StudentShare solutions
Triangle menu

Considering the Threats and Vulnerabilities of Information Systems: A Plan for Improvements - Essay Example

Nobody downloaded yet

Extract of sample
Considering the Threats and Vulnerabilities of Information Systems: A Plan for Improvements

However, current considerations should be examined to further scrutinize the consequential effects of internal and external threats. To combat internal and external threats and guard information systems, proposed actions include the following: enhancements to the hiring and promotion processes, implementing a contingency in job appointments, enhancing sustainability of basic technology.
The interconnectivity of FLPD's Information Systems Unit provides secured information with added convenience. Interconnectivity of the system allows immediate responses to inquiries and eliminates lag time possible from manual efforts to retrieve information (flpd.org). When an emergency call is entered into the Computer Aided Dispatch System (CAD), the CAD instantly checks other databases supported by the ISU and instantly relays dependable and pertinent information. Thus, the efficiency of the ISU aids FLPD's Public Safety Communications Center in its quick responses to the emergency needs of its citizens.
Without effective or secured informational systems, however, emergency operations may lack proficiency in their efforts to respond to citizens' needs. Time is a critical element of rescue efforts. Mishandled minutes or seconds may result in delayed responses, deaths, or even a crisis. One purpose of FLPD's Public Safety Communications Center's information systems is to decrease the opportunity of danger by retrieving dependable information for the purpose of responding to emergency needs of citizens.
Not only does the ISU support FLPD's locally operating system, but it is also linked to databases that harbor critical information for other areas. For example, the ISU's informational contribution to Florida Crime Information Center Systems adds pertinent information to The National Crime Information Center Systems (SafirRosetti, 2006). Jeopardy FLPD's centralized information system renders extremely vulnerable.
Information systems act as the nucleus of interconnectivity and efficient communication (ISACA). The absence of interconnected systems that work properly disturbs emergency operations. Thus, guarding FLPD's Information Services Division is imperative and requires the implementation of new policies and procedures that begin with the hiring process.
Enhancing the Hiring Process
The Fort Lauderdale Police Department (FLPD) recognizes the serious role of staff working in the Information Services Division, as it reports that "all personnel are mission critical" (SafirRosetti, 2006, p. 44). Thus, all staff members must be thoroughly screened and periodically evaluated. The police department assesses the credibility of candidates for employment through background checks, a series of interviews, tests, and extensive training (ci.ftlaud.fl.us/jobs).
For applicants seeking positions within FLPD, the hiring process may seem strenuous or in-depth. For the FLPD, however, the process is the usual application, series of intervi ...Show more

Summary

While some of the Fort Lauderdale Police Department (FLPD) of Florida's modes of management aim to support the department in its efforts to protect citizens, the policies and procedures to protect its information systems require improvements. The occurrences of manmade and natural disasters along with the ever-rising threat of cyber-terrorism warrants continued development of risk management planning-an established effort to improve guards of information systems (BCF)…
Author : vellaferry
Considering the Threats and Vulnerabilities of Information Systems: A Plan for Improvements essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Considering the Threats and Vulnerabilities of Information Systems: A Plan for Improvements"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Information Systems Management Plan
In the information system management planning for the new ACME Mexico City store, the utilization of information technology remains paramount to the store. For instance, the utilization of computer and mobile devices will remain in place. However, consideration will be given to other different alternatives in management information systems, which can help boost efficiency and effectiveness of the store’s level of management information systems.
7 pages (1750 words) Essay
Common Information Security Threats
Attackers invent ways of hacking passwords, and steal information from different organizations. At the present, organizations face a number of security threats (Whitman, 2003), this paper explores the information security threats facing Apple Inc. Information Security threats According to Grimes (2012), the threats in terms of information security faced by Apple Inc include: The threat on data Attackers today have invented mechanism to alter data, this involves the data the company utilizes internally.
3 pages (750 words) Essay
Identifying Potential Malicious Attacks, Threats, and Vulnerabilities
Likewise, it also addresses patch management issues that frequently updates security patches on systems. There is no way of completely securing a network, system and applications. However, periodic penetration testing and code reviews are conducted by security professionals and consultants for exploiting vulnerabilities and security flaws within an application and computer network.
4 pages (1000 words) Essay
Improving Information Systems
Though emergency systems operators are abreast of the benefits that information systems provide, operators must be equally as aware of vulnerabilities and threats to the systems. Awareness of benefits, as well as potential limitations of the system, gives operators alternate plans to effectively handle threats and unforeseen circumstances that threaten the efficiency of the system.
8 pages (2000 words) Essay
The vulnerabilities of industrial control systems and possible solutions
After September 11,2001,the threat of terrorist attacks became a high priority on the home front.Most people worried about airplanes,metro or subway systems,or bombs,but a few realized that with the computerization of control systems in a variety of industries becoming normal operating procedures,the risk of attack was just as possible as any other probable target.
3 pages (750 words) Essay
A Plan for Restoration and Recovery for Information Systems
With these facts in mind, systems operators should not only enhance security and devise risk management plans, but they should also plan for the worse by updating methods to restore damaged systems and recover corrupt or deleted files. Information systems act as the nucleus of interconnectivity and efficient communication (ISACA).
7 pages (1750 words) Essay
Information Systems Plan
The general Fitness Center Management Services Include - Membership Management and Tracking, Prospect Management Tracking and Scheduling, Sales Lead Tracking and Custom Contracts, Front Counter and Check In Solutions, Workout Manager for Member Fitness Tracking, Data Entry for Information Management, Performance Reporting for Club Management, Health Club Business Modeling with Artificial Intelligence, Billing and Accounting System, Cash or Financial Accrual Reporting, Payroll and Commission Modeling for Clubs, Collections Solution for Overdue Payments, Data Exchange, Backup and Restore
10 pages (2500 words) Essay
Information System Security
There is a gradual and certain acknowledgment of the stakes involved with ensuring effectual security management. There are a host of factors that influence this process, including the
56 pages (14000 words) Essay
Information Systems
Later in 1986, Comair leased the software system from SBS international to track and schedule the crew for the airlines. As a wholly owned subsidiary of Delta airlines Comair was widely appreciated for its track record of its
10 pages (2500 words) Essay
Assess the primary cyber threats to an organizations mission-critical information systems
Likewise, in the entire hoax, there was a requirement of evaluating homeland security that also pertains to Information technology infrastructure. The Information technology infrastructure was not the only consideration, as these
12 pages (3000 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Click to create a comment