StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Arguments for and Against Outsourcing Computer Security Services - Research Paper Example

Cite this document
Summary
Many reasons are often presented in support of it while others argue against it. One of the many reasons that a firm should outsource computer security services is the costs involved with…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Arguments for and Against Outsourcing Computer Security Services
Read Text Preview

Extract of sample "Arguments for and Against Outsourcing Computer Security Services"

The paper "Arguments for and Against Outsourcing Computer Security Services" is a delightful example of an essay on information technology. Computer security outsourcing is an intricate practice and has its benefits and risks. Many reasons are often presented in support of it while others argue against it. One of the many reasons that a firm should outsource computer security services is the costs involved with having its own security systems on its premises. There are numerous costs associated with this, including costs of the IT infrastructure necessary, technical support, training, software licenses, and costs of compliance with public authorities, not to mention operations and maintenance.

In support of outsourcing, it has also been argued that it makes it possible for a firm to have access to the latest technology (Siepmann, 2014). This is easy to agree with, considering the rate at which computer software and hardware are becoming obsolete, which makes it necessary for any firm to adopt an approach that keeps its technology up-to-date. No system security manager, for instance, would wish to purchase expensive system security software and hardware, only to have to meet upgrading costs a few months later.

Another reason why a firm should outsource is the high-quality staff kept by IT security consultancy companies. A company that offers computer security services maintains highly trained security experts because that is its only business. This removes the threat of hiring a person how is missing some qualification on full-time terms. Providers of these security services have also been known to have diverse security resources, which they provide to their clients based on the specific needs of each client (Siepmann, 2014).

This brings the advantage of security resource flexibility. Finally, outsourcing eliminates the burnout burden on internal employees, who need to focus on their specific responsibilities. In addition, an internal staff member might not focus fully on the security role because other responsibilities always come up.While there are numerous benefits associated with outsourcing computer security services, there are risks involved, which have to be taken into consideration prior to decision making.

One of the major risks associated with outsourcing is the loss of control of critical IT functions, which may make a firm vulnerable to the external environment. For instance, outsourcing a router means that another organization monitors the firm’s traffic and may decide what to or not to filter. This means that the firm must have great confidence in the service provider that it will meet its most critical needs. Another risk involves the confidentiality and privacy of sensitive organizational data, which is exposed to the external environment (Jammalamadaka, et al., 2013). This is a huge risk, considering that even security service providers operate in the wake of huge security concerns, such as highly sophisticated hacking.

Security service providers have also been known to limit a firm’s flexibility because they sign firms up to their security systems and software. Sometimes this may involve a contract, which would limit a firm by seeking help from other companies even if efficiency goals are not met.Comparison of Computer Security FirmsIn the last decade, companies have discovered the advantage of using cloud services as a way of outsourcing computer security services. Two of the world’s largest players in this field include Microsoft and Amazon.

Amazon has operated its Amazon Web Services (AWS) as its cloud platform which business organizations seek help when they need to outsource network and system security services. One of its biggest competitors is Microsoft, whose cloud platform is known as Azure. These two platforms have some important differences, which any firm would like to consider in seeking computer security services. One of the key disparity between the two is that, while Windows allows one to operate other software, such as VM on Azure, Amazon does not give that provision for free (Winkle, 2015).

One has to pay for a license key in order to have what is referred to as license mobility, which is an additional cost. Amazon even lists the applications that are eligible on its platforms, such as the Amazon EC, which is a PaaS (Platform as a Service).However, the company is making efforts to innovate into a cloud hybrid that will allow users to interoperate across operating systems, even those bought from competitors like Microsoft. Azure, however, may have an edge when it comes to compliance because it has advanced its Azure to make it viable for government agencies.

In this regard, it has been established that it is ahead of Microsoft as far as compliance is concerned, which rids off or reduces compliance costs for its customers, such as the firm seeking security services. On the other hand, Microsoft has a higher level of compatibility, considering that it is the largest seller of operating systems for businesses in the world (mainly for normal users, not counting server OS’s). This gives it an edge. Azure, however, has the benefit of being the most suitable for open-source users (Winkle, 2015).

For this reason, it would be preferable for a firm seeking network security, operating with Linux on its servers.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Arguments for and Against Outsourcing Computer Security Services Research Paper, n.d.)
Arguments for and Against Outsourcing Computer Security Services Research Paper. https://studentshare.org/information-technology/1869773-mis-research-paper
(Arguments for and Against Outsourcing Computer Security Services Research Paper)
Arguments for and Against Outsourcing Computer Security Services Research Paper. https://studentshare.org/information-technology/1869773-mis-research-paper.
“Arguments for and Against Outsourcing Computer Security Services Research Paper”. https://studentshare.org/information-technology/1869773-mis-research-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Arguments for and Against Outsourcing Computer Security Services

Copying of Digital Content

Q: Address any of the topics of the papers on DRM, either in terms of personal incentives, corporate incentives, national security, computer security, or international affairs.... Q: Address any of the topics of the papers on DRM, either in terms of personal incentives, corporate incentives, national security, computer security, or international affairs.... There were efforts undertaken by be vendors too, such as the one installation features imposed by some distributors of computer software that limited the advent of pirated software access by the use of a watermark and encryption technologies; a measure that was solely dependant on the original buyer being held liable....
2 Pages (500 words) Essay

Form of Technological Abuse

Consumers can also suffer the burden of increased loan interest rates, being denied utility services, civil suits or criminal investigation (Baum, 2004).... The first being the basic fact that the internet economy highly dependent on information and network security and that direct damage caused by internet security incidents is approximately tens of billions of US dollars per year for the U.... In addition, all stakeholders in the information and communication system incur indirect costs associated with prevention of these threats, which makes malware and botnets an urgent security threat....
2 Pages (500 words) Essay

New Employment Relationship vs. the Manual Investment Approach

I believe that organizations should take care of the needs of their employers and offer them job security.... Job security and satisfaction are vital for any employee because it makes them comfortable in the job environment and they are able to undertake their duties efficiently (KnowWPC).... This mutual investment employment relationship has been supported by other professionals in human resource as they see employee job security and skill advancement as vital in ensuring business success (S....
3 Pages (750 words) Essay

Dissenting Opinions about Outsourcing

I said that some of his arguments are no longer valid today because the technology and outsourcing industry… Some of his arguments are still valid while some are arguable and relative depending on what angle you are looking at. The reason why some of his arguments were no longer valid today Dissenting Opinion about outsourcing A critique on Stephen Andriole's article Stephen Andriole's article about Best Practices Technology Management may have been true at the time it was written but some of his arguments are no longer valid today....
2 Pages (500 words) Essay

Satyam Computer Service Accounting Scam

Ramalinga… Satyam computer services is India's fourth largest information technology firm and it has been falsifying the company accounts for years and still overstating the revenues and inflating profits by $1 billion.... Satyam computer After resignation of Srinivas Vadlamani as chief financial officer Ram Mynampati was appointed as the interim CEO of the Satyam computer services and this turned to be the worst scam in the company history.... After the scam, the aim of Satyam computer services is to ensure that the business continues....
4 Pages (1000 words) Essay

Computer Security

The KDC server computer security Kerberos Computer Network Authentication Protocol Kerberos serves as a network authentication protocol that allows for mutual identification, in which case the computer server and the user identify one another in the course of operation.... With the help of TGT, the user can request KDC for a ticket to communicate with certain services within that network (Kizza 214).... Although Kerberos serves to block unencrypted users from using the internet services, if accessed by malicious users, the whole system may be at risk....
1 Pages (250 words) Assignment

Government Outsourcing Services

In the essay “Government Outsourcing Services” the author focuses on outsourcing, which has an attributable history at all government levels from security services to the road-building activities.... Government contracting of tax collection services and legal services brings a set of benefits that are both economic and efficiency based.... The government contracting for legal services ensures that the best representatives are acquired for the task at hand....
1 Pages (250 words) Essay

Computer Security of Unix

er File SecurityWithin the various user groups some operating systems provides an additional future to protect files further on per file basis, the security properties that can be set at this point are auditing, permissions and ownership.... … Question oneUnixUnix operating system uses a three level basic access control mechanism to protect files....
5 Pages (1250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us