their level of responsibility privileges.
2. Accuracy: An information should be accurate and clear when transfer from old system to
new
3. Level of detail/conciseness: An information system details and access should be granted
to the staffs based on their level of responsibility privileges.
C: An employee's role who are currently working in an YIC should be well trained for the newly
developed Windows 10 and be part of the new era or solution. They may have a permission that
individuals are granted. Since lower-level employees can't access sensitive information or
perform high-level tasks. As a result, lower-level employees usually do not have access to
sensitive data if they do not need it to fulfill their responsibilities. This is especially helpful if you
have many employees and use third-parties and contractors that make it difficult to closely
monitor network access. YIC Financial Management System need to have a backup data for all of
YIC important documents and transaction.
Windows 7 has served as many PC users’ operating system, but as Microsoft is no longer
supporting this version of the operating system.
D: YIC has a student community geographically dispersed across different locations.
Review of YIC technical teams of LMS identified that students complained the fact
that they failed to get the service from their respective location and time zone.
Please note that there are many benefits for YIC online classes for students. This include: -
Flexibility. Many people turn to online learning for its flexibility.
Ability to Advance a Career.
Wider Range of Courses and Programs.
A Broader Range of Perspectives.
Immediately Applicable Coursework.
Affordability.
Time Management Skill Development.
Virtual Collaboration Opportunities.
However, even YIC online classes have aforementioned benefits it may have difficulty to attend
LMS class due to geographical time zone issue to some students that failed to get service. This is
because online courses require more time than on-campus classes and require good time-
management skills. YIC teachers used to teaching in a classroom provide an effective online
learning environment for all their students, regardless of access and need. It takes a lot of
patience, flexibility, and creativity. Here are some tips to help YIC students learn in these very
unique systems.
The End!
Thank you!!