Lists of assets of Apple Inc. that is vulnerable to destruction, abuse, error, and system quality issues
Any kind of successful business organizations tries to implement both small and large sized technologies for managing their overall business activities followed by the act of making business decisions. These kinds of organizations mostly utilize information systems for collecting as well as processing data based on the requirements of the managers, business owners, and analyst. It can be seen that the business processes are getting operated more effectively with the utilization of varied information systems for interacting with the partners and customers thereby generating revenues and curtailing costs. Information systems have managed to acquire the importance of processing any kind of data from the organizational inputs thereby generating information which are worthy of managing the overall operations of the organization.
Primarily, the research concentrates on the information systems that are being utilized by Apple Inc. The research concentrates on the lists of assets of Apple Inc. that is vulnerable to destruction, abuse, error, and system quality issues. The report then focuses on risk management techniques adopted by Apple Inc. for ensuring availability, reliability, confidentiality, security of the digital business processes, and integrity. The discussion then continues with the evaluation of the risk management including risk identification, risk assessment, and risk control for Apple Inc. followed by the Illustration and identification of the general management controls and application controls for Apple Inc. The report concentrates on the audit plan and processes of Apple Inc and the impact of human factors on risk management and security. Finally, the report ends with a conclusion.
According to the research, it has been identified that there are various kinds of assets belonging to Apple Inc. which are vulnerable to destruction, abuse, error, and system quality issues (Mogensen 2018). The list of assets of Apple Inc. that are vulnerable to destruction, abuse, error, and system quality issues includes international operation risks, inventory risks, competition risks, market risks, economic uncertainties, and raw material risks. The threats that are related to the information system of Apple Inc. include unauthorized access, theft, computer viruses, denial of service attacks, identity theft and data theft (Laudon and Laudon, 2016).
The most important kind of security risks related to the computer information systems is any kind of unauthorized access towards the confidential data. The primary aim of the hackers is to break the security of the computers that are being manufactured by Apple Inc. thereby affecting the information system as a whole. Moreover, it can be seen that the loss of crucial data, software and hardware results in affecting the effectiveness of Apple Inc. The information systems of Apple Inc are also getting affected due to the computer viruses which enter into the computer without informing or providing knowledge to the user regarding the duplicity. The primary aim of the denial of service attacks is to hamper the targeted network thereby allowing the network to deny the service which is being operated by the legitimate users (Zaidi et al. 2016).
Apple Inc. is also vulnerable to identity theft which is regarded as the stealing of personal information that includes credit card numbers driving licenses numbers and various kinds of personal related information. Finally, it can be said that Apple Inc. is also one able to detect which happens due to the copying of important files without hampering the original copy and this information is being used for getting the access of the system of victims (Carroll 2014).
Risk management techniques adopted by Apple Inc. for ensuring availability, reliability, confidentiality, security of the digital business processes, and integrity
For bring the technology and increasing the competition in the field of the technology industry it is necessary for Apple Inc. to initiate their plan of enterprise risk management Answering the availability, reliability, confidentiality, security of the digital business processes, and integrity. Implementation of the enterprise resource management is becoming an innovative trend within the marketplace and several competitors of Apple Inc. are starting to develop their own risk management plan for competing with Apple Inc. Thus, it is quite crucial for Apple Inc. to introduce their own risk management plan for getting a leading position (Dryden et al. 2016).
During the research, it has been found that the enterprise risk management allows Apple Inc. to analyze any kinds of risk followed by the impacts of those risks that are been identified. The implementation of the action plan for Apple Inc. is going to manage the identified risk in an effective manner with the allocation of available resources thereby reinforcing the decisions towards risk response for reducing the operational losses (Doorley and Garcia, 2015). Having the enterprise risk management within the organization will help in developing a risk awareness culture followed by the sharing of standard and common objectives regarding the risk management. It is quite necessary to develop the enterprise risk management followed by evaluation of that enterprise risk management plan within all the levels of the organization that can be recognized by all the persons working within the organization (Fong, Wheeler and Henninger, 2016).
For minimizing the disasters, error, beaches of security, and computer crime it is necessary for Apple Inc. to design and implement information systems. The blend of manual and robotized estimates that protect data frameworks furthermore, guarantee that they perform as per administration gauges is named controls. Controls comprise of the considerable number of strategies, arrangements, and authoritative methods that guarantee the security of the association’s advantages, the exactness and unwavering quality of its bookkeeping records, what’s more, operational adherence to administration gauges (Gharabally 2015). Before, the control of data frameworks was dealt with as an idea in retrospect, tended to just toward the finish of usage, just before the framework was introduced. Today, associations are so basically subject to data frameworks that vulnerabilities also, control issues must be recognized as right on time as would be prudent (Zibouh, Dalli and Drissi, 2016). The control of a data framework must be a vital piece of its plan. Clients and developers of frameworks must give careful consideration to controls all through the framework’s life expectancy. In the research, it has been found that the computer system is being controlled by the addition of both general controls and application controls.
Thus, it can be said that Apple Inc. needs to introduce both the general controls and application controls for controlling their computer systems. General controls are considered to be those which helps in controlling the plan, security, and utilization of PC programs and the security of information records when all is said in done all through the association. All in all, general controls apply to all modernized applications and comprise of a mix of framework programming and manual strategies that make a general control condition (Susanto and Almunawar, 2018). Application controls are particular controls one of a kind to each automated application, for example, finance, records of sales, and request handling. They comprise of the two controls connected from the client utilitarian region of a specific framework and from modified systems.
Evaluation of the risk management including risk identification, risk assessment, and risk control for Apple Inc.
The audit plan for Apple Inc. consists of various kinds of analysis including PESTLE analysis SWOT analysis, Porter five forces analysis, and STP analysis. All this analysis helps in understanding the overview of Apple Inc. thereby helping to understand the position of the organization in comparison with the other competitors (Laudon and Laudon, 2016). It likewise causes us to comprehend the explanation for the aggressive edge and the motivation behind why Apple Inc. appreciates an exceptional cost. With the Porters Model, we could decide the powers that follow up on Apple Inc. from various merchants, providers, markets, client, and so forth and how does Apple Inc. support them (Singh, Jeong, and Park, 2016).
After the advertising audit, we have proposed an administration improvement of a current administration that is the cloud-based mobiles and workstations. This would be an administration at first, yet later even the equipment identified with it should be presented and they would go as an inseparable unit (Salisbury, Ferratt, and Wynn, 2015).
In the research, it has been found that the risk management is the way toward estimating or evaluating danger and after those creating methodologies to deal with the hazard. The procedures utilized incorporate exchanging the hazard to another gathering, evading the hazard, lessening the negative impact of the hazard, and tolerating a few or the majority of the results of a specific hazard (Sharma et al. 2017). Customary hazard administration centers on dangers coming from physical or lawful causes. It doesn’t make a difference the sort of hazard administration; every single expansive organization has chance administration groups. Both the machines and people are liable to mistakes and impact the nature of an item. The way hazard is evaluated for machines and people is altogether different. Mechanized procedures – done by machines – are presented to a couple of outer impacts, which are known and can be controlled. A machine conveys factual information (Schell and Haggerty, 2015).
Conclusion
After the analysis of the overall research, it can be concluded that any kind of successful business organizations tries to implement both small and large sized technologies for managing their overall business activities followed by the act of making business decisions. The list of assets of Apple Inc. that are vulnerable to destruction, abuse, error, and system quality issues includes international operation risks, inventory risks, competition risks, market risks, economic uncertainties, and raw material risks. Moreover, it has been found that implementation of the enterprise resource management is becoming an innovative trend within the marketplace and several competitors of Apple Inc. are starting to develop their own risk management plan for competing with Apple Inc. For minimizing the disasters, error, beaches of security, and computer crime it is necessary for Apple Inc. to design and implement information systems. The audit plan for Apple Inc. consists of various kinds of analysis including PESTLE analysis SWOT analysis, Porter five forces analysis, and STP analysis.
References
Carroll, J.M., 2014. Computer security. Butterworth-Heinemann.
Curts, R.J. and Campbell, D.E., 2015. Cybersecurity requires a clear systems engineering approach as a basis for its cyberstrategy. Cybersecurity policies and strategies for cyberwarfare prevention (pp. 102-120). IGI Global.
Doorley, J. and Garcia, H.F., 2015. Reputation management: The key to successful public relations and corporate communication. Routledge.
Dryden, J., Grammich, C., Mele, J., Nelson, W., Orrie, R., Shontz, D. and Szafran, A., 2016, April. Issues With Access to Acquisition Data and Information in the Department of Defense: Doing Data Right in Weapon System Acquisition. In Thirteenth Annual Acquisition Research Symposium. Naval Postgraduate School.
Fong, E.K.H., Wheeler, D.A. and Henninger, A.E., 2016. State-of-the-Art Resources (SOAR) for Software Vulnerability Detection, Test, and Evaluation 2016.
Gharabally, S., Apple Inc, 2015. Devices with profile-based operating mode controls. U.S. Patent 9,183,534.
Laudon, K.C., and Laudon, J.P., 2016. Management information system. Pearson Education India.
Laudon, K.C., and Laudon, J.P., 2016. Management information system. Pearson Education India.
Mogensen, B.G., 2018. Managing Corporate Legitimacy Through CSR Reporting: A Qualitative Case Study of Apple Inc.’s Supplier Responsibility Reports (Master’s thesis).
Salisbury, W.D., Ferratt, T.W. and Wynn, D.E., 2015. Assessing the Emphasis on Information Security in the Systems Analysis and Design Course. Communications of the Association for Information Systems, 36(18).
Schell, S.V. and Haggerty, D.T., Apple Inc, 2015. Management systems for multiple access control entities. U.S. Patent 9,100,810.
Sharma, P.K., Kaushik, P.S., Agarwal, P., Jain, P., Agarwal, S. and Dixit, K., 2017, October. Issues and challenges of data security in a cloud computing environment. In Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), 2017 IEEE 8th Annual (pp. 560-566). IEEE.
Singh, S., Jeong, Y.S. and Park, J.H., 2016. A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, pp.200-222.
Susanto, H. and Almunawar, M.N., 2018. Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard. CRC Press.
Zaidi, S.F.A., Shah, M.A., Kamran, M., Javaid, Q. and Zhang, S., 2016. A survey on security for a smartphone device. International journal of advanced computer science and applications, 7(4), pp.206-219.
Zibouh, O., Dalli, A. and Drissi, H., 2016. CLOUD COMPUTING SECURITY THROUGH PARALLELIZING FULLY HOMOMORPHIC ENCRYPTION APPLIED TO MULTI-CLOUD APPROACH. Journal of Theoretical & Applied Information Technology, 87(2).