Analysis of Information Technology Standards and Cyber Threats

Verified

Added on  2023/06/11

|5
|760
|174
Report
AI Summary
This report delves into the significance of information technology (IT) standards, highlighting their role in regulating IT systems and ensuring effective operations. It explores the influence of standardization organizations like ISO and NIST, emphasizing the interrelationship between IT and critical infrastructures such as finance, banking, and power. The report acknowledges the challenges of adhering to IT standards, including the potential for organizational burdens and the long registration processes. It also addresses the prevalence of cyber threats and the measures taken to mitigate them, such as information sharing within the financial sector. The report concludes by emphasizing the positive impact of IT standards, including promoting knowledge sharing and establishing quality work networks. It underscores the pervasive integration of IT across various sectors and its contribution to enhanced efficiency. Despite the challenges, the report asserts that the standards are ultimately beneficial for organizations and individuals, promoting effective and secure IT practices.
Document Page
Running head: INFORMATION TECHNOLOGY 1
Information Technology
Name
Institutional Affiliation
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INFORMATION TECHNOLOGY 2
Information Technology
Information technology standards are becoming increasingly important; standards have
been set to regulate the Information Technology Systems and ensure that everything is done
accordingly. According to Swanson (2014), a standard is a procedure, a rule, or a requirement
issued by a legal and recognized authority which establishes a baseline of a common
understanding. Standardization organizations include the International Organization for
Standardization, the American National Standards, Society of Automotive Engineers, and
International Electrotechnical Commission. Standards set towards Information Technology
systems affects it’s interrelationship with other critical infrastructures such as finance, bank, and
power; additionally adhering to the standards is not easy and sometimes the standards bring up
some hardships to the organizations.
Critical infrastructure includes processes, systems, facilities, technologies, networks,
assets and services which are essential to safety, health, security, and economic wellness of
citizens and effective functioning of government (White, 2014). Critical information sectors
include; government facilities sector, Healthcare and public health sector, food and agriculture
sector, information technology sector transformation systems sector, and communication sector.
Any destruction or incapacitation of any of these affects the safety, health, economic security, or
security.
Cyber threats are common challenges from Information Technology; standards have been
set to protect people and organizations from cyber threats. Industry groups in financial services
sectors have taken steps to improve information sharing and address threats to infrastructure.
Protecting organizations and individuals from cyber threats mean that people and organizations
should limit what information they pass because their information may end up dubbed as a
Document Page
INFORMATION TECHNOLOGY 3
threat. For example, an organization when advertising its goods or services through the social
media has to watch how they advertise because their advertising method may end up diminishing
other company’s goods or services. The government and the industry standards have ended up
affecting the interrelationship between Information systems technology and other critical
infrastructures.
Adhering to the standards set sometime includes nuisance and places hardship to the
organization; some organization feels that the standards are a burden unto them. According to
Sappideen (2016) nuisance refers to anything that causes inconvenience or frustration. The
length of the process is very long and this makes organizations feel that their time is being
wasted; the registration process takes months and thus a waste of time and finance. Another
challenge facing the standards is that many people have an inadequate understanding of the
standards and thus they end up not adhering g to the standards of which they may end up being
charged or prosecuted.
Standards should be set so as to ensure that every activity is carried out effectively and
accordingly; standards accomplish their intentions this is because standards are set for people
and organizations and not against them and this makes it possible for people to adhere to the
standards. The standards have achieved their intentions, for instance, standards have promoted
knowledge sharing of best practices relative to the management of information technology.
Additionally, it serves as a focal point for an extended information technology quality work
network comprised of end users and providers.
Information technology relates to other critical infrastructures as almost every sector
today includes the use of information technology systems. Information technology has made
work easier as it has replaced paperwork with computers. Standards have been set towards the
Document Page
INFORMATION TECHNOLOGY 4
information technology to improve its effectiveness and also to limit its usage. Cyber threats are
a challenge to information technology; to solve this standards have been set whereby rules
established are followed. Standards set happen to be nuisance and burden to the organization due
to the long process which consumes time. However, the standards have been followed as they are
in favor of people and organizations.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INFORMATION TECHNOLOGY 5
References
Sappideen, C. (2016). Torts: Commentary and Materials. Thomson Reuters Professional
Australia Limited.
Swanson, M. (2014). National Institute of Standards and Technology. Security Self-Assessment
Guide for Information Technology Systems.
White, R. (2015). Toward a Unified Homeland Security Strategy. Homeland Security Affairs.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]