Last Updated 06 Jul 2021

Strategic Information Systems In Google

Words 475 (1 page)
Views 239

Privacy is an important social issue involved in information society. Privacy deals with the collection and use or misuse of data. Data is constantly being collected and stored on each of us. This data is often distributed, sold or used without our knowledge. Privacy of hardware and software of consumers is another important issue. If hardware companies give a unique identification to each major component, the software company can use this number to uniquely identify each electronic documents created.

This could be useful in checking the piracy of users is compromised. Ethernet card is the only hardware component that has unique identification, which is used in communication. Protecting computer equipment and files Crimes involving illegal system access and use of computer services are also a concern. Google systems left unattended over weekends without proper security have been used for commercial use. Computer magazines regularly report cases where employees have used the facilities for their personal benefit sometimes at the cost of their employers.

Hackers make use of their computer knowledge to gain access to others computers. Sometimes, files, passwords, programs, or processing power are stolen. An intruder may alter the data or destroy the data making it unusable and useless. A hacker writes a small password snifter that is hidden from the computer owner. A password snifter can steal passwords and gain access to data and files. There are Antisniff Programs that can detect and block a password snifter. Depending on the nature of the computer crime that an organization anticipates, it may adopt controls.

Order custom essay Strategic Information Systems In Google with free plagiarism report


Google’s controls are expensive to implement and the organization must evaluate the cost against the benefit. To summarize, here is a list of control guidelines:

a) Install strong user authentication and encryption capabilities on your firewall.

b) Upgrade the software with the help of patches, which are developed by vendors whenever a security gap is found in the software.

c) Guest logins are always misused. Any book on Microsoft products advises against creating a guest login.

Group accounts such as head-sales should also be avoided. Such accounts become public very quickly and no body can be held responsible.

d) Remote-logins also create serious threat to security. This fact is so well accepted that Linux does not permit super-user remote-login. There was a time when system accepted login and then prompted for password. While one typed password, a star will substitute each character. A person from a distance could easily learn the login and number of characters in the password.

Systems have now changed and login-password is accepted together.

e) It is a good idea to have dedicated servers for applications that communicate with outside world. Encourage people to have separate passwords for lntranet and Internet if possible.

f) In certain cases, the law requires that audit trail must be on. A document once created cannot be changed without leaving an audit trail. Most of the ERP packages, for instance, leave audit trail.

Strategic Information Systems In Google essay

This essay was written by a fellow student. You can use it as an example when writing your own essay or use it as a source, but you need cite it.

Get professional help and free up your time for more important courses

Starting from 3 hours delivery 450+ experts on 30 subjects
get essay help 124  experts online

Did you know that we have over 70,000 essays on 3,000 topics in our database?

Cite this page

Explore how the human body functions as one unit in harmony in order to life

Strategic Information Systems In Google. (2018, Aug 14). Retrieved from

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Save time and let our verified experts help you.

Hire writer