logo

(Doc) Assignment on IT Privacy

13 Pages3299 Words24 Views
   

Added on  2021-06-15

(Doc) Assignment on IT Privacy

   Added on 2021-06-15

ShareRelated Documents
Running head: IT PRIVACYAnnotated Bibliography: IT PrivacyName of the StudentName of the UniversityAuthor’s Note:
(Doc) Assignment on IT Privacy_1
1IT PRIVACYTable of ContentsTask 1.........................................................................................................................................2References..................................................................................................................................9Task 2.......................................................................................................................................12
(Doc) Assignment on IT Privacy_2
2IT PRIVACYTask 1Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats,intruders and attacks.Journal of Cyber Security and Mobility,4(1), 65-88. According to Abomhara, 2015, the security to the information technology or IT andinter of things or IoT is somewhat similar in terms of cyber world. The security attacks,threats or vulnerabilities are extremely common for any business or organization. This iseventually because these are weaknesses that every equipment of information technologypossesses. There are two types of systems in information technology. They are the systemsoftware and system hardware. Both of these components have in built flaws in them and thusshould be mitigated at every aspect. The hardware vulnerabilities are mainly because of theproblem in identification and fixing them in timely manner. The software vulnerabilities arefound within the application software, control software and operating systems. The controlsoftware mainly includes communication protocols or device drives. Moreover, the designflaws are also present within the software and hence it becomes explicitly difficult for thesoftware designer to implement the software in their business properly. The technicalvulnerabilities are another form of this software flaw that happens for the weakness of thehuman beings. The privacy or security of the information technology thus should bemaintained without any type of failure. Eason, K. D. (2014).Information technology and organisational change. CRC Press. As per Eason, 2014, information technology is the proper utilization of systems andcomputers for various data operations like storing, retrieving, transmitting and manipulation.Any specific organization or company implements this information technology within theirbusiness for successfully executing the business operations and processes. The informationtechnology is the subset of ICT or information and communication technology. The process
(Doc) Assignment on IT Privacy_3
3IT PRIVACYof decision making is absolutely easier with the help of this information technology as theservices and products of the technology like hardware, e commerce, telecom equipments,software and many more. This information technology is substantially utilized within thecontext of all types of enterprise operations, which do not cross the effectiveness of othertechnologies. The IT is responsible for the overall changes or alterations within theorganization that has incorporated it and hence is extremely important for the business.Moreover, this information technology is maintained with high security and privacy forkeeping all the data or information absolutely safe and secured. The IT security is maintainedwith the help of several cyber security forms and technologies. Bloom, N., Garicano, L., Sadun, R., & Van Reenen, J. (2014). The distinct effects ofinformation technology and communication technology on firmorganization.Management Science,60(12), 2859-2885.Bloom et al., 2014, in their article stated that information and communicationtechnologies or ICT usually differentiate the components of information as well ascommunication together. The information technology has various types of effects on thevarious decisions that are being taken for the betterment of the business in each and everymanagement level. The most effective access of information pushes these decisions toupwards and hence the organization or company is benefitted. The privacy of the informationtechnology is solely maintained by the help of various cyber securities like antivirus, malwareprotection, firewall and many more. All these cyber securities help the organization insecuring and protecting their IT equipments, IT assets, confidential and sensitive informationor data. The organizational members are responsible for securing the data or informationproperly and they should protect their own sphere and own assets or equipments. Variouscases have been registered that demonstrate the uncertainty of the security of personalinformation. The advancement in the information technology has lead to the threatening
(Doc) Assignment on IT Privacy_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IoT Applications and Services - PDF
|8
|2649
|134

Internet of Things (IoT) and ICT Assignment
|10
|1778
|230

Professional Skills In Information Communication Technology: Cyber Security
|12
|3882
|66

Threats, Attacks and Malware in IT Security - Desklib
|12
|1198
|192

Internet of Things (IOT) - Assignment
|10
|1770
|76

Information Assurance Report 2022
|6
|1033
|20