Description
1. What security concerns are inherent to using this system/technology, and how should these be mitigated?
- Develop at least 5 recommendations that should be included as part of a Business Continuity Plan if they were to fall victim to a cyber attack or natural disaster.
2. Provide details on development or implementation of the technology.
- Technical details and resources needed during development and implementation of the system.
- Development style used in implementation or maintenance of the tool.
All the answer are about PERSONAL INFORMATION SYSTEM.
Explanation & Answer
Kindly Check
Running head: PERSONAL INFORMATION SYSTEM
PERSONAL INFORMATION SYSTEM
Student’s name
Institutional affiliation
1
PERSONAL INFORMATION SYSTEM
2
Introduction
A personal information system (PIS) is a particular system that is used to support
attainment, storage, and repossession of information y the users. A private information system is
usually more concentrated in the storage and repossession of bibliographic positions. Scientists
use the information for computerized indexes and research of adequate information necessary to
enhance guidelines for automated personal information system design.
1. What security concerns are inherent to using this system/technology, and how
should these be mitigated?
a) Concerns inherent to PIS
There are several security alarms which arise as a result of using a personal information
system. First, you can experience hardware and software failure due to information corruption or
power loss. Second, it is exposed to malware, which can disrupt activities occurring on the
computer. Besides, if not looked thoroughly, PIS can acquire viruses from other computers when
...