R212679B Travolta MIS Individual Assignment
R212679B Travolta MIS Individual Assignment
OF ZIMBABWE
SURNAME: MOYO
REGISTRATION NUMBER:212679B
M.O.E: ONLINE
INFORMATION TECHNOLOGY
LEVEL: 4:1
LECTURER: Mr H.Chikunya
1)
a) The rapid growth of ICTs has significantly expanded the attack surface for cyber
threats, resulting in a variety of security challenges beyond viruses. Some of these are:
Phishing and Social Engineering Attacks:
Phishing attacks use deceptive emails or websites to trick individuals into providing
sensitive information such as passwords, financial details, or personal data.
Social engineering manipulates people into bypassing security protocols, exploiting
human psychology rather than technical vulnerabilities
Ransomware:
Insider Threats:
Insider threats arise from employees or contractors misusing their access privileges,
whether intentionally or through negligence. These threats are particularly difficult to
detect because they occur within trusted environments
Zero-Day Exploits:
Attackers exploit vulnerabilities in software or systems before vendors are aware of the
issues and can provide patches. These exploits are particularly dangerous due to their
unpredictability and the window of opportunity they provide to attackers.
Cybercriminals exploit flaws in web applications, such as SQL injection and cross-site
scripting, to gain unauthorized access to data or compromise systems. As organizations
increasingly rely on web-based platforms, these threats have become more prevalent
APTs are long-term, targeted cyber-attacks often conducted by well-funded groups with
specific objectives, such as stealing intellectual property or conducting espionage.
With the proliferation of mobile devices and IoT (Internet of Things), attackers target
these technologies to access sensitive data or disrupt critical services. These threats
illustrate the dynamic and evolving nature of cybersecurity challenges in modern
information systems.
b) Major Differences Between Supply Chain and Value Chain
The supply chain and value chain are fundamental concepts in business operations,
with distinct scopes, goals, and components. Here is a detailed comparison:
Definition and Focus:
Value Chain:
Encompasses the full range of activities that create value for customers, including
design, production, marketing, and after-sales service. Aims to enhance customer
satisfaction and competitive advantage by delivering superior value.
Primary Goals:
Supply Chain:
Emphasizes minimizing costs, managing logistics, and ensuring the smooth flow of
goods across different entities.
Value Chain:
Components:
Supply Chain:
Value Chain:
Perspective:
Supply Chain:
Value Chain:
Supply Chain:
Value Chain:
Integration:
Supply Chain:
Involves collaboration with external entities like suppliers and logistics providers.
Value Chain:
In summary, while the supply chain emphasizes efficient resource management and
logistics, the value chain focuses on creating and delivering value that meets
customer expectations. Both are critical to achieving holistic business success.
2)
a) Introducing a new information system in the workplace can disrupt established
workflows, roles, and expectations. Staff objections to these changes often stem from
several key factors:
i) Fear of Job Loss or Role Redefinition:
Employees may worry that automation or improved efficiency brought by the system
could make their roles redundant or lead to significant job restructuring.
Employees may feel alienated if they are not consulted during the selection and
implementation process of the new system. This lack of involvement can lead to
resistance out of frustration or a sense of undervaluation.
During the transition phase, employees may face increased workloads due to dual-
system operations (old and new) or additional tasks like data migration and
testing.
If the advantages of the new system are not effectively communicated, employees
might perceive the changes as unnecessary or arbitrary, fuelling resistance.
Social networking tools (e.g., Microsoft Teams, Slack) and platforms have
enabled real-time communication, fostering collaboration among
geographically dispersed teams.
Social media platforms generate vast amounts of user data, offering insights
into customer behaviour and preferences. MIS now incorporates advanced
analytics tools to process this data for business intelligence.
Cloud technology, often coupled with mobile and social networking, enables
scalable and cost-effective deployment of MIS, ensuring broader
organizational access and reduced dependency on physical infrastructure.
These developments have made MIS more dynamic, flexible, and user-oriented,
aligning with the needs of modern, interconnected organizations.
Implementing an ERP system can take several years due to its complexity. This
extended timeframe may lead to delays in realizing the expected benefits.
Employees may resist adopting the new system due to fear of job
displacement, lack of familiarity, or reluctance to change established
workflows. Proper change management is crucial to address this issue.
Integrating existing data into the ERP system involves identifying and
correcting data silos, inconsistencies, and redundancies. Poor data quality can
impede system functionality.
By providing centralized data access and automation, ERP modules break down silos
and foster an environment where teams can work together effectively, ultimately
enhancing organizational productivity and decision-making.
4)
a) The Information Systems Processing Cycle involves four main stages: input,
processing, output, and storage. Each stage comes with potential challenges and risks:
i) Input Stage:
Incompatible formats: Data from multiple sources may not align with
system requirements.
Mitigation:
Mitigation:
Formatting issues: Output data might not meet the end-users' needs.
Mitigation:
i) Storage Stage:
Data loss: Poor backup strategies can lead to irreversible data loss.
Mitigation:
ii) Software:
iii) Data:
The raw facts and figures processed into meaningful information. action for
decision-making and operational activities.
iv) People:
Includes all users, from front-line employees to IT professionals and decision-
makers designing, managing, and operating the system.
v) Processes:
The workflows and procedures that guide the collection, processing, and use
of data.
Employees may fear job losses or be reluctant to adopt new processes that disrupt
established workflows.
Solution: Invest in data analytics tools and establish robust data governance
practices.
New processes may not integrate well with existing workflows or systems.
Solution: Conduct compatibility assessments and involve IT teams to address
integration issues.
Solution: Develop a phased approach that incorporates both quick wins and long-
term strategies
Definition:
Leading Indicators:
Lagging Indicators:
Examples:
i) Excess Inventory:
ii) Overproduction:
Components of DSS:
Ensures ease of use through graphical interfaces, dashboards, and reporting tools.
v) Integration Tools:
Connects the DSS with other organizational systems, such as ERP and CRM.
Designed for top executives to monitor Helps middle and lower management make
Purpose
organizational performance and trends. tactical and operational decisions.
High-level summarized and aggregated Both detailed and summarized data for deep
Data Scope
data. analysis.
Simplified with pre-defined reports and Complex analytical models requiring user input
Complexity
dashboards. and interaction.
EIS is ideal for executives focusing on broad organizational insights, while DSS supports
managers and analysts working on specific, data-driven tasks.
7)
a) Differentiation Between Data and Information and Characteristics of
Information
i) Data:
ii) Information:
Characteristics of Information:
1. Accuracy:
Reliable and free from significant errors.
2. Relevance:
3. Timeliness:
4. Completeness:
5. Consistency:
i) Enhanced Decision-Making:
Examples:
a) The prototyping life cycle approach involves creating a preliminary version of the
system, allowing users to interact with it and provide feedback. This iterative
approach ensures that user requirements are accurately captured and refined during
the development process.
v) Final Implementation:
v) IT and Support:
Purpose Provides routine reports and summaries for Assists in making semi-structured and
Aspect Management Information System (MIS) Decision Support System (DSS)
Focuses on structured data and predefined Uses both structured and unstructured
Data Scope
processes. data for analysis.
User Limited user interaction; delivers static High interaction; supports dynamic
Interaction reports. queries and simulations.
i) Performance Tracking:
v) Risk Management:
a) Scenario Overview
In 2017, Equifax, one of the largest credit reporting agencies, suffered a massive data
breach exposing sensitive personal information of approximately 147 million individuals.
The breach is considered one of the most severe due to its scale and the nature of data
involved, including Social Security numbers, addresses, and credit card details.
The breach occurred due to an unpatched vulnerability in the Apache Struts web
application framework. Despite a known vulnerability and a fix being available,
Equifax failed to apply the patch promptly.
Inefficient scanning and monitoring processes meant that the vulnerability remained
undetected for months.
The organization’s slow response to the breach exacerbated the situation. Hackers
had access to sensitive data for over two months before the breach was detected.
Critical data was either inadequately encrypted or not encrypted at all, making it
easier for attackers to exploit.
The breach severely impacted customer trust, tarnishing Equifax's reputation and
credibility.
Implement automated systems to detect and apply security patches promptly across
all applications and systems.
Encrypt all sensitive data both in transit and at rest. Ensure strict access control
mechanisms are in place to limit exposure.
Deploy advanced monitoring tools like Security Information and Event Management
(SIEM) systems to detect and respond to threats in real-time.
Align security practices with industry regulations such as GDPR and ensure regular
compliance audits.
10)
a)
c)
i) Computer Operations Controls [3 marks]
Backup Procedures: Regular data backups protect against data loss and
enable system restoration in case of failure.
Access Controls: Managing and monitoring who can access certain data
or system functionalities.
d)
Data security controls are measures to protect data from unauthorized access,
alteration, or destruction. Examples include:
Access Control Lists (ACLs): Define user permissions for accessing specific
data.
e) Administrative Controls
Audit Trails: Tracks changes and access within the application to monitor for
unauthorized or suspicious activity.
11)
a) Information systems ethics refers to the principles and standards governing the
acceptable use of information systems, addressing issues of privacy, property rights,
accuracy, and accessibility. It encompasses both the ethical challenges presented by
digital technology and the expectations for responsible behaviour in managing,
accessing, and distributing information.
i) Loss of Trust: When unethical practices are exposed, organizations risk losing the
trust of customers, stakeholders, and the public. This erosion of trust can have
lasting reputational damage.
ii) Legal and Financial Penalties: Many unethical practices, such as data breaches
and intellectual property violations, lead to legal action and costly penalties.
Compliance with regulations like GDPR is essential to avoid these repercussions.
iii) Operational Disruptions: Unethical behaviour, such as cutting corners in
security practices, can lead to system failures, data breaches, and cyber-attacks,
which disrupt operations and require costly recovery measures.
iv) Harm to Individuals: Inaccurate information, invasion of privacy, or
discrimination due to inaccessible systems can result in personal harm or even
physical danger, particularly in sensitive fields like healthcare and finance.
v) Loss of Competitive Advantage: A lack of ethical standards can hinder
innovation, alienate clients, and drive talent away, weakening the organization's
market position.