IT Security-The Most Basic Security Measures


Information security activities often create tension between the desire of users to engage in a particular activity and the need to secure the information assets of an organization. If business stakeholders and the broader community span the globe, how might this contribute to increasing the potential tension between business users and information security professionals? Discuss a strategy that you would use to reduce or eliminate potential areas of tension or conflict between these two groups within a global organization.



11-1-2017



Discussion Post Unit 4 Post 1

From: Miss. Bayo Elizabeth Cary, AA, BA, MLIS



          There are a-number-of issues, pertaining to the IT environment, that confront security concerns (Beznosov, et. al., 2008, p. 4). IT security, must be dealt with, in a pro-active, and defensive manner. The management of IT security, must be viewed, as a series of risky situations, and potential solutions. Trouble-shooting the computer systems, is just the beginning. There are the: virus, malware, phishing, and worm protections software programs, like: MacAfee, and AVG-then too, there are then human “players,” and errors-such as: “social engineering,” that also must be considered. IT vulnerabilities, are many, and are varied, and there are soo many, that the work to protect: private, and confidential data, seems both: a daunting task, and endless.

          There are a-number-of considerations, and tasks, that must be considered, when looking at the management, of the risks related to, the security breaches, that could be possible-when operating, an International IT company:

·         Human Factors-Human Errors;

·         Organizational Factors-Who is hired, and how the IT business is controlled;

·         Technological Factors-The complexity of the IT Network, and how it works;

·         Methodology-How an IT company decides to approach security issues;

·         Integrated Framework-What software, servers, and hardware-a company decides to utilize;

·         Discussion-the open environment of the company to address security breach issues;

·         Limitations-recognizing when security issues cannot be effectively addressed with the current plans;

·         Regrouping-Think Tank-looking for new and creative solutions to security challenges. (Beznosov, et. al., 2008, p.  4-19)

There are a-number-of risks, that follow, investing in an IT company, and the risks must be managed, regardless of whether, the company is delimited, to the circumscribed boundaries of the contiguous United States, or-if the country has branched out, services, and facilities abroad.



References



Beznosov, Konstantin, Hawkey, Kirstie& Werlinger, Rodrigo. (2008). An Integrated View of Human, Organizational, and Technological Challenges of IT Security Management. Electrical and Computer Engineering: University of British Columbia, Vancouver. p. 4-19. Retrieved from www.emeraldinsight.com/0968-5227.htm


Comments

Popular posts from this blog

Unit 8 Assignment-Locked Out of Group Chat-Forced To Work Alone-Dr. Susan Ferebee-Capella University-Trying To Illegally Flunk Me!

Complaint RE: Dr. Susan Ferebee: Flunking Me-After an IP Address Lock Out, to: Academic Coach: Scribner at Capella University

Unit 2 Discussion 2