Friday, July 24, 2020

INFORMATION TECHNOLOGY SECURITY MANAGEMENT AND ITS IMPACT ON BUSINESS

INFORMATION TECHNOLOGY SECURITY MANAGEMENT AND ITS IMPACT ON BUSINESS INFORMATION TECHNOLOGY SECURITY MANAGEMENT AND ITS IMPACT ON BUSINESS SUCCESS. CASE STUDY HM â€" Thesis Example > 10th, December, 2009PART ACurrent SituationScheduled Objectives: This project has several objectives all which if accomplished produces an appropriate secure infrastructure design for H R. Several of the objectives have been met but there are others yet to be met. These are: To produce a report containing the High risk factors involved in IT security management and recommend ways of improvement. High risk factors have been identified but a complete report has not yet been compiled describing them and how they can be reduced or eliminated. The high risk factors already identified include: The risk of losing computer files due to inadequate system’s securityThe risk of self destructive programs or destructive programs left by rivalsThe risk of the organization’s computer systems being infected by virusesRisks due to the use of inappropriate techniques (Cazemier et al, 1999)b). to evaluate the outcome. Objectives in the Process of Being Achieved: This is not yet accomplished but is in the process of being accomplished. a). To produce a report containing the high risk factors involved in IT security management and recommend ways of improvement. As noted above, the high risk factors have been identified and currently, a research on how these risks can be eliminated and reduced is underway. This process also includes identifying other alternatives apart from the already identified secure infrastructure designs and implementation methods. Completed Work: The following objectives have been met. research on the secure network infrastructure for ecommerceanalysis and evaluation of a secure network infrastructure for ecommerce strategies investigation of the benefits of ecommerce and the use of internet on business in order to identify the benefits of the new system and Determination of the assumptions and constrains of the secure network infrastructure for e-CommerceProblem Areas: Currently there are no problems being experienced. Key Work during the Next Period: Task  Responsibility  Estimated time in dayLiterature SearchResearch from academic publications, internet, textbooks etc. CompleteCollecting information Researching on the various secure network infrastructure for ecommerce strategies CompleteAnalyzing the collected information Analyzing and evaluating the collected secure network infrastructure for ecommerce strategies CompleteEvaluation of the benefits of the new systemEvaluating the benefits of the secure network infrastructure for ecommerce strategiesCompleteDetermine the assumptions and constrains of the systemEvaluating the benefits of the secure network infrastructure for ecommerce strategies CompleteInitial Report Produce initial report (draft report) CompleteInterim Report Produce the Research finding reports CompleteDesign and implementation of the new system. Evaluating the benefits of the secure network infrastructure for ecommerce strategies 14daysFinal ReportProduce final Report 5daysTOTAL= 19 DaysPART BThe Draft Repo rtTable of Contents1.0 Introduction: this section will give a brief description of what the project is about, its importance to the organization and how it can be implemented. 2.0 Literature review: This will describe in detail about secure network infrastructure for e-commerce and information security management. All necessary information about secure network infrastructure and its implementation will be described in this section giving more information than already given below. 3.0 Justification: This will describe the reason why it is important for an organization to have a secure network infrastructure for e-Commerce strategies. It will give the reason for developing a secure network infrastructure for H R.4.0 Objectives5.0 Methods: This section will describe the methods used to accomplish the missions of the project. 6.0 Results: This section will show the accomplishments made by use of the methods described above. 7.0 Design and Implementation: A description of the appropria te design that has been selected will be given along with how it can be implemented to ensure secure management of H R’s information system. 8.0 Importance and benefits of the infrastructure to the organization9.0 Conclusion10.0 References1.0 IntroductionThe current business field has developed to a level where corporate organizations use certain information technology applications to act as a medium of communication, transactions, book keeping and so on. These systems enable sharing of data among individuals and corporate companies including the unauthorised people. Corporations’ interconnectivity has to remain within local connections, that is, important information that needs not to be shared by outsiders should not leave the company’s local area network. In order to ensure this happens, an information security system has to be established.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.