Write a 3 page paper answering case study questions and cover module learning modules blow:

Course learning outcomes connected to this student deliverable include:

  • Describe the use and function of management information systems (MIS) in global business today.
  • Identify the major components of a computer-based information system, including hardware, software, operating systems, and operating environments.
  • Distinguish the components of wired and wireless telecommunications networks that support Internet, Intranet and Extranet systems which are integral to the successful operations of the modern firm.
  • Compare, evaluate, and select the most efficient and effective computer-based information systems from a management perspective.
  • Explain the interdependence and functionality of the hardware and software components of information systems and apply this knowledge to be able to advise and assist MIS staff about technical decisions.
  • Analyze how information technology can be used to synthesize complex data to enhance sound business decisions.
  • Examine the ethical and social issues associated with information systems confronting today’s technology managers and the organizations for which they work.
  • Formulate processes and systems, in conjunction with technology personnel, to best leverage MIS for competitive advantage, including knowledge management, business intelligence, and customer intimacy.
  • Apply the knowledge obtained in this course in order to evaluate and mitigate security threats to the hardware and software systems of an organization.  

 

Review the CASE STUDY Is the Equifax Hack the Worst Everand Why? on pages 331-333 of your text.

Respond to the four Case Study questions on page 335: 8-13, 8-14, 8-15 and 8-16.

You may wish to enhance your submission by comparing and analyzing the similarities and differences to other data breach episodes not discussed specifically in the Case Study. For example, Chief Security Officer (CSO) Magazine Online Editor Dan Swinhoe ranked the Equifax hack as only #6, as of January 2021 (Students may wish to research and locate an updated list for comparison):

Biggest Data Breaches

  1. Adobe 
  2. Adult Friend Finder
  3. Canva
  4. Dubsmash
  5. eBay
  6. Equifax
  7. Heartland Payment Systems 
  8. LinkedIn
  9. Marriott International
  10. My Fitness Pal
  11. MySpace
  12. NetEase
  13. Sina Weibo
  14. Yahoo
  15. Zynga

Of course, it does matter how the rankings were determined:

“CSO compiled this list of the biggest 21st Century breaches using simple criteria: The number of people whose data was compromised. We also made a distinction between incidents where data was stolen for malicious intent and those where an organization inadvertently left data unprotected and exposed. Twitter, for example, left the passwords of its 330 million users unmasked in a log, but there was no evidence of any misuse. So, Twitter did not make this list” (Swinhoe, 2021, ¶2).

Source: Swinhoe, D. (2021). The 15 biggest data breaches of the 21st century Links to an external site.CSO Magazine Online. January 8, 2021. 

MODULE LEARNING OBJECTIVES THAT SHOULD BE EMPHASIZED IN THIS ASSIGNMENT

7-1 What are the principal components of telecommunications networks and key networking technologies?

7-2 What are the different types of networks?

7-3 How do the Internet and Internet technology work, and how do they support communication and e-business?

7-4 What are the principal technologies and standards for wireless networking, communication, and Internet access?

8-1 Why are information systems vulnerable to destruction, error, and abuse?

8-2 What is the business value of security and control?

8-3 What are the components of an organizational framework for security and control?

8-4 What are the most important tools and technologies for safeguarding information resources?

————————————————-

Your total submission should be approximately 5 pages, including the cover page and references, or about 3 pages of double-spaced text. Be sure to follow the APA template provided for formatting and, of course, spell and grammar check. An annotated sample paper is also provided for more detailed formatting help. Complete information can be found on the APA Style website Links to an external site..

Are you struggling with your paper? Let us handle it - WE ARE EXPERTS!

Whatever paper you need - we will help you write it

Get started

Starts at $9 /page

How our paper writing service works

It's very simple!

  • Fill out the order form

    Complete the order form by providing as much information as possible, and then click the submit button.

  • Choose writer

    Select your preferred writer for the project, or let us assign the best writer for you.

  • Add funds

    Allocate funds to your wallet. You can release these funds to the writer incrementally, after each section is completed and meets your expected quality.

  • Ready

    Download the finished work. Review the paper and request free edits if needed. Optionally, rate the writer and leave a review.