StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

IT Security System - Research Paper Example

Cite this document
Summary
Therefore, Goodings Landscaping and Nursery Company incorporating the Information Technology in its security would help in the boosting the on-site security system. However, going for any Information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.9% of users find it useful
IT Security System
Read Text Preview

Extract of sample "IT Security System"

Use of IT in Security System by Goodings Landscaping and Nursery Company Everything operates within a hierarchy, and security is no exception. Therefore, Goodings Landscaping and Nursery Company incorporating the Information Technology in its security would help in the boosting the on-site security system. However, going for any Information Technology integration system, the following questions should be in the mind of the security directors; what assets are we trying to protect? From whom are the assets being protected?

Against what kind of attack or misuse to protect from? And how can use of IT improve the operations of the company’s client and disrupt the operation of criminals and terrorists?Question 1Fire and break-in alarm security system being the only available current on-site security/alarm system is a good foundation than having none. However, integration of multiple systems to alarm such as security video, for example, Closed-Circuit Television (CCTVs), and security voice communications would permit more efficient use of on-site security systems and manpower.

It is vital to pinpoint that, the better the system integration, the better the company will be able to use its on-site security force (Thomas, 2011).Question 2The key to ensuring cost effectiveness incurred on the security system is often the elegant combination of simple technologies into a highly refined systems. For example, installing security cameras all over the boundaries of the company will have a centralized position where the control system is operated. Therefore, this will reduce the unnecessary cost incurred by employing incompetence manpower and ensure improved security system longevity.

The opportunity cost can be used to improve other basic operations of the company (Thomas, 2011).Question 3Security systems are notoriously short lived as they are composed of numerous delicate components that either fail mechanically or are unable to upgrade as the system scales. Considering the importance of ensuring a constant security system, there is need to keep to –date the security information technology via activities such as regular maintenance and proper handling of the security gadgets such as CCTVs cameras due to their sophisticated nature and through away obsolete and non-compatible with newer technology components (Thomas, 2011).

Question 4Acquiring external Information Technology security is capital intensive hence often is expensive and with every motive of reduced expenses and increased revenue, there is the need to invest on internal security for the company to reduce such costs. However, it will require specialized people to train the security trainee in the company who can be hired or permanently employed by the company. Therefore, by attaining this, the company will be reliable to provide adequate security.Question 5Maintaining clients personal information confidential shows the loyalty of the company to its clients.

Therefore, be unaware of any Information Technology issues affecting the clients would possibly be as a result of limited integration of IT by the company such that the clients do not have any means to give their feedback to the company on the services they receive. Use of passwords to accessing the client’s personal information would help to prevent untrustworthy personnel and other unauthorized people from accessing the client’s data (Ferrari, 2006).Question 6Evolution of E-commerce such as Online Exchange (OLEX) has eased the movements of customer and the businesses hence saving the transport cost.

Therefore, it should not come from the customer’s demand for the company to implement E-commerce but from the company due to various advantages enjoyed such as increased market penetration and expansion of the market segment. However, this has to come with a security cost such as use of Information Technology to develop unique account numbers with unique passwords where clients can be depositing their payment and obtaining a transaction code bearing the name of the company unique from its competitors (National Research Council, 2010).

Question 7Protecting the customer’s creditworthy details with the company will help to maintain and attract potential and new customers respectively. Therefore, it is the company’s role and responsibility to protect these data and shredding of the receipts or other paper agreement would act unsafely for the company claim in case of dishonest clients fail to pay their debt. Therefore, use of a computer will help to store a wide range of these documents with passwords accessible to only authorized persons in the company (Ferrari, 2006).

Question 8Due to increased number of hackers, keeping up-to-date to changes in information technology will help the company avoid incidences of hacking by both its dishonest personnel and other outsiders. Therefore, the company should not be ignorant to make changes to the current information technology that is more modified to avoid risks associated with the use of technology such as hackers.Recommendation Overall, use of Information Technology system integration in security will help to have improved monitoring, reduced training, better communications and cost benefits from improved labor efficiency, reduced maintenance costs, and improved security system longevity.

Therefore, I would recommend Goodings Landscaping and Nursery to incorporate use of more advanced information technology such as Closed-Circuit Televisions (CCTVs) that will have an overall control on the security and use computers to store client’s data with password to access such data for authorized persons only for retrieval purposes. ReferencesNational Research Council (U.S.). (2010). toward Improved Usability, Security, and Privacy of Information Technology: Report of a workshop. Washington, D.

C: National Academies Press.Ferrari, E., & Thuraisingham, B. M. (2006). Web and Information Security. Hershey PA: IRM Press.Thomas L. Norman. (2011).Incorporated Security Systems Design: Concepts, Specifications, and Accomplishment. Oxford; Oxford Press.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IT Security System Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
IT Security System Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/business/1689766-it-security-system
(IT Security System Research Paper Example | Topics and Well Written Essays - 500 Words)
IT Security System Research Paper Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/business/1689766-it-security-system.
“IT Security System Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/business/1689766-it-security-system.
  • Cited: 0 times

CHECK THESE SAMPLES OF IT Security System

Security Systems

To further provide convenience to computer savvy people, software companies have developed this all-in-one computer security system to protect personal computers; it contains features like firewalls and antivirus software.... To further provide convenience to computer savvy people, software companies have developed this all-in-one computer security system to protect personal computers; it contains features like firewalls and antivirus software.... Another type of security system is the virus protection software....
1 Pages (250 words) Essay

Subordinate Communication in the Age of Informational Technology

As may be deduced from Liu, Yu and Jing's (2005) definition and analysis of the first generation of IA Technologies, it is imperative that any corporate entity, not just ours, have such a system in place.... Even while conceding to the fact that the implementation of such a system of technologies is expensive, I would argue that not doing so can prove even more costly.... Within the context of the first, the primary aim is to maximize the survivability of a system, even when it has been subjected to attack....
8 Pages (2000 words) Assignment

System Security

This provided an edge to the antivirus companies to scan, remove, and ___________ Grade _____________ d: 2008-12-21 System security system security over the last twenty years has gone through a tremendous series of ups and downs where the focus of providing security is to minimize uncertainty by measuring the probability of a threat event.... system security over the last twenty years has gone through a tremendous series of ups and downs where the focus of providing security is to minimize uncertainty by measuring the probability of a threat event. Initially the secure and financial data were not on the internet… Criminal minded geniuses were designing the virus to destroy a system partially or completely....
2 Pages (500 words) Essay

Gaps in Security Management of a Company

All the companies, for the purpose of perfecting their security system depend over computer networking and it is known as computer information security system.... Despite taking all such initiatives, on several occasions, these companies fail to provide adequate protection to their confidential strategies or information as they often presume that due to development in the networking process the computer information security system is cent percent protected....
20 Pages (5000 words) Essay

Ten Principles of IT Governance - the Burton Report

It has been argued that the IT governance system established in many organisations is incongruent as it has been designed in several different patches of problem-solving mechanisms.... The designing activity of the governance system reduces the synergy level and limits the opportunities for strategic impact from IT.... The Burton report recommends undertaking an assessment of IT governance system on a regular basis in order to implement security improvement processes at MOD....
7 Pages (1750 words) Case Study

What is System Security

This paper is going make an in-depth analysis of all that surrounds system security.... system security is an integral component in modern day computing as it prevents against data being stolen by third parties and also the risk of data destruction and manipulation.... hellip; According to the research findings, it can, therefore, be said that with computing being an integral element in modern-day operations, the emphasis has turned to computer system security....
11 Pages (2750 words) Term Paper

Analysis of the Problems of XYZ Company

On the basis of their criteria, the best service provider agency for IT Security System will be chosen.... In order to improve the information technology security system to keep the confidential information of the company in safe hands, it is necessary that the IT Security System should be strong enough.... For this, it is possible that the XYZ Company can hire other security service provider company that can help to upgrade their IT Security System....
4 Pages (1000 words) Assignment

System Identification and Security Categorization

The ability to establish a successful information security system lines on having a good knowledge of the requirements.... Necessary control mechanism has been incorporated into the information security system in order to provide protection.... hellip; In order to protect information and information system, it is essential to acquire information security program.... The major concern of the VA's is to maintain a revolutionary information system and it's information system which is the basis of this paper....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us