Essays on Security, Threat, Exposure and Vulnerability in Relation to Business Information Systems Assignment

Download full paperFile format: .doc, available for editing

The paper "Security, Threat, Exposure and Vulnerability in Relation to Business Information Systems" is a perfect example of a business assignment. Security in relation to business information systems is the information and information systems protection against modifications or unauthorized access of the information (Arthur, J. C & Quey-Jen, 2006). It can either be in storage, process and transit. Information security entails measures that detect threats, documents them and device ways of countering them In relation to computer security, threat represents the possible danger that might exploit the vulnerability of the computer system so as to cause a breach of security thus causing possible harm to the information system.

Possible threats allow hackers or unauthorized persons to gain access to the information system without being noticed or recognized by the information system. Exposure is the software error that permits computer hackers to get access and break into the information system (Martin 2011). During this exposure, the attackers gain information or may hide their unauthorized actions. In this situation, the unauthorized access also hides the identity of the hackers Vulnerability, in relation to information system, is an error of the software coding that hackers use to gain access into the information system thus performing activities that the system has not authorized (Stefan et al 2013).

The hackers, therefore, pose as the authorized users of the business information system (David 2011). Computer components that must be protected include the operating system or operating server, the computer access configurations like password login. Other software includes antivirus. Q2. Explain malware and the 3 major categories of software attacks. Include definitions of a logic bomb, back door, denial of service attack and distributed denial of service attack.

(200 words) Malware is a short form of malicious software. It is software that is designed for gaining access or damaging computers without the owner’ s knowledge (Verine 2007). They exist in different forms including true viruses, spyware, key loggers, worms or other malicious codes that may infiltrate the computer (Martin 2011). The software becomes malware with regard to the creator’ s intent rather than the actual features.


Arthur, J. C & Quey-Jen, Y 2006, ‘On security preparations against possible IS threats across industries’, Information Management & Computer Security, vol. 14, no. 4, pp.343-360

David, M 2011, ‘Understanding and reducing vulnerability: from the approach of liabilities and capabilities", Disaster Prevention and Management, vol. 20, no.3, pp.294-313

Edson, M, Luciana, A. F. M, Antonio, J. B, Mauro, C. B 2008, ‘Ontologies for information security management and governance’, Information Management & Computer Security, vol. 16, no. 2, pp.150-165.

Lois, T 2013 ‘CURRENT CITE-ings from the popular and trade computing literature: what’s trending in computer security and hardware developments’, Library Hi Tech News, vol. 30, no. 1, pp20-32

Martin, Z 2011, ‘The dangers of malware in a library computing environment’, Electronic Library, vol. 29, no. 1, pp.5-19

Michael P & Sonia, G 2004, ‘Business continuity planning as a facilities management tool’, Facilities, vol. 22, no. 3/4, pp.87-99

Nasser S. A & Gordon A. Mv2002, ‘An intelligent approach to prevent distributed systems attacks’, Information Management & Computer Security, vol. 10, no. 5, pp.203-209

Stefan T, Jan, J, Yijun, Y &Bashar, N 2013, ‘Resolving vulnerability identification errors using security requirements on business process models’, Information Management & Computer Security, vol. 21, no. 3, pp.202-223

Stefanos, G 2004, ‘Enhancing Web privacy and anonymity in the digital era’, Information Management & Computer Security, vol. 12, no. 3, pp.255-287

Verine, E2007 ‘Malware: the new legal risk’, Electronic Library, vol. 25, no. 5, pp.534-542

Download full paperFile format: .doc, available for editing
Contact Us