logo

IT Security Challenges in Organizations

Developing a viable research project proposal by deriving three distinct research questions related to a research problem and explaining how answering each question contributes to solving the problem.

8 Pages1966 Words27 Views
   

Added on  2023-01-12

About This Document

This article discusses the major challenges of IT security in organizations, focusing on the need for collaboration and innovation to enhance cybersecurity. It explores the impact of data breaches in sensitive sectors like healthcare and the risks associated with fog computing.

IT Security Challenges in Organizations

Developing a viable research project proposal by deriving three distinct research questions related to a research problem and explaining how answering each question contributes to solving the problem.

   Added on 2023-01-12

ShareRelated Documents
Running Head: IT SECURITY 1
IT security in the market today is the major challenge to organizations in the market today
Author’s Name
Institutional Affiliation
Date
IT Security Challenges in Organizations_1
IT SECURITY 2
Problem Statement
In the modern world, most organizations have digitized their data. Data management is a
fundamental area in Information Technology that is focused on protecting against malicious
attacks or from unauthorized access. In data management organizations are required to secure its
data and structure access and storage. It further demands that organization create data security,
data source identification, segregation, storage, database management system, data analysis, data
architecture and data governance policies (Li, Meng, & Kwok, 2016). With coming investing so
heavily in data management, IT security still remains the biggest challenge in the 21st century.
In Australia, many organizations such as Bank of Queensland, ASUS, and Melbourne Hospital
have continued to experience data breaches after even assuring their customers of stable and
reliable IT security.
IT security experts are putting their significant efforts in ensuring that organizations do
not suffer malicious digital attacks. They have been implementing and managing security
software, upgrading systems, and scanning for any abnormalities. With all these services
provided, data breaches continue to spike. According to Sadeghi, Wachsmann, & Waidner,
(2015) current trends and initiatives like IoT (Internet of Things) and “Industrie 4.0” have
become targets for cyber attacks. Authors add that these trends and initiatives are promising
innovative business models, excellent user experience by offering reliable, strong connectivity
and proper utilization of next generation of implanted devices. Equally, systems such as IoT and
“Industrie 4.0” produce, generate and exchange data that is confidential, private and sensitive.
Due to the nature or sensitivity of the data generated by the systems, cyber attackers are targeting
them maliciously (DiMase, Collier, Heffner, & Linkov, 2015). Ideally, the argument is that
today, IT security is under threat in the tech market. Organizations handling vast amounts of
IT Security Challenges in Organizations_2
IT SECURITY 3
critical data are worried about digital malicious attacks which can strike anytime especially if
they are not prepared enough to counter such attacks.
The health care system is one sensitive area that if not offered strong IT security,
sensitive information of patients shall be exposed. In the research conducted by Sametinger,
Rozenblit, Lysecky, & Ott, (2015) it was observed that medical devices are on the radar of cyber
attackers due to their sensitivity. The cyber attackers or hackers usually raid organizations that
have sensitive information so that when data breach succeeds, their impact can be felt. According
to the researchers and analysts, health care is one sector with experiencing rising interoperability
of medical devices and reliance on software and internet are putting health records of patients at
stake. Take the example of Melbourne Hospital, which was attacked in February 2019. The
cybercrime syndicate is said to have accessed health records of 15, 00 patients (Webber
Insurance Services, 2019). The Melbourne Heart Clinic suffered a ransomware attack. In all
probability, the attackers must have assessed the sensitivity of the health records at the facility
before launching the cyber raid. In all probability, the attack put the lives of innocent patients at
stake. There is no patient that will want their private information to be disclosed to the public
without their consent. More importantly, the data breach at Melbourne Hospital in Australia
reveals the IT security challenges a majority of organizations are facing. The cyber attackers
sometimes seem to be ahead of the IT security team of some companies. For instance, in the case
of Melbourne Hospital, a warning was issued about the impending attack. Unfortunately, there
was no swift action to block the malicious attack.
Business organizations are using fog computing paradigm to extend computing facilities,
networking and storage of cloud computing to the edge of networks (Mukherjee, Matam, Shu,
Maglaras, Ferrag, Choudhury, & Kumar, (2017). Fog computing does this as it offloads cloud
IT Security Challenges in Organizations_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital Forensic in Public Cloud
|5
|768
|44

Leading Communication Technology
|5
|2088
|16

Securing the Enterprise Infrastructure Report 2022
|4
|772
|15

IOT In Healthcare | Assignment
|4
|835
|26

Managing Cyber Security Threats and Non-Cyber Security Threats
|11
|3818
|103

Healthcare Data Security
|8
|1648
|70