logo

Information Technology Security Management

   

Added on  2023-01-19

15 Pages4056 Words97 Views
 | 
 | 
 | 
Running head: INFORMATION TECHNOLOGY SECURITY MANAGEMENT
Information Technology Security Management
Name of the student:
Name of the university:
Author note:
Information Technology Security Management_1

1INFORMATION TECHNOLOGY SECURITY MANAGEMENT
Abstract
The following report is prepared based on the information security risks that are faced within
the company of ABC with the use of BYOD policy within their organisation. The report
reflects the major risks that are identified within the organisation and based on it the
necessary security measures are thus recommended based on technological, policy and
training-based implementation. In the last part of the report, recommendation has been made
based on the situation in order to overcome the cyber security issue.
Information Technology Security Management_2

2INFORMATION TECHNOLOGY SECURITY MANAGEMENT
Table of Contents
Introduction:...............................................................................................................................3
Overview of the organisation:................................................................................................3
Discussion:.................................................................................................................................4
Information security control:......................................................................................................9
Recommendation:................................................................................................................10
Conclusion:..............................................................................................................................11
References:...............................................................................................................................12
Information Technology Security Management_3

3INFORMATION TECHNOLOGY SECURITY MANAGEMENT
Introduction:
For any organisation, the majority of the information system is made up of computers
and networks. These networks and computer devices serve as the provision to provide
services all across the organization’s sectors. As these computers serves as the vital parts of
the information that are transferred within the organisation, hence it is important to secure
these devices both in terms of hardware and software that are used in these devices (Afreen,
2014). Data for each organisation are meant to be accessed by users instead of any other third
party. Any unauthorized access or any unauthorized use of those data breaches computer
security. Hence herein lies the importance of computer security. Computer security enables
people to carry out their jobs by protecting the sensitive data information (Garba, Armarego
& Murray, 2015). With the growing rate of information transfer around the world,
vulnerabilities are also arising with the assets of the information system. This vulnerability
has the capability to be exploited by others and thus needs to be assessed during risk
management process of any organisation. In this report, some of the information security
risks are identified for the chosen organisation ABC company and based on the
vulnerabilities that are identified with the information system recommendations have been
made for the information security control measures that needs to be applied in the
organisation.
Overview of the organisation: The ABC company is one of the well-known tech
companies. The company is mainly responsible for providing software and hardware for
networking. The ABC company is known for its global IT services offering innovative
software development, IT consulting services and IT outsourcing. The company was
incorporated in the year 2003, with its head quarter in Dayton, Ohio. The company provides
its services to about 30,000 customers while actively helping corporations around the world
Information Technology Security Management_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Vulnerabilities and Recommendations for ABC Technology
|10
|3323
|1

Cyber Security Management Report 2022
|17
|2393
|34

Risk of using BYOD in ABC Company
|5
|948
|84

IT Risk Management: Threats, Vulnerabilities and Prevention Methods
|21
|4785
|434

Professional Skills In Information Communication Technology: Cyber Security
|20
|6717
|27

Security Consultation Report and Guideline
|13
|2447
|371