You are on page 1of 3

ST.

PAUL UNIVERSITY DUMAGUETE | SPUD Graduate School | Doctor of Business Administration

ANNOTATED BIBLIOGRAPHY/
WEBLIOGRAPHY
DBA 311
INFORMATION SYSTEM IN THE
CORPORATE WORLD

Week 3
BUSINESS INTELLIGENCE SYSTEMS, CRM, AND COMPETITIVE
ADVANTAGE

Week 4
MANAGING TECHNOLOGY-DRIVEN CHANGE
ROMARIO P. YBAÑEZ, DPA, DOP
Professor

AVERY JAN M. SILOS, MBA-HTM


DBA Student
AVERY JAN M. SILOS, MBA-HTM | DBA 311 Information System in the Corporate World | St. Paul University Dumaguete 1
ST. PAUL UNIVERSITY DUMAGUETE | SPUD Graduate School | Doctor of Business Administration

AREA OF STUDY

Question One: Look around your office, home, etc. and consider
your own practices regarding the Internet, Facebook, etc. What
security breaches at work or at home can you easily anticipate?
What will you do to make everything more secure?
Assignment 5

Bloom: Application

Answer:
In the advent of technology, theft or loss: Computers and laptops, portable electronic devices,
electronic media, paper files are inevitable. The majority of data breaches are difficult to prevent, but
that does not imply that they are difficult to anticipate. One or more of the following factors is
responsible for nearly all incidents. Due to Credentials forged or lost. Simple and common causes of
data breaches are stolen passwords. Password1 and 123456 are far too common, allowing cyber
criminals to easily access sensitive data without breaking a sweat. With millions of passwords available,
even moderately secure passwords can be cracked by computer programs. Keep in mind that using the
same phrase for multiple accounts leaves you open to attack. The Web application flaws can also be
anticipated. A crook can use any number of techniques to exploit a software's technical flaw That's why
the companies that maintain those programs look for and fix bugs before criminals do. When a
software vendor fixes a vulnerability, it releases a patch that users must apply. Criminals will actively
seek out organizations that are still vulnerable once they are aware of the vulnerability.
In addition, the most common to anticipate is the Malware. To illustrate how simple cybercrime
can be, consider malware. Crooks buy malware, find a system with a known vulnerability, install it, and
profit. It depends on the malware. There are many types of malware, ranging from keyloggers that
record what users type to ransomware that locks a system and demands payment to unlock it.
Therefore, there's always the risk that one of your employees will misuse sensitive data.
Unfortunately, the allure of profiting from data sales on the dark web is too strong for many to resist.
In addition, employees who are dissatisfied with their jobs or who have left the company under
difficult circumstances may misuse sensitive information. A data breach does not require malice on the
part of employees. Inadvertently attaching the wrong document, or losing a laptop are all examples of
mistakes made by employees.
However, in my honest opinion, I consider various major points to become secure of my data
and other related pertinent documents. Bring in cyber security experts. Clearly, a knowledgeable
workforce is essential for cyber security. However, finding them will become increasingly difficult. Keep
up: Your organization must evolve to keep up with the changing cyber threat landscape. Keeping up
with new attack methods and criminals' methods to compromise organizations ensures employee and
technology security. In addition to maintaining systems, servers, and applications, organizations should
use breach detection tools. Despite increased security budgets, many organizations continue to buy
and deploy older technology. Legacy products can no longer withstand modern hacking attacks. Using
global threat intelligence improves response time and increases the likelihood of identifying, detecting,
and preventing new threats. Keep an eye on your company. To effectively detect and investigate

AVERY JAN M. SILOS, MBA-HTM | DBA 311 Information System in the Corporate World | St. Paul University Dumaguete 2
ST. PAUL UNIVERSITY DUMAGUETE | SPUD Graduate School | Doctor of Business Administration

security incidents, analysts must be able to see compromise indicators. This includes network and
infrastructure telemetry, as well as applications and security systems.
Keep track of attack campaigns because traditional malware detection products only show and
respond to a single threat at a time. Security analysts often have to monitor an endless stream of
irrelevant alerts. Organizations that prioritize offensive campaigns and detect breaches early can stop
incidents in their tracks.
Breach negligence is huge. Organizations should provide ongoing training to all employees on
various attack and vulnerability detection methods. Employees should receive security training at least
once a year or after any security incident.

AVERY JAN M. SILOS, MBA-HTM | DBA 311 Information System in the Corporate World | St. Paul University Dumaguete 3

You might also like