Posted: August 11th, 2022
IT systems security issues and solutions at Desco Corp
Business Case Technology Plan
INSTRUCTIONS:
– This research project is an assignment consisting of four papers that will build on one another.
– Suggest a fictional company, and incorporate your research findings to justify a business case for the use of technology.
– Homework help – Writer can pick a topic of their choice (from provided list). PLEASE ENSURE TOPIC IS STRONG ENOUGH TO COMPLETE A 4 PART PROJECT.
* Grading Rubric included for reference
*Please include required information in paper.
Please let me know if writer needs any other information or clarification
IT systems security issues and solutions at Desco Corp.
Introduction
Desco Corporation is a medium business that provides its services through online platforms, including the organization website, a third-party marketing platform, and social media platforms. Desco business operations involve customers ordering the goods through an e-commerce platform or through other online channels connected to the company website. The company also delivers the goods to the customers’ homes, with the customer having to provide their home address for the delivery to be conducted. The company payment methods are both online or cash payments. The business operation of the Desco requires it to have a robust Information Technology with high security to protect the business and customer information and data. The federal government’s current requirements in terms of protecting customer information and privacy have forced Desco management to consider an evaluation of their IT system security status (Gupta & Hammond, 2005). The study provided in this paper concerning the security issues, problems, and solutions for the Desco IT system will enable the company to implement recommended measures to tighten its security and remain compliant with the information laws and regulations.
Research Hypothesis
It is hypothesized that, subsequent to the legislation and standards regarding the IT system security, the security issues and problems have solutions. The research will focus on providing solutions to IT system security issues and problems with stipulated standards and legislations (Pereira & Santos, 2014).
Definitions
• National Institute of Standards and Technology (NIST) – A Computer Security Resource center organization of the United States that provides several documents regarding computer and system security.
• Information security – It is the process and procedure of protecting the information in the organization’s IT systems by mitigating the information’s threats and risks through various measures and techniques.
• Information security management – Involves the controls that an organization implements to ensure it has the ability to protect the IT systems and the information confidentiality, integrity, and availability against security threats.
• Security standards – Set of policies, standards, and procedures published to establish a common language, specification and other criteria designed to guide and define IT systems security.
• Computer security – Involves technical and procedural measures required to prevent unauthorized access, use, modification, and dissemination of data stored on a computer or IT systems, preventing deliberate denial of service and protecting the system from physical harm.
• Privacy – Is the issue regarding the computer community with regard to maintaining personal information on individual consumer or citizen in computerized-record-keeping systems (Turn & Ware, 1976).
Research Plan
An interdisciplinary will be employed in studying the security issues, problems, and solutions since no single disciplinary perspective can adequately address the IT system security issue. The company’s IT system will be evaluated and tested based on different security standards, threats, and information security management strategies. The research will be used to analyze Desco IT systems’ security and provide recommendations for implementing solutions to enhance IT system security where necessary. The research will also examine the role of different legislations, laws, rules, and government policies and regulations regarding maintaining IT system security.
Expected Conclusion
It is anticipated that in response to the Desco IT system security issues and problems, the company will be able to implement solutions that will be recommended in the research. The research outcome will also provide other organizations that depend on IT systems for their business operations mechanisms of protecting and avoiding IT systems security issues and problems.
References
Gupta, A., & Hammond, R. (2005). Information systems security issues and decisions for small businesses: An empirical examination. Information Management & Computer Security, 13(4):297-310. doi: 10.1108/09685220510614425
Pereira, T., & Santos, H. (2014). Challenges in Information Security Protection. 13th European Conference on Cyber Warfare and Security (ECCWS-2014). https://www.researchgate.net/publication/264116803_Challenges_in_Information_Security_Protection
Turn, R., & Ware, W. (1976). Privacy and Security Issues in Information Systems. IEEE Transactions on Computers, Vol. C-25, Iss.12, Pp. 1353-1361. doi: 10.1109/TC.1976.1674604
Order | Check Discount
Sample Homework Assignments & Research Topics
Tags:
Business Case Technology Plan,
IT systems security issues and solutions at Desco Corp