What is the role of users in information security?

What will be an ideal response?

Like all information systems, security systems have five components, including people.
Thus, every security system ultimately depends on the behavior of its users. If the users do not
take security seriously, if they do not follow security procedures, then the hardware, software,
and data components of the security system are wasted expenses. Almost all security systems use
user names and passwords. Users of information systems in a business organization will be
instructed to create a strong password and to protect it. It is vitally important for users to do so.

Business

You might also like to view...

Cal believes criminal penalties for antitrust violations should be increased. Donna believes antitrust offenses should be decriminalized. Based on the scenario, which of the following statements can be inferred?

A) Both subscribe to the Chicago School approach to antitrust policy. B) Both subscribe to the Harvard School approach to antitrust policy. C) Cal's views are closer to the Harvard School approach to antitrust policy. D) Donna's views are closer to the Harvard School approach to antitrust policy.

Business

After the professor passed back the graded test, you heard a student remark, "I didn't do well because the professor gave us tricky questions." Which locus of control does this student probably have?

A) Internal locus of control B) External locus of control C) High tolerance for ambiguity D) Small locus of control

Business