StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Technology Evaluation and Recommendation - Research Paper Example

Cite this document
Summary
Technology Evaluation and Recommendation Name Professor Institution Course Date In identifying risks, the need determine how assets can be damaged, destroyed, stolen and altered in an organization is the essence of information technology. The risk assessment gives a ground on which to implement security plans in order to protect assets of an organization from possible and impending threats…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
Technology Evaluation and Recommendation
Read Text Preview

Extract of sample "Technology Evaluation and Recommendation"

Technology Evaluation and Recommendation In identifying risks, the need determine how assets can be damaged, destroyed, stolen and altered in an organization is the essence of information technology. The risk assessment gives a ground on which to implement security plans in order to protect assets of an organization from possible and impending threats. In order to improve the security of assets against threats, it is important to find out. One, what are these assets that need protection. They include component failure, ‘unauthorized deletion or modification, misuse of software and hard ware, unauthorized disclosure of information, viruses, Trojan horses, or worms, riots, fires, floods, or earthquakes, penetration (hackers) and software bugs and flaws’, Peter and Thomas (2001).

After assessing the risks, the next plan of action for the organization is to plan pro-actively, Layton, Timothy (2007). This involves developing security measures and limitations, and implementing tools to help in the security. This will help protect the “assets of the organization and employee mistakes” (p. 90) Often, organizations evaluate technology adoption according to how they collect process and distribute data within and outside the organization. This particularly depends on the amount of data to process.

For this reason, the organization should consider installing large storage devices that will aid fast processing of information. Most of the organizations have different departments. Data within the organization has to be shared daily basis where some of the data has to be directed to few individuals. An organization is therefore responsible how the information is to be shared (Ronald 2003). In computer, “security risk assessment planning is very important”. In most circumstances no plan of action can be of any importance unless a risk assessment is performed, Allen and Julia (2001).

The risk assessment gives a ground on which to implement security plans in order to protect assets of an organization from possible and impending threats. In order to improve the security of assets against threats, it is important to find out. One, what are these assets that need protection. Two, what level of risk of the assets in question and third, what level of resources the organization has put in place to upgrade the assets and protect them against any risk. According to Allen and Julia (2001), a risk is when a threat tries to harm your computer as a result of the computer vulnerability.

Therefore the plans and policies to protect your system after knowing the threats involved are eminent. The following are some of the ways to indentify risks to your system. One, gather all the work-force in your organization and have a brain storming session where-by you list all the assets and their respective threats. This will help to increase security awareness in your organization. There are three sources of these risks: This include: unintentional risks, natural disaster risks and intentional risks (Allen and Julia (2001).

This can be illustrated as follow, in the figure below: Source: (Peter and Thomas, 2001). Identifying Risks to the Assets To identify risks, one need determine how assets can be damaged, destroyed, stolen and altered. They include component failure, ‘unauthorized deletion or modification, misuse of software and hard ware, unauthorized disclosure of information, viruses, Trojan horses, or worms, riots, fires, floods, or earthquakes, penetration (hackers) and software bugs and flaws’, Peter and Thomas (2001).

Candidates’ technology based solution The information produced, should be categorized according to it is sensitivity to loss or disclosure. For our client, the following set of informational categories can be used. One, proprietary; in this case for internal use only and also, data should be broken down based on the following requirements: “confidential, private, sensitive and public. Besides, an estimate of the likelihood of each risk, which is done by, obtaining estimates from insurance companies”.

(Peter and Thomas, 2001). Also identify the type of threat and the method of attack. Security threats can be divided into human threats and natural disaster threats. The human threats can further divided into malicious and non-malicious threats. In understanding these threats, it is possible to ascertain the vulnerabilities caused in the exploitation, and particularly which assets are targeted during the attack (Layton and Timothy, 2007). After assessing the risks, the next plan of action for the organization is to plan pro-actively, Layton, Timothy (2007).

This involves developing security measures and limitations, and implementing tools to help in the security. This will help protect the “assets of the organization and employee mistakes” (p. 90) Also, the organization should develop password policies. This password should be kept secret at all times. The use of password should not be compromised in it is use and storage. This means for effective use of pass word, it should be changed periodically, and should be assigned to the user when used for the first time.

This can be ensured that the system maintains the pass word data base (Ronald 2003). In conclusion, organizations should ensure that they have different accounts with different access rights. These accounts should adopt unique passwords changed periodically to prevent hackers from invading the organization confidential data. References Allen, Julia H. (2001). The Cert Guide to System and Network Security Practices. Boston Ronald L. (2003). I-formation Security: Design, Implementation, Measurement, and Compliance. London. Layton, Timothy P. (2007). The CISSP Pre Guide (Gold Edition Ed.). London.

Peter, Thomas R. (2001). Information Security Risk Analysis. Boca Raton, FL: Acerbic publications

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Technology Evaluation and Recommendation Research Paper”, n.d.)
Technology Evaluation and Recommendation Research Paper. Retrieved from https://studentshare.org/information-technology/1433750-technology-evaluation-and-recommendation
(Technology Evaluation and Recommendation Research Paper)
Technology Evaluation and Recommendation Research Paper. https://studentshare.org/information-technology/1433750-technology-evaluation-and-recommendation.
“Technology Evaluation and Recommendation Research Paper”, n.d. https://studentshare.org/information-technology/1433750-technology-evaluation-and-recommendation.
  • Cited: 0 times

CHECK THESE SAMPLES OF Technology Evaluation and Recommendation

Assistive Technology: Evaluation

evaluation of Assistive Technology Name University evaluation of Assistive Technology Beard, Carpenter, and Johnston (2011) effectively state that, “Assistive technology, like education, should not be approached with a ‘one size fits all' mentality'” (p.... Just as teachers should not teaching to only one learning style in a classroom, assistive technology should not be expected to work the same way in every situation.... Even when a particular piece of equipment is useful for multiple students within a school, the ways in which that technology is utilized may vary dramatically from one student to another....
5 Pages (1250 words) Assignment

Technological Evaluation and Recommendation

Technological evaluation and recommendation Name: Tutor: Course: Institution: Date: Executive Summary This paper focuses on evaluating and identifying ways through which issues of data leaks can be addressed in order to avoid exposure to financial looses and damages of reputation.... Besides, the paper will also make a recommendation for the best fit technology-based solution for solving and mitigating the problem cause by data leaks.... The paper will entail a matrix section which will focus on categorizing and assessing the risks related with data leaks, and three technology based solution will be provided and discussed as effective protection measures....
5 Pages (1250 words) Research Paper

The Tampa Clubs System Evaluation

TimeXone Technologies Memo To: Chief Executive Officer (CEO), The Tampa Club From: [Write Your Name] Cc: Chief Technology Officer, TimeXone Technologies Date: 22nd September 2013 Re: The Tampa Club's System evaluation and recommendation Kindly refer to your request for evaluating and furnishing recommendations for the Transaction Processing System (TPS) to be implemented in the ‘The Tampa Club'.... TimeXone Technologies Memo Chief Executive Officer (CEO), The Tampa Club [Write Cc: Chief Technology Officer, TimeXone Technologies Date: 22nd September 2013 Re: The Tampa Club's System evaluation and recommendation Kindly refer to your request for evaluating and furnishing recommendations for the Transaction Processing System (TPS) to be implemented in the ‘The Tampa Club'....
2 Pages (500 words) Essay

Project Involving the Evaluation of a Website

First, will be the introduction of the website in regards to the 7Cs of website evaluation.... It is essential that evaluation of website meets the standard criteria.... evaluation is a process of assessing the subject in accordance to set of rules that are applicable.... Introduction Evaluating IKKS website involve assessment of the website in regard to e-business evaluation criteria.... IKKS evaluation involves the assessments of context, content, community, customization, communication, connection and commerce....
16 Pages (4000 words) Coursework

Formative and Sumative Evaluations

eacher evaluation is a very important practice that helps ensure this development among teachers.... It is very important so that ineffective teacher evaluation systems are seen to be more costly than effective ones.... However, formal teacher's evaluation was traced to have begun at the turn of the 20th century to about 1980 (Robert F.... With this change in the phase and face of life, one thing that should be able to cope with it so religiously is the scope of education. … Teachers and schools administrators are challenged to adapt and enjoy the fruits that technology has given us-such as computers, personal digital assistant (PDA) and other electronic gadgets....
20 Pages (5000 words) Essay

Evaluation of Learner Performance

imilarly, approaches to evaluation and even associated models are covered in depth.... The reporter states that evaluation plays a vital role in models of instruction.... evaluation methodologies and tools help to determine general effective of instruction methods.... Part of this explanation inclines on the fact that the evaluation in itself is a complex activity.... The purposes entail the evaluation of instructional materials, student learning, the return of investment, transfer of training and many other factors....
4 Pages (1000 words) Assignment

Tornado-Evacuation 2012 - Operation Based Exercise Development

Part of the Strategy is the provision of a Controller and Evaluator Guide, an evaluation Guide, a Master Scenario Event List (MSEL).... Part of the Strategy is the provision of a Controller and Evaluator Guide, an evaluation Guide, a Master Scenario Event List (MSEL), and specific briefings for all those who are to be prepared for such emergency situations in Oklahoma City....
34 Pages (8500 words) Essay

Technology Failure in Business

This tool revolves around three steps, namely “activity analysis, value analysis, as well as evaluation and planning” (Gunzenhauser & Bongulielmi, 2008, p.... Such a recommendation will increase the project's value and also reduce goal differences between what may be of value to customers and what the agent may actually want to implement.... The evaluation of the implementation process should be done by the principal and the agent/vendor to achieve project success....
3 Pages (750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us