logo

What is Information Technology? Definition and Examples

   

Added on  2022-08-13

12 Pages3523 Words18 Views
Digital Media and Video GamesPolitical Science
 | 
 | 
 | 
Running head: IS INFORMATION TECHNOLOGY SAFE?
Is information technology safe?
Name of the student:
Name of the university:
Author Note
What is Information Technology? Definition and Examples_1

IS INFORMATION TECHNOLOGY SAFE?
1
Executive summary
At present time the information technology has vital role for various business. It is seen that as one is
owning and managing business, that constantly utilize the information technology. This is important
to find the issues for IT systems and the information. Here, the following report it is seen that
whether the information technology is secured or not. The study makes a demonstration of security
and encryption and the method that can keep those secrets. Again, biometrics and finger prints has
been witnessing the technology of face recognition that is also examined in this study. Apart from
that, an investigation is performed on geo tracking. This is able deals with surveillance of the space a
time or stalking.
What is Information Technology? Definition and Examples_2

IS INFORMATION TECHNOLOGY SAFE?
2
Table of Contents
Introduction:..........................................................................................................................................3
Understanding of the present topic:.......................................................................................................3
A critical discussion on the topic:..........................................................................................................4
Understanding security and encryption and the ways to keep secrets:..................................................6
Demonstrating the innovation of Biometrics, an evolution from finger prints to face recognition:.....7
Evaluating the case of Geo tracking:.....................................................................................................8
Conclusion:............................................................................................................................................9
References:..........................................................................................................................................11
What is Information Technology? Definition and Examples_3

IS INFORMATION TECHNOLOGY SAFE?
3
Introduction:
The information technology has a critical role for many businesses. As one own and manage
the business making use of information technology, it is vital to determine the challenges for the IT
systems and information. This is helpful to reduce o control eh risks and develop response plans in
time of IT crisis. Legal obligations are there for the business related to staff training, electronic
transactions and privacy affecting strategies of IT risk management. The business owners have the
legal obligations related to the privacy, staff training and electronic transaction affecting the
strategies of IT risk management. The challenges include malicious attacks, viruses, spam, human
error, and software and hardware failure (Al-Dhahri, Al-Sarti and Aziz 2017). Apart from this there
can be natural disasters like flood, cyclones or fires. One can thus manage the risks of IT through
finishing the assessment of business risks. For this, a discussion is made on encryption and security
and the way that keep the secrets. Apart from that, the biometrics and the finger prints for face
recognition are discussed here. Moreover, an evaluation is done on geo tracking that deals with the
surveillance of space a time or the stalking.
Understanding of the present topic:
The information technology, also called as the IT Security is the measure to deploy the
systems designed and measures for securely protecting and securing data. This involves the
multimedia presentations, motion pictures, still images, vice conversations, personal and business
data. This also involves that is never conceived. This is done with different types of technologies for
creating, storing, using and exchanging the data against the unauthorized types of access,
malfunction, misuse, destruction, and improper discloser (Logan 2020). Thus the value can be
preserved with integrity, confidentiality, intended usage availability and capability for performing
the critical functions permitted. Furthermore, for the safety professionals, the technology can be
What is Information Technology? Definition and Examples_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Enhancing Patient Safety through Geo-Tracking and Biometrics
|9
|2974
|129