Abstract
M.Phil.
The use of information systems has increased dramatically after the emergence of internet.
Individuals, companies and organizations are becoming increasingly dependent on IT
systems.
Before technology and computers became such an important part of society, it was difficult
to manage and control large organizations. Today computers enable the effective and
efficient management of large organizations, therefore allowing them to spread throughout
the country and world.
Businesses are following latest advances in this era to remain competitive in the changing
global market place. They use computers, automated IT systems and networks to gather,
store, retrieve, process, and analyze information as well as to trade and communicate.
The rapid advances in computer technology are largely a result of the research,
development and design efforts of computer engineers. There is a direct correlation
between a nation's wealth and scientific and technological capacity. The most effective
way of taking our country forward is to enthuse our youth for science and technology. As the world makes rapid, sometimes breathtaking strides in the diverse fields of science
and technology, South Africa more than ever needs qualified individuals who will use their
skills and entrepreneurial spirit to enable our country to complete internationally with the
best.
However, Information systems and networks and their worldwide increasing usage have
been accompanied by new and increasing risks. Data and information stored on and
transmitted over information technology systems and networks are subject to threats from
various means of unauthorized access, such as misuse, misappropriation, alteration,
malicious code transmissions, denial of service or destruction and require appropriate
safeguards. This research report will aim to emphasize the importance of risk management and its three
activities; risk assessment, risk mitigation and evaluation and assessment. It will focus on
activities that deal with the solution of problems through logical thinking, information
system management
This report will also deal with a case study that gives us real life examples of risk
management experiences of one local computer hardware and software supplier
companies.
Information has become valuable assets that need to be protected after moving to a digital
era and E-commerce. Protecting information can also be as critical as protecting other
resources like money and physical assets.