SlideShare a Scribd company logo
1 of 1
Download to read offline
Answer: (b) systems security and control.
The businesses are now a days technology driven, IT plays a greater role in the organizations
structure. The most of the problems faced by businesses are as a result for pure IT misfunction or
mismanagement. the more powerful the IT of the organization the greater is its capability to
succeed. The most common difficulties faced by IT teams is the threat of poor secirty and control
of the sensitive data of the company.
Although high secured and system control measures are taken there is a lot of mismanagement
that leads to the theft and hacking of the sensitive information of the companies. one such
problem is the misuse of access given to the employees for data handling. Due to negligence
people reveal their passwords to others which leads to most of data theft from the systems due to
unauthorised access.
Also in cloud computing environments data is stored through online that involves a third party
service provider which has higher risk for misuse of data. Getting a trusted party for cloud
computing services and the contractal terms are the headache for the management.
Solution
Answer: (b) systems security and control.
The businesses are now a days technology driven, IT plays a greater role in the organizations
structure. The most of the problems faced by businesses are as a result for pure IT misfunction or
mismanagement. the more powerful the IT of the organization the greater is its capability to
succeed. The most common difficulties faced by IT teams is the threat of poor secirty and control
of the sensitive data of the company.
Although high secured and system control measures are taken there is a lot of mismanagement
that leads to the theft and hacking of the sensitive information of the companies. one such
problem is the misuse of access given to the employees for data handling. Due to negligence
people reveal their passwords to others which leads to most of data theft from the systems due to
unauthorised access.
Also in cloud computing environments data is stored through online that involves a third party
service provider which has higher risk for misuse of data. Getting a trusted party for cloud
computing services and the contractal terms are the headache for the management.

More Related Content

Similar to Answer (b) systems security and control.The businesses are now a .pdf

10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
 
Discussion 300 wordsSearch scholar.google.com or your textbook
Discussion 300 wordsSearch scholar.google.com or your textbookDiscussion 300 wordsSearch scholar.google.com or your textbook
Discussion 300 wordsSearch scholar.google.com or your textbook
huttenangela
 
Share point encryption
Share point encryptionShare point encryption
Share point encryption
csmith2009
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical Challenges
Ram Dutt Shukla
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
Leena Reddy
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breaches
OriginalGSM
 

Similar to Answer (b) systems security and control.The businesses are now a .pdf (20)

10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
Security threat in cloud computing
Security threat in cloud computingSecurity threat in cloud computing
Security threat in cloud computing
 
The Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent ThemThe Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent Them
 
Top 8 Cloud Computing Security Challenges.pptx
Top 8 Cloud Computing Security Challenges.pptxTop 8 Cloud Computing Security Challenges.pptx
Top 8 Cloud Computing Security Challenges.pptx
 
How to Mitigate the Cyber security Risk Posed.pptx
How to Mitigate the Cyber security Risk Posed.pptxHow to Mitigate the Cyber security Risk Posed.pptx
How to Mitigate the Cyber security Risk Posed.pptx
 
Discussion 300 wordsSearch scholar.google.com or your textbook
Discussion 300 wordsSearch scholar.google.com or your textbookDiscussion 300 wordsSearch scholar.google.com or your textbook
Discussion 300 wordsSearch scholar.google.com or your textbook
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Share point encryption
Share point encryptionShare point encryption
Share point encryption
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical Challenges
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
 
10 things you should know about cybersecurity
10 things you should know about cybersecurity10 things you should know about cybersecurity
10 things you should know about cybersecurity
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
The Increasing Problems Of Controlling Access
The Increasing Problems Of Controlling AccessThe Increasing Problems Of Controlling Access
The Increasing Problems Of Controlling Access
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breaches
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 

More from aptex1

MinOfFourNumbers.javaimport java.util.Scanner;public class MinOf.pdf
MinOfFourNumbers.javaimport java.util.Scanner;public class MinOf.pdfMinOfFourNumbers.javaimport java.util.Scanner;public class MinOf.pdf
MinOfFourNumbers.javaimport java.util.Scanner;public class MinOf.pdf
aptex1
 
Answer i command.The vi editor always starts in command mode. For.pdf
Answer i command.The vi editor always starts in command mode. For.pdfAnswer i command.The vi editor always starts in command mode. For.pdf
Answer i command.The vi editor always starts in command mode. For.pdf
aptex1
 
2) b) Understory is rich in humidity hence supports fungi3) a) can.pdf
2) b) Understory is rich in humidity hence supports fungi3) a) can.pdf2) b) Understory is rich in humidity hence supports fungi3) a) can.pdf
2) b) Understory is rich in humidity hence supports fungi3) a) can.pdf
aptex1
 
1.Discuss in detail Emile Durkheim and his contributions to the fiel.pdf
1.Discuss in detail Emile Durkheim and his contributions to the fiel.pdf1.Discuss in detail Emile Durkheim and his contributions to the fiel.pdf
1.Discuss in detail Emile Durkheim and his contributions to the fiel.pdf
aptex1
 
1) YELLOW FEVERGroup Group IV ((+) ssRNA)Order   Unassigned.pdf
1) YELLOW FEVERGroup Group IV ((+) ssRNA)Order   Unassigned.pdf1) YELLOW FEVERGroup Group IV ((+) ssRNA)Order   Unassigned.pdf
1) YELLOW FEVERGroup Group IV ((+) ssRNA)Order   Unassigned.pdf
aptex1
 
Thermodynamic entropy is a non-conserved state fu.pdf
                     Thermodynamic entropy is a non-conserved state fu.pdf                     Thermodynamic entropy is a non-conserved state fu.pdf
Thermodynamic entropy is a non-conserved state fu.pdf
aptex1
 

More from aptex1 (20)

Name- Gold leaved white PoplarGenus- Populusspecies- albaAutho.pdf
Name- Gold leaved white PoplarGenus- Populusspecies- albaAutho.pdfName- Gold leaved white PoplarGenus- Populusspecies- albaAutho.pdf
Name- Gold leaved white PoplarGenus- Populusspecies- albaAutho.pdf
 
MinOfFourNumbers.javaimport java.util.Scanner;public class MinOf.pdf
MinOfFourNumbers.javaimport java.util.Scanner;public class MinOf.pdfMinOfFourNumbers.javaimport java.util.Scanner;public class MinOf.pdf
MinOfFourNumbers.javaimport java.util.Scanner;public class MinOf.pdf
 
molarity = 0.252101.1 =0.001236 M percent =0.251002 =12.5 .pdf
molarity = 0.252101.1 =0.001236 M percent =0.251002 =12.5 .pdfmolarity = 0.252101.1 =0.001236 M percent =0.251002 =12.5 .pdf
molarity = 0.252101.1 =0.001236 M percent =0.251002 =12.5 .pdf
 
Initial concentration of Br- = 2.25 x 10e-3M1V1=M2V2therefore M2.pdf
Initial concentration of Br- = 2.25 x 10e-3M1V1=M2V2therefore M2.pdfInitial concentration of Br- = 2.25 x 10e-3M1V1=M2V2therefore M2.pdf
Initial concentration of Br- = 2.25 x 10e-3M1V1=M2V2therefore M2.pdf
 
import java.util.Scanner;public class HornersPolynomial {   .pdf
import java.util.Scanner;public class HornersPolynomial {   .pdfimport java.util.Scanner;public class HornersPolynomial {   .pdf
import java.util.Scanner;public class HornersPolynomial {   .pdf
 
Direct memory access (DMA) is a function that allows an inputoutput.pdf
Direct memory access (DMA) is a function that allows an inputoutput.pdfDirect memory access (DMA) is a function that allows an inputoutput.pdf
Direct memory access (DMA) is a function that allows an inputoutput.pdf
 
Ethanol is miscible in water because of the hydroxyl functional grou.pdf
Ethanol is miscible in water because of the hydroxyl functional grou.pdfEthanol is miscible in water because of the hydroxyl functional grou.pdf
Ethanol is miscible in water because of the hydroxyl functional grou.pdf
 
the diluted concentration of HCl = (0.120 M x 25..pdf
                     the diluted concentration of HCl = (0.120 M x 25..pdf                     the diluted concentration of HCl = (0.120 M x 25..pdf
the diluted concentration of HCl = (0.120 M x 25..pdf
 
Simple Nobody Knows The Answer .pdf
                     Simple Nobody Knows The Answer                   .pdf                     Simple Nobody Knows The Answer                   .pdf
Simple Nobody Knows The Answer .pdf
 
AnswerThe net equation of the reaction catalyzed by the protein c.pdf
AnswerThe net equation of the reaction catalyzed by the protein c.pdfAnswerThe net equation of the reaction catalyzed by the protein c.pdf
AnswerThe net equation of the reaction catalyzed by the protein c.pdf
 
Answer i command.The vi editor always starts in command mode. For.pdf
Answer i command.The vi editor always starts in command mode. For.pdfAnswer i command.The vi editor always starts in command mode. For.pdf
Answer i command.The vi editor always starts in command mode. For.pdf
 
A. Temeperature of refrigeratorsIntervalB. Horspower of .pdf
A. Temeperature of refrigeratorsIntervalB. Horspower of .pdfA. Temeperature of refrigeratorsIntervalB. Horspower of .pdf
A. Temeperature of refrigeratorsIntervalB. Horspower of .pdf
 
48. The answer is Botulism. Botulism ia an illness that brings about.pdf
48. The answer is Botulism. Botulism ia an illness that brings about.pdf48. The answer is Botulism. Botulism ia an illness that brings about.pdf
48. The answer is Botulism. Botulism ia an illness that brings about.pdf
 
2) b) Understory is rich in humidity hence supports fungi3) a) can.pdf
2) b) Understory is rich in humidity hence supports fungi3) a) can.pdf2) b) Understory is rich in humidity hence supports fungi3) a) can.pdf
2) b) Understory is rich in humidity hence supports fungi3) a) can.pdf
 
1.Discuss in detail Emile Durkheim and his contributions to the fiel.pdf
1.Discuss in detail Emile Durkheim and his contributions to the fiel.pdf1.Discuss in detail Emile Durkheim and his contributions to the fiel.pdf
1.Discuss in detail Emile Durkheim and his contributions to the fiel.pdf
 
1) YELLOW FEVERGroup Group IV ((+) ssRNA)Order   Unassigned.pdf
1) YELLOW FEVERGroup Group IV ((+) ssRNA)Order   Unassigned.pdf1) YELLOW FEVERGroup Group IV ((+) ssRNA)Order   Unassigned.pdf
1) YELLOW FEVERGroup Group IV ((+) ssRNA)Order   Unassigned.pdf
 
Thermodynamic entropy is a non-conserved state fu.pdf
                     Thermodynamic entropy is a non-conserved state fu.pdf                     Thermodynamic entropy is a non-conserved state fu.pdf
Thermodynamic entropy is a non-conserved state fu.pdf
 
I is oxidized by 6 electrons as the oxidation sta.pdf
                     I is oxidized by 6 electrons as the oxidation sta.pdf                     I is oxidized by 6 electrons as the oxidation sta.pdf
I is oxidized by 6 electrons as the oxidation sta.pdf
 
The main difference is that Democritus was not a .pdf
                     The main difference is that Democritus was not a .pdf                     The main difference is that Democritus was not a .pdf
The main difference is that Democritus was not a .pdf
 
for acidic nature is should give H+ equation H.pdf
                     for acidic nature is should give H+  equation  H.pdf                     for acidic nature is should give H+  equation  H.pdf
for acidic nature is should give H+ equation H.pdf
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 

Answer (b) systems security and control.The businesses are now a .pdf

  • 1. Answer: (b) systems security and control. The businesses are now a days technology driven, IT plays a greater role in the organizations structure. The most of the problems faced by businesses are as a result for pure IT misfunction or mismanagement. the more powerful the IT of the organization the greater is its capability to succeed. The most common difficulties faced by IT teams is the threat of poor secirty and control of the sensitive data of the company. Although high secured and system control measures are taken there is a lot of mismanagement that leads to the theft and hacking of the sensitive information of the companies. one such problem is the misuse of access given to the employees for data handling. Due to negligence people reveal their passwords to others which leads to most of data theft from the systems due to unauthorised access. Also in cloud computing environments data is stored through online that involves a third party service provider which has higher risk for misuse of data. Getting a trusted party for cloud computing services and the contractal terms are the headache for the management. Solution Answer: (b) systems security and control. The businesses are now a days technology driven, IT plays a greater role in the organizations structure. The most of the problems faced by businesses are as a result for pure IT misfunction or mismanagement. the more powerful the IT of the organization the greater is its capability to succeed. The most common difficulties faced by IT teams is the threat of poor secirty and control of the sensitive data of the company. Although high secured and system control measures are taken there is a lot of mismanagement that leads to the theft and hacking of the sensitive information of the companies. one such problem is the misuse of access given to the employees for data handling. Due to negligence people reveal their passwords to others which leads to most of data theft from the systems due to unauthorised access. Also in cloud computing environments data is stored through online that involves a third party service provider which has higher risk for misuse of data. Getting a trusted party for cloud computing services and the contractal terms are the headache for the management.