Security and legislative issues in maintenance.

Lesson 39/59 | Study Time: Min


Security and legislative issues in maintaining management information systems: Define the security and legislative issues related to maintaining MIS.


The Intricacies of Security and Legislative Measures in MIS Maintenance

Ever pondered on the fortress of security measures that shield Management Information Systems (MIS) from breaches? Or the intricate web of legislative norms that ensure its adherence to the law? The world of MIS is a fascinating blend of robust security protocols and complex legislative requirements, making it a crucial pillar in modern organisations.

Let's embark on an exploration of the security and legislative landscape of MIS.

Unveiling the Shield: Security Measures in MIS

Imagine you're the CEO of a large corporation. You're proud of the voluminous data your organization has accumulated over time. But, have you ever thought of what could happen if this information falls into wrong hands? Yes, the repercussions could be grave. 🔐 Security measures in MIS act as the guardian angels, protecting the data from threats and attacks.

One such measure is regular system updates. Consider this akin to a robust fortification that is strengthened from time to time. Software providers regularly roll out updates to fix bugs and patch security vulnerabilities. For instance, Microsoft’s "Patch Tuesday" releases security improvements for their products every second Tuesday of the month. Ignoring these updates is like leaving the castle gates unattended, inviting unwanted trouble.

Another vital security measure is implementing backups. Think of these as the secret passages in a castle, ensuring the royal family (data, in our case) can escape unscathed during an attack. Regularly backing up data ensures that it can be recovered in case of system failures or cyber attacks. A real-life example of this is Maersk, a shipping giant, that survived the 2017 NotPetya ransomware attack thanks to an offline backup in Ghana.

Navigating the Maze: Legislative Requirements in MIS

While security ensures the fortress is protected from external threats, adherence to legislative requirements ensures that the kingdom operates within the boundaries of the law. 🏛️

One such requirement is data retention, which dictates the duration for which an organization must keep information. For example, the IRS in the United States requires businesses to keep employment tax records for at least four years.

Another essential legislative aspect is the disposal regulations. This refers to the legally compliant elimination of data that is no longer required. An incorrect disposal could lead to fines and reputational damage. A case in point is the Morgan Stanley incident in 2016, where the firm was fined $1 million by SEC for failing to properly dispose off old computer hardware that contained sensitive information.

In conclusion, maintaining a Management Information System is not just about data collection and storage. It's a sophisticated dance that involves keeping the system secure from threats and complying with intricate legislative requirements. The harmony of these elements ensures a robust and reliable system that serves as the backbone of an organization's operations. So, the next time you marvel at the efficiency of your organization's MIS, remember the silent security and legislative heroes that work tirelessly behind the scenes.


UeCampus

UeCampus

Product Designer
Profile

Class Sessions

1- Introduction 2- Models of data communication and computer networks: Analyse the models used in data communication and computer networks. 3- Hierarchical computer networks: Analyse the different layers in hierarchical computer networks. 4- IP addressing in computer networks: Set up IP addressing in a computer network. 5- Static and dynamic routing: Set up static and dynamic routing in a computer network. 6- Network traffic management and control: Manage and control network traffic in a computer network. 7- Network troubleshooting: Diagnose and fix network problems. 8- Introduction 9- Concepts and sources of big data. 10- Recommendation systems, sentiment analysis, and computational advertising. 11- Big data types: streaming data, unstructured data, large textual data. 12- Techniques in data analytics. 13- Problems associated with large data sets used in applied analytical models. 14- Approaches to visualize the output from an enforced analytical model. 15- Big data processing platforms and tools. 16- Performing simple data processing tasks on a big data set using tools 17- Introduction 18- Relational Database Management Systems: Analyze the concepts and architecture of a relational database management system. 19- Entity Relationship Model: Analyze the components of an entity relationship model. 20- Relational Model: Analyze relation, record, field, and keys in a relational model. 21- ER to Relational Model Conversion: Perform a conversion from an ER model to the relational model. 22- Functional Dependency: Analyze the concepts of closure sets, closure operation, trivial, non-trivial, and semi-trivial functional dependencies. 23- Normal Forms: Analyze the concepts of lossless, attribute-preserving, and functional-dependency-preserving decomposition, and first normal form. 24- Installation of Programming Languages and Databases: Install MySQL and phpMyAdmin and install Java and Python programming languages. 25- CRUD Operations: Perform create, read, update, delete (CRUD) operations in MySQL. 26- MySQL Operations: Perform MySQL operations using CONCAT, SUBSTRING, REPLACE, REVERSE, CHAR LENGTH, UPPER, and LOWER commands. 27- Aggregate Functions: Perform MySQL operations using count, group by, min, max, sum, and average functions. 28- Conditional Statements and Operators: Perform MySQL operations using not equal, not like, greater than, less than, logical AND, logical OR. 29- Join Operations: Perform MySQL operation. 30- Introduction 31- Historical development of databases: Analyze the evolution of technological infrastructures in relation to the development of databases. 32- Impact of the internet, the world-wide web, cloud computing, and e-commerce: Analyze the impact of these technologies on modern organizations. 33- Strategic management information system (MIS): Analyze the characteristics and impact of a strategic MIS. 34- Information systems for value-added change: Analyze how information systems can support value-added change in organizations. 35- Functionality of information communication technology: Analyze the functionality offered by information communication technology and its implications. 36- International, ethical, and social problems of managing information systems: Define the international, ethical, and social problems associated. 37- Security and legislative issues in building management information systems: Define the security and legislative issues related to building MIS. 38- Security and legislative issues in implementing management information systems: Define the security and legislative issues related to implementing MIS. 39- Security and legislative issues in maintenance. 40- Introduction 41- Ethical concepts in computing: Analyse common ethical concepts and theories in computing. 42- Laws and social issues in information technology: Analyse laws and social issues in areas including privacy, encryption, and freedom of speech. 43- Intellectual property and computer crime: Analyse the laws relating to trade secrets, patents, copyright, fair use and restrictions, peer-to-peer. 44- Data privacy: Define data privacy and analyse the types of data included in data privacy. 45- Ethical theories and the U.S. legal system: Analyse philosophical perspectives such as utilitarianism versus deontological ethics and the basics. 46- Ethical dilemmas in information technology: Apply ethical concepts and an analytical process to common dilemmas found in the information technology. 47- Impacts of intellectual property theft and computer crime: Analyse the impacts of intellectual property theft and computer crime. 48- Ethics in artificial intelligence (AI): Analyse the ethics in AI, including autonomous vehicles and autonomous weapon systems. 49- Ethics in robotics: Analyse the ethics in robotics, including robots in healthcare. 50- Introduction 51- Technologies involved in building a secure e-commerce site. 52- Common problems faced by e-commerce sites. 53- Requirements analysis and specification for an e-commerce project. 54- Writing a project proposal and creating a presentation. 55- Front-end development tools, frameworks, and languages. 56- Back-end development languages, frameworks, and databases. 57- Application of software development methodologies. 58- Creating a project report and user documentation. 59- Delivering structured presentations on the software solution.
noreply@uecampus.com
-->