Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: August 11th, 2022

IT systems security issues and solutions at Desco Corp

Business Case Technology Plan
INSTRUCTIONS:
– This research project is an assignment consisting of four papers that will build on one another.

– Suggest a fictional company, and incorporate your research findings to justify a business case for the use of technology.

– Homework help – Writer can pick a topic of their choice (from provided list). PLEASE ENSURE TOPIC IS STRONG ENOUGH TO COMPLETE A 4 PART PROJECT.

* Grading Rubric included for reference

*Please include required information in paper.
Please let me know if writer needs any other information or clarification

IT systems security issues and solutions at Desco Corp.
Introduction
Desco Corporation is a medium business that provides its services through online platforms, including the organization website, a third-party marketing platform, and social media platforms. Desco business operations involve customers ordering the goods through an e-commerce platform or through other online channels connected to the company website. The company also delivers the goods to the customers’ homes, with the customer having to provide their home address for the delivery to be conducted. The company payment methods are both online or cash payments. The business operation of the Desco requires it to have a robust Information Technology with high security to protect the business and customer information and data. The federal government’s current requirements in terms of protecting customer information and privacy have forced Desco management to consider an evaluation of their IT system security status (Gupta & Hammond, 2005). The study provided in this paper concerning the security issues, problems, and solutions for the Desco IT system will enable the company to implement recommended measures to tighten its security and remain compliant with the information laws and regulations.
Research Hypothesis
It is hypothesized that, subsequent to the legislation and standards regarding the IT system security, the security issues and problems have solutions. The research will focus on providing solutions to IT system security issues and problems with stipulated standards and legislations (Pereira & Santos, 2014).
Definitions
• National Institute of Standards and Technology (NIST) – A Computer Security Resource center organization of the United States that provides several documents regarding computer and system security.
• Information security – It is the process and procedure of protecting the information in the organization’s IT systems by mitigating the information’s threats and risks through various measures and techniques.
• Information security management – Involves the controls that an organization implements to ensure it has the ability to protect the IT systems and the information confidentiality, integrity, and availability against security threats.
• Security standards – Set of policies, standards, and procedures published to establish a common language, specification and other criteria designed to guide and define IT systems security.
• Computer security – Involves technical and procedural measures required to prevent unauthorized access, use, modification, and dissemination of data stored on a computer or IT systems, preventing deliberate denial of service and protecting the system from physical harm.
• Privacy – Is the issue regarding the computer community with regard to maintaining personal information on individual consumer or citizen in computerized-record-keeping systems (Turn & Ware, 1976).
Research Plan
An interdisciplinary will be employed in studying the security issues, problems, and solutions since no single disciplinary perspective can adequately address the IT system security issue. The company’s IT system will be evaluated and tested based on different security standards, threats, and information security management strategies. The research will be used to analyze Desco IT systems’ security and provide recommendations for implementing solutions to enhance IT system security where necessary. The research will also examine the role of different legislations, laws, rules, and government policies and regulations regarding maintaining IT system security.
Expected Conclusion
It is anticipated that in response to the Desco IT system security issues and problems, the company will be able to implement solutions that will be recommended in the research. The research outcome will also provide other organizations that depend on IT systems for their business operations mechanisms of protecting and avoiding IT systems security issues and problems.

References
Gupta, A., & Hammond, R. (2005). Information systems security issues and decisions for small businesses: An empirical examination. Information Management & Computer Security, 13(4):297-310. doi: 10.1108/09685220510614425
Pereira, T., & Santos, H. (2014). Challenges in Information Security Protection. 13th European Conference on Cyber Warfare and Security (ECCWS-2014). https://www.researchgate.net/publication/264116803_Challenges_in_Information_Security_Protection
Turn, R., & Ware, W. (1976). Privacy and Security Issues in Information Systems. IEEE Transactions on Computers, Vol. C-25, Iss.12, Pp. 1353-1361. doi: 10.1109/TC.1976.1674604

Order | Check Discount

Tags: Business Case Technology Plan, IT systems security issues and solutions at Desco Corp

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.