answersLogoWhite

0


Best Answer

One major security threat is a virus. A virus is a programming code put into other programming that lies dormant until triggered an undesirable event. They are picked up by downloading infected programming over the internet or sharing an infected USB device. Another major security threat is called phishing. This is when a scammer will embelish an e-mail with a stolen logo from a well-recognized brand that makes the e-mail look real. The last type of main security threat is cyberterrorism. This is the one people are most concerned about today. Cyberterrorism is when terrorist hackers could shut down the entire communications, money supply, electricity, and transportation systems.

Source: McHugh, James M., and Susan M. McHugh. "Module 6." Business In A Connected World. By William G. Nickels. University of Akron: McGraw-Hill, n.d. BA-16-A-17. Print.

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Identify and describe the major security issues confronting information managers?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Identify and describe important features of organisations that managers need to know about in order to build and use information systems successfully?

4/19


What are the major security issues confronting information managers?

Data breaches is one major issue facing information managers. Hackers develop new ways to breach security measures taken by businesses each day.


Describe different categories of managers?

There is generally three categories of managers. These include the first line managers, the middle managers, and the top managers.


Discuss the different skill that managers must have and the roles?

describe the different categories of managers


How can managers use accounting information to help control manufacturing overhead costs?

Managers compare the actual line item amounts for manufacturing overhead with the budgeted amounts. Managers investigate large differences between actual and budgeted amounts to identify the reasons why actual costs differ from planned or budgeted costs.


Who is responsible for ensuring that assigned DoD information systems have designated Information Assurance Managers?

Program or System Managers


How will managers use financial information to predict outcomes for business?

How will managers use financial information to predict outcomes for business?


Why do library or information managers need to plans?

library or information managers needs to plans, so that they will know the step of planing on their services,


Role of information systems in a typical business?

Information systems help managers make better decisions. They also help managers retain information about employees and business operations. With the right systems, managers can create a competitive advantage.


Where can one find information on safety managers?

One can find information on safety managers on various websites like Indeed and RoSPA. Both websites offer a great amount of information about all kinds of things including safety managers.


Where can one find more information about mind managers?

There are many places where one can find more information about mind managers. One can find more information about mind managers at popular on the web sources such as Z Communications and Mind Tools.


Who developed the requirements for records and information managers?

The Education Department Committee of ARMA International (formerly the Association of Records Managers and Administrators) is the organization that created a framework for competency requirements for records and information managers.