Discussion: Reliable Information systems. Discussion: Reliable Information systems. The daily operations and decision-making of almost every single company are

Discussion: Reliable Information systems.

Discussion: Reliable Information systems.

The daily operations and decision-making of almost every single company are dependent on reliable Information systems. Every piece of the daily operations within a company is closely connected with each other by using a reliable information system. Any errors could have a huge impact on all aspects of a company. For example, some banks store their customers’ data in a big data center, any unexpected incidents, no matter how small they might be, could affect millions of users across the country. Hundreds of millions of dollars could be lost due to the delay in transactions and payments.

A reliable design and implementation of internal controls are vital to protect information resources within organizations. Technologies like firewalls and DMZ can effectively protect an organization’s network security. Multi-factor Authentication is another widely used technology to protect a company’s system from being accessed by unauthorized sources. In addition, a strong passwor d policy should also be implemented. This is very easy to design and does not take much time and effort to implement. It can be as easy as requiring employees to change passwords every 90 days with at least 10 digits.

As a leader, it is important to make sure all those internal controls that protect the information systems can operate effectively. That means management is supposed to establish a process to monitor the implementation of these protections. A detailed written policy should be prepared by the management and published on the intranet. All the implementation of the controls should be regularly reviewed. Training should be designed for all levels of employees to enhance their security awareness.


Many companies now use file encryption to protect data security.

For example, the encrypted file system EFS has always been provided by Microsoft Windows operating systems. The built-in full disk encryption BitLocker after Windows Vista/Server 2008 can protect the security of the entire disk data. Even the word processing software Office, after the 2003 version was released, can also be used with Windows Server. Integrating the file authority control service IRM/RMS can achieve a file protection effect. The file formats or open application software we are familiar with also have many built-in encryption functions, and most of them use passwords to restrict the opening of the file content, such as PDF files, RAR and ZIP files. Discussion: Reliable Information systems.

Another well-known brand is SafeNet. The company’s ProtectFile and ProtectDrive software correspond to file and disk encryption functions respectively. The company also has a product, ProtectV, which is quite special. It is aimed at data security in the cloud environment. The system is built with a pre-set image file to protect the virtual machines in the public cloud vendor environment or the enterprise private cloud environment. It supports Amazon EC2 (Elastic Compute Cloud) and VPC (Virtual Private Cloud), as well as the virtualization platform VMware vCenter.

Mullane(2020) stated: ”An effective governance model ensures that good cybersecurity and practices and procedures are maintained properly.” I can’t agree more with this statement as an organization’s leader does play an important role in defining the values of an organization (Links to an external site.). He or she has the power and influence to make cybersecurity an important part of the organizational culture.


Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?