logo

Information Technology Security and Risk Management

   

Added on  2023-04-21

11 Pages2686 Words70 Views
 | 
 | 
 | 
Running head: INFORMATION TECHNOLOGY SECURITY AND RISK
MANAGEMENT
Information Technology Security and Risk Management
Name of the Student
Name of the University
Author Note
Information Technology Security and Risk Management_1

1INFORMATION TECHNOLOGY SECURITY AND RISK MANAGEMENT
Table of Contents
Introduction:...............................................................................................................................3
Research Method and Approach:...............................................................................................3
Methodology:.........................................................................................................................3
Approach:...............................................................................................................................4
Results:.......................................................................................................................................7
Discussion:.................................................................................................................................8
Conclusion:................................................................................................................................8
Reference:................................................................................................................................10
Information Technology Security and Risk Management_2

2INFORMATION TECHNOLOGY SECURITY AND RISK MANAGEMENT
Abstract:
The main aim of this report is to conduct a research on organizational information
security and ethics. For conducting this research a vast literature review discussion has been
utilised in this case, thus all of secondary data has been used in this case form the previous
researches. For conducting this research some specific areas of organizational context has
been discussed in this case. First of all due care and the due diligence has been discussed
briefly and this discussion has provided the idea how much important the due diligence and
the due care is for the organizations. Policy and laws are discussed in this case and the best
methods for prevention of unethical and illegal activity is identified.
Information Technology Security and Risk Management_3

3INFORMATION TECHNOLOGY SECURITY AND RISK MANAGEMENT
Introduction:
The information security is considered as the practice of the unauthorised access
prevention to a particular computer system (Siponen, Mahmood and Pahnila 2014). The
source of this data can be various which can be physical and electronic. The main focus of the
information security is protecting integrity of data, confidentiality of data and availability of
data. The information security can be achieved by some multi step process of risk
management which identifies the vulnerabilities, sources of threat and the potential impact of
this risk and the efficiency of the risk management plan. In this information security ethical
concern are widely recognised. In the context of information there are several ethical
consideration of it. In the ethical consideration there are mainly some privacy concerns
regarding data collection in large scale. In some recent cases the information security is
discussed exclusively in the terms risk mitigation which is associated with technical and
organizational infrastructure.
In this essay a research will be done on ethics and the information security. In this
context due care will be analysed within the organizational context. Also, in this case
difference between doe due and due care will be analysed. Following that the role of policy in
the organizational context will be researched. Further, illegal and unethical behaviour will be
analysed and this activities can be prevented within the organization will be discussed.
Research Method and Approach:
Methodology:
In this context of ethics and information security for conducting a research the
selected method is the literature review. Thus by conducting the literature review this
research will be a secondary type of research. The main focus of this research is analysing the
important ethics regarding the information security.
Information Technology Security and Risk Management_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethics and Information Security Research Paper 2022
|13
|2659
|20

Research and Project Management Assignment
|9
|2659
|103

ETHICAL RESPONSIBILITIES OF LOGGING INDUSTRY
|7
|421
|35

Cyberattacks in Organizations and the Challenges for Organizations
|7
|1671
|82

Research Methodology and Evaluation Plan Assignment
|5
|912
|170

Workplace Bullying in Healthcare Organizations of New Zealand
|62
|15429
|476