Threats take many form
•White collar crime, natural disasters (earthquakes, floods), vandalism, and carelessnes.
•Computer center security: hardware à jika perangkat keras fails, gagal maka MIS fails. Ancaman kegagalan dapat diminimalkan oleh implementing security precautions that prevent access by unauthorized personnel and by taking steps to keep all hardware operational.
software
•Unless properly controlled, the software for an MIS can be modified for personal gain. Thus, close control over software development and the documentation of an MIS is needed to minimize the opportunity for computer crime. Operational control procedures that are built into the design of an MIS will constantly monitor processing accuracy.
File /data bases
•The data base contains the raw material for information. The files /data bases are the life blood of a company and must be protected.