76.7k views
4 votes
As identified in Chapter 1, there are many threats to an organization’s Information Systems Security. Users are often considered the weakest link to Information Systems Security. On the other hand, users can also be the strongest asset to Information Systems Security. Do some research from at least 3 sources and take an informed position on this issue of the users in regards to Information Systems Security. Write a 2 to 3 paragraph summary of your position. Make sure to include at least 3 research references that informed your viewpoint in APA format. I have provided one reference to get you started.

Provide an example of when a user has improved or compromised a system's security.

1 Answer

4 votes

Final answer:

Users can be both the weakest link and the strongest asset in Information Systems Security.

Step-by-step explanation:

Users can be both the weakest link and the strongest asset in Information Systems Security. While users are often responsible for security breaches due to their susceptibility to social engineering attacks or their lack of awareness regarding security best practices, they can also play a crucial role in protecting an organization's systems. For example, a user can improve system security by following strong password practices, enabling two-factor authentication, and promptly reporting any suspicious activity or phishing attempts. On the other hand, a user can compromise system security by falling for phishing scams, sharing sensitive information with unauthorized individuals, or downloading malicious software.

According to a study by Bruno & Abrahão, the volume of decisions made by operators in an information security center can impact their accuracy in identifying real security breaches. As their cognitive effort increases, operators may make more errors in falsely identifying incidents as real breaches. This highlights the role that user decision-making can play in compromising system security.

User Jason Pyeron
by
7.3k points