logo

Report on Enforcing Information Technology

   

Added on  2020-04-07

8 Pages2300 Words97 Views
 | 
 | 
 | 
Running head: ENFORCING INFORMATION TECHNOLOGY1How IT can be enforced in an organizationName: Institution Affiliation:
Report on Enforcing Information Technology_1

ENFORCING INFORMATION TECHNOLOGY2Introduction For the organization to remain competitive on the global economy, it needs to adapt the ever changing environment to which it will meet the needs of the customers (Aghion, Bloom & Van, 2013). When remaining competitive it means that the business continue to evolve as the organization makes changes to the processes as well as the technology in order to gain the competitive edge over their competition (Aghion, Bloom & Van, 2013). They should adapt on the new technologies and be able to manage on the challenges which goes in the implementing. A security policy that comprise of the appropriate phases of the implementation, enforcement, auditing along with the review is important in protecting the organization IT. The information technology could be useful in the business when it comes to solving some of the requirements of the clients especially in the management of their personal data and the security information. When there is an effective security policy there would be reduction of the risk particularly when there is crisis in the organization (Bennett, Segerberg & Walker, 2014). There is need for an organization to be in a position of understanding the Information technology to enable them to overcome any shortcomings. In this essay it intends to investigate on how the information technology could be enforced in an organization (Dowling, 2014). It will highlights the main content of the information technology security policy and how they are determined. Additionally, there are other components to which will be discussed such as the IT model for an organization, the security standards and the controls, the risk analysis and the contingency planning for the organization as well as the analysis of the IT threats, vulnerabilities as well as tools (Botta, De, Persico & Pescapé, 2016). The research has chosen Amazon organization as thebasis for the analysis of the IT security. Overview of the organization
Report on Enforcing Information Technology_2

ENFORCING INFORMATION TECHNOLOGY3Amazon is an American electronic commerce as well as the cloud computing organization whichis based in Seattle, Washington. It is the largest internet based retailer across the globe by total sales as well as the market capitalization (Cummings & Worley, 2014). The organization started as an online bookstore and they later diversified to sell the DVDs, CDs as well as the video. The organization offers consumer electronics and it is also one of the world largest provider of the cloud infrastructure services (Cummings & Worley, 2014). The organization is also able to sell the low end products such as the USB cable which are in house brand. The IT Model for the organization This diagram shows the information technology model for the organization in which the processes are interconnected to one another. The Amazon organization highlights how the information systems might help the organization to be in a position to compete and have the interdependency of the processes of the organization (Dowling, 2014). The company has been able to take advantages which are offered by the internet and be able to become one of the
Report on Enforcing Information Technology_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Key Trends and Advantages of Digital Technology for Managing Virtual Business
|12
|3965
|412

Organizational Behavior at Amazon
|12
|2911
|408

Amazon Company: Achievements, Obstacles and Rectification
|16
|4267
|187

Understanding Information Technology
|4
|860
|442

Identifying and Responding to Incidents in the Cloud Environment
|6
|874
|367

Security Challenges in Digital Migration
|8
|2090
|53