Strategic Computer Security

An information system performs key functions for an organization. If for some reason, the system becomes non-functional for some time, the consequences may be unacceptable. Organizations usually have a set of emergency procedures for critical functions. In best scenario, the end user will not be able to discover the failure of regular system. The main reasons for system failures include power failure, data corruption, disk failure, network failure etc. One of first stops of disaster planning is to identify threats. Not all the threats listed earlier will be a concern to an organization.

After identifying the threats, appropriate disaster recovery plans should be implemented. Hardware backup In case of a natural disaster or due to technology failure, the hardware may become unusable. There are companies and firms that provide disaster recovery services. A company may provide a hot site that has an operational ready to use system. This is an expensive option, as the system is kept up to date, usually in different seismic zone. The next option is to maintain a cold site. A cold site provides the infrastructure but not the processing power and data. In case of a problem, the backup system is made operational.

Some companies provide data backup services. One can keep a copy of the data in electronic farm. Software Backup Software programs are precious assets of an organization that must be protected. A human error may delete a software package or a hardware failure may make it inaccessible. A simple strategy is to make copies of software and keep them safely. In addition, one may like to keep another copy of-site in a safe environment. The least one should do is take regular backup. If the data is too large, incremental backups can be taken or selected data may be backed up at regular intervals.

The smart strategy is to be in pro-active mode rather than reactive mode. It may be less expensive to plan ahead to avoid possible down time than suffer losses. (Hamel,G, Collaborate with your Competitors and Win) Conclusion Internet knowledge for understanding hardware and cyber security is utmost important for individuals as business transactions involve a high risk potential source. If hardware companies give a unique identification to each major component, the software company can use this number to uniquely identify each electronic documents created.

This could be useful in checking the piracy of users is compromised. Hackers make use of their computer knowledge to gain access to others computers. Sometimes, files, passwords, programs, or processing power are stolen. An information system performs key functions for an organization. If for some reason, the system becomes non-functional for some time, the consequences may be unacceptable. Organizations should have a set of emergency procedures for critical functions.

References

1. Galbraith J, (2004), Strategic Computer Security: The Role of Structure and Process, St. Paul, Minnesota. 2. Hitt, Michael A, (2001), Computer Security Management: Competitiveness and globalization,       4th ed. , Thomson Learning. 3. Srivastava, R. M. (1999). Computer Security Threats: Formulation Of Latest Technological Issues (Texts and Cases) 1st ed. , Macmillan Limited. 4. Hamel,G, Collaborate with your Competitors and Win, Harvard Business review,67,1,1989,133-9. 5. Goodman, Li. , 2003. , Computer Project Planning and Management — An Integrated System for Improving Productivity, Van Norstand, New York. 6. Feldman, D. C. , 1995 A taxonomy of internet security University Associates:San Diego