IT Security-The Most Basic Security Measures
Information security activities often
create tension between the desire of users to engage in a particular activity
and the need to secure the information assets of an organization. If business
stakeholders and the broader community span the globe, how might this
contribute to increasing the potential tension between business users and
information security professionals? Discuss a strategy that you would use to
reduce or eliminate potential areas of tension or conflict between these two
groups within a global organization.
11-1-2017
Discussion Post Unit 4 Post 1
From: Miss. Bayo Elizabeth Cary, AA, BA,
MLIS
There are a-number-of issues, pertaining to the IT environment, that
confront security concerns (Beznosov, et. al., 2008, p. 4). IT security, must
be dealt with, in a pro-active, and defensive manner. The management of IT
security, must be viewed, as a series of risky situations, and potential
solutions. Trouble-shooting the computer systems, is just the beginning. There
are the: virus, malware, phishing, and worm protections software programs,
like: MacAfee, and AVG-then too, there are then human “players,” and
errors-such as: “social engineering,” that also must be considered. IT
vulnerabilities, are many, and are varied, and there are soo many, that the
work to protect: private, and confidential data, seems both: a daunting task,
and endless.
There are a-number-of considerations, and tasks, that must be
considered, when looking at the management, of the risks related to, the security
breaches, that could be possible-when operating, an International IT company:
·
Human Factors-Human Errors;
·
Organizational Factors-Who
is hired, and how the IT business is controlled;
·
Technological Factors-The
complexity of the IT Network, and how it works;
·
Methodology-How an IT
company decides to approach security issues;
·
Integrated Framework-What
software, servers, and hardware-a company decides to utilize;
·
Discussion-the open
environment of the company to address security breach issues;
·
Limitations-recognizing when
security issues cannot be effectively addressed with the current plans;
·
Regrouping-Think
Tank-looking for new and creative solutions to security challenges. (Beznosov,
et. al., 2008, p. 4-19)
There are a-number-of risks, that
follow, investing in an IT company, and the risks must be managed, regardless
of whether, the company is delimited, to the circumscribed boundaries of the
contiguous United States, or-if the country has branched out, services, and
facilities abroad.
References
Beznosov, Konstantin, Hawkey, Kirstie& Werlinger, Rodrigo.
(2008). An Integrated View of Human, Organizational, and Technological
Challenges of IT Security Management. Electrical and Computer Engineering: University
of British Columbia, Vancouver. p. 4-19. Retrieved from www.emeraldinsight.com/0968-5227.htm
Comments
Post a Comment