This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Disaster

 personal information system (PIS)

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 personal information system (PIS)

Introduction

A personal information system (PIS) is a particular system that is used to support attainment, storage, and repossession of information y the users. A private information system is usually more concentrated in the storage and repossession of bibliographic positions. Scientists use the information for computerized indexes and research of adequate information necessary to enhance guidelines for automated personal information system design.

  1. What security concerns are inherent to using this system/technology, and how should these be mitigated?
  • concerns inherent to PIS

There are several security alarms which arise as a result of using a personal information system. First, you can experience hardware and software failure due to information corruption or power loss. Second, it is exposed to malware, which can disrupt activities occurring on the computer. Besides, if not looked thoroughly, PIS can acquire viruses from other computers when sharing information through external hard disks. Moreover, a PIS is at risk of receiving phishing, scams, and spams from connection to unsolicited emails. Also, human error is a significant concern when the individual keys in the wrong information are hence putting the system at risk. Other critical factors include hackers, fraud, and password theft, which are all performed by malicious people on the dark web.

Don't use plagiarised sources.Get your custom essay just from $11/page

Mitigation of the security concerns

Various measures can be deployed once a personal information system is exposed to the above risks. First, the user should enhance information confidentiality to control the vital information from reaching unauthorized persons. Second, the user should improve data integrity by ensuring that authorized and specified ways do all operations and software installations. Third, the system should only be available to the users only by providing the traffic delays are excluded. Lastly, the user should implement an effective system configuration method to monitor all network and system changes hence reporting malicious installations.

Develop at least five recommendations that should be included as part of a Business Continuity Plan if they were to fall victim to a cyber-attack or natural disaster.

  • Potential threats identification: ensure that your continuity business plan has applied to the potential threats of disruption of business information systems.
  • Potential outcomes identification: enhance a thorough study of what is likely to happen once the threats are identified.
  • Develop a recovery team: a recovery team is necessary to implement and raise the business continuity plan.
  • Implement a recovery plan: identify adequate and critical business functions hence come up with ways to restore them.
  • Develop a training program: take the initiative of training business employees on matters of computer security and critical observation of computer security protocols.

 

 

  1. Provide details on the development or implementation of the technology.

For the development and implementation of an effective personal information system, there are several technical details and resources needed. Four important technical information should be put in place. First, critical identification of the company involved deploying building permits. Second, the identification of the requirements and responsibilities of the company used to build grants. Third, identifying the inputs, processes, and outputs carried out in the building process. Lastly, there should be an effective design of the proposed personal information system.

On the other hand, the resources required for the process include; People, hardware, software, data, and network resources. The funds should be accurate to implement the required system.

 

Development style used in the implementation or maintenance of the tool

A complete personal information system involves seven central states as listed below;

  1. Primary analysis ii. System analysis iii. System design iv. Programming
  2. Testing vi. Implementation vii. Maintenance

However, implementation involves practical training of the users, provision of documents, and a critical conversion of the old system to the new policy. Implementation depends on diverse forms, including; kind of the system, type of system users, and urgency. On the other hand, maintenance includes making necessary changes in the new systems and identifying potential bugs and errors.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask