StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Dependence on IT in Business Operations - Admission/Application Essay Example

Cite this document
Summary
The paper "Dependence on IT in Business Operations" explains that information security has become a dynamic and complex function, which provides an approach for information security managers to implement holistic information management approaches while addressing the fundamental business objectives…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
Dependence on IT in Business Operations
Read Text Preview

Extract of sample "Dependence on IT in Business Operations"

Task InfoSec INTRODUCTION As organizations continue to increase their dependence on IT in business operations, information security has continuously presented numerous challenges. Information security has become a dynamic and complex function, which provides an approach for information security managers to implement holistic information management approaches, while addressing the fundamental business objectives (Whitman and Mattord 45). This dependence on computers has necessitated the inclusion of technology-based information security systems that seek to ensure protection of the information infrastructure’s different threats. Information is an important asset to the organizations and its protection is critical to the sustainability of organizational operations. The security system adopted by organizations should be able to have the following features and capabilities. FUNCTIONAL APPROACHES OF THE SYSTEM Risk avoidance – this is the basic reason why information security systems are implemented in many organizations. This seeks to ensure that the imminent risks are avoided by identifying them before they occur. The information security system should be focused on limiting the exposure to potential risks of information loss Deterrence – this is a function that is aimed at reducing the risk of threat through fear. Many of the threats that occur come from humans and the availability of an information security system reduces the probability of attack. This can include various communication strategies aimed at impressing potential attackers with the increased possibility of getting caught, while committing an offence. Prevention – this has been the main focus for traditional information security systems. This involves the implementation of different safeguards that seek to ensure the mitigation of threats before they can occur. These are aimed at stopping the threats from affecting the organizations. Detection –this seeks to ensure that the potential security threats affecting an organization are known to the organization. The aspect of detection works together with prevention in providing support. Any imminent threats must be detected for a corrective action to be taken. When combined with prevention, detection is a highly effective functions which could enhance the information safety within a business entity. Recovery – in systems management, there is always a possibility of failure of the approaches which have been development to initiate security into the management systems. Though it works as the last available option once others have failed, it is the fundamental security consideration which should be undertaken before all the others. The system should be able to present a backup media which can be utilized to restore the content and information contained in the system in case a threat surpasses all the other control measures. INFORMATION SECURITY DOMAINS Holistic implementation of information security within organizations can be defined by different interdependent elements that can be utilized by mapping the department and job descriptions of different individuals. These domains seeks to ensure that there is comprehensive security of information contained within the organization (Stavroulakis and Stamp 245). The system protection would include the following functions. Operational security – this is aimed at ensuring protections of managerial policies and decisions in a hierarchical manner Physical security that seeks to protect the systems from physical damage that might occur. Personnel security, which is involved in conducting training of the human resources to ensure they are conversant with security procedures applicable under different settings. Network security, which seeks to protect the communication and network equipment from technological elements which might cause threats. System security, which is mainly concerned with authentication controls seeking to grand permissions and privilege to different users. While there are several domains as identified above, these are applicable within large organizations and the security domains can be merged or outsourced within a small organization. The functions that will be integrated into the organizations should be on the latter 2 domains; network security and system security. A simplified organizational chart for the information security will be as shown below. Network security This will involves the adoption of policies and other provisions which are aimed at monitoring the usage of the system to ensure safety. The network security should be developed targeting the different security threats which have been identified. Comprehensiveness of network security is commonly assured by the capability to mitigate different threats that face the information security system of an organization. Many of the threats prevented by the network security come from the internet and can include, hacker attacks, data interception, identify theft viruses among other threats. The effectiveness of this security measure would be enhanced through availability of multiple security layers (Whitman and Mattord 33). Security measures are subject to failure and reinforcements are achieved through multiple security controls. The components which will be included in the network security include the following (Whitman and Mattord 255) Antivirus and spyware – for protection from malicious software Firewall – to restrict and control access Intrusion prevention systems – to enable the identification of prevailing threats to the system Virtual private networks – to provide a secure network through which access can be granted. Advantages of network security Centralized protection – the network security is controlled by a single user and changes can also be made by the same person. The element of centralization enhances the control of the security systems; consequently increasing the security of the information contained within the organization. Enhanced protection – this is achieved through the utilization of multiple controls and features aimed at restricting access. Reduced processing time – the availability of antivirus and antispyware in computers commonly slows the speed of the machines. Centralization of the protections eliminates this problem as control in conducted from a different location Updating – the process of updating security system becomes simplified as a single individual performs these functions Disadvantages of network security Internet accessibility – this remains the major problems with the network security which can be accessed through the internet. The element of accessibility makes the network security increasingly susceptible to virus and attacks by hackers. Cost – the installation of network security could be extremely expensive to small organisms because of the cost of the equipment utilized to support the network security. System security Systems security is aimed at providing control of the access to the information contained in the organization’s database. This can be conducted through the provision of passwords and usernames which seek to identify the various individuals who have access to the system. Different levels of access can be availed as a way of seeking to determine what activities people can do to the information. Controlling aspects of the system security seeks to ensure that the information remains protected from malicious damage, through uncontrolled access. The system security worked theory a basic process involving three actions of identification, authentication and authorization. Identification seeks to ensure that the subject seeking access to the information is indeed the actual individual with the right for accessing such information. This will include elements like user names and account numbers. Authentication refers to the approach that seeks to prove the subject’s identity provided in the previous stage. This commonly includes element like passwords and “personal identification numbers” PINs. Authorization is the final process through which the system provides access to the subject according to the information availed. Advantages of system security Enhanced access to information – the capacity to limit the access to ensure that the individuals can access information from any computer since their identity can be ascertained and do not require physical permission to access information. Easy integration – this approach can be easily integrated into the existing systems without any fundamental changes to the system being made. Creation of an audit trail – when auditing the usage of the system, the access can be easily traced in order to determine how the system has been utilized for a given period of time Disadvantages of system security Identity theft – this presents the fundamental disadvantage of this approach. When an individual gains the authentication of another person, such an individual cannot be restricted from accessing the information. RECOMMENDATION In seeking to enhance the system security the organization should consider the following recommendations. Shifting security mindset form incident based and a continuous approach to information security Investing on the elements of detection, response and prediction capabilities of the security system while focusing less on the traditional approach of preventive measures (Whitman and Mattord 293). Develop a center where security operations will be undertaken from to ensure a continuous process of monitoring and protections from potential threats Works cited Stavroulakis, Peter, and Mark Stamp. Handbook of Information and Communication Security. Berlin: Springer Heidelberg, 2010. Print. Whitman, Michael E., and Herbert J. Mattord. Principles of Information Security. 4th ed. Boston: Cengage Learning, 2011. Print.  Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Location, location, location Admission/Application Essay”, n.d.)
Location, location, location Admission/Application Essay. Retrieved from https://studentshare.org/information-technology/1664711-location-location-location
(Location, Location, Location Admission/Application Essay)
Location, Location, Location Admission/Application Essay. https://studentshare.org/information-technology/1664711-location-location-location.
“Location, Location, Location Admission/Application Essay”, n.d. https://studentshare.org/information-technology/1664711-location-location-location.
  • Cited: 0 times

CHECK THESE SAMPLES OF Dependence on IT in Business Operations

Addressing Business Failure

Car Company Saab had to close down its business operations after it failed to meet its expenses of paying its suppliers, who in turn stopped supplying the company with requisite materials.... Another problem that forced the company to close down is its dependence on technology from other automobile firms.... This paper "Addressing Business Failure" focuses on the fact that business failure is 'the occurrence where a business entity is forced to cease and close down its operations after it fails to generate enough cash to cover the expenses it incurs and thus fails to make any profits'....
6 Pages (1500 words) Essay

Firm Performance: Path Dependent

Firm performance is at the very heart of business management because it is the time test of any business strategy and theories.... Strategic management involves the determination of the ways and means of how the firm can perform well.... Those who pursue the field are interested in being able to understand what makes a firm succeed in the market....
7 Pages (1750 words) Essay

Compare Zara and Primarks operations

The company has a total of 1763 stores in its international operations.... Primark is in the business of selling readymade garments including women's wear, children wear and menswear of stylish fashion and high variety at accessible and affordable prices.... The competition between these companies is based on achieving competitive advantage through the use of different business models and unique operational strategies.... he report encompasses a study of the business models followed by Zara and Primark with an identification of the key similarities and differences in the two business models and a study of the key business objectives of these two companies and their impact on the competitive advantage creation for both the companies....
10 Pages (2500 words) Essay

Operations Management in Business

This paper ''Operations Management in business'' tells us that operations management involves dealing with designing and management of products, its production processes involved services, and the supply chain.... The scope of operations management covers from strategic level to tactical level of operations.... he operations of an organization allow it to accomplish its mission by employing the right technological and human recourses driven by the right managerial processes....
12 Pages (3000 words) Assignment

Human Dependence on Computers

This paper "Human dependence on Computers" discusses computer dependence that has achieved a grass root level, and for every office, school there have to be computers for successful operations.... If a virus hits the banking network, it can expose the dependence on computers.... This was the first time when man started his dependence on the computer as it was able to perform tasks in minutes which would require a whole lot of time and effort....
8 Pages (2000 words) Case Study

Operations Management for a Typical Business

Efficient management of business operations can minimize the investment amount required to produce the service and goods by being innovative and effective in the utilization of resources.... The paper "operations Management for a Typical Business" is a great example of a case study on management.... operations management is identified as a significant factor in the economic growth of a country.... The paper "operations Management for a Typical Business" is a great example of a case study on management....
12 Pages (3000 words) Case Study

Business Continuity Management

he organization has a decentralized structure such that people at the bottom of the organization's power structure can make decisions about the supermarket's day-to-day operations.... The mainboard comprises the chairman, MD, Deputy MD, Finance Director, and company secretary, Store operations Manager, Trading Director, and property director.... On the other hand, its external shareholders are its customers, business partners, suppliers, creditors and debtors, the local council, and the UK citizens and government as well as other agencies and individuals that have a role in the operations of the supermarket....
10 Pages (2500 words) Case Study

Khaled Decision Making Simon

in business, the greatest responsibility of the managers /directors is to make sure that the future of the company is secure.... The company/business should be able to withstand the challenges and threats that will come up and from these, form a basis of dealing with future challenges without compromising the operations of the company.... The paper "Khaled Decision Making Simon" presents a business Continuity plan for Morrisons chain of supermarkets in the United Kingdom, focuses on Morrisons chain of supermarkets, the background of the company, critical activities, pharmacy services....
13 Pages (3250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us