This report discusses the advantages and security issues of organizational IT systems. It also provides probable solutions for each security issue. The report emphasizes the importance of information technology in communication and productivity.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: SECURITY ISSUES IN IT SYSTEMS Security Issues in Organizational IT Systems Name of the Student Name of the University Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 SECURITY ISSUES IN IT SYSTEMS Table of Contents Introduction................................................................................................................................2 Discussion..................................................................................................................................2 Information Technology Systems..........................................................................................2 Advantages of Organizational IT Systems.............................................................................3 Security Issues in Organizational IT Systems........................................................................4 Probable Solutions for Solving the Security Issues...............................................................7 Conclusion..................................................................................................................................8 References..................................................................................................................................9
2 SECURITY ISSUES IN IT SYSTEMS Introduction IT or Information technology can be stated as the utilization of several systems for the purpose of storing, retrieving, transmitting as well as manipulation of data as well as information for any business or enterprise (Laudon and Laudon 2015). This information technologyissubsequentlyconsideredasthesubsetofICTorinformationand communication technology. The several devices that are utilized for aiding computation are the significant parts of information technology. There are some of the major and the most important as well as significant benefits of this information technology for solving all types of issues related to IT systems (Stair and Reynolds 2013). In spite of having such distinct benefits, there some of the basic and noteworthy security issues present in the organizational IT systems. These issues are required to be solved for bringing utmost efficiency and effectiveness of the organizational IT systems. The following report outlines a brief discussion on the several security issues faced in the organizational IT systems and the probable solutions for solving these issues. Discussion Information Technology Systems Thesystemsofinformationtechnologycanbedescribedastheformaland organizationalsystemsthatarebeingdesignedforthepropercollection,processing, distributing and storage of information (Davies, Dean and Ball 2013). These types of IT systems are majorly comprised of four basic components of processes, people, organizational structures and technologies. The basic focus is provided on the information system for having a definite boundary, storage, inputs, communication networks, processors and outputs. IT systems also support the business operations, decision making and management. The various products as well as services in the economy are closely linked with the information
3 SECURITY ISSUES IN IT SYSTEMS technology like computer software, hardware, electronic commerce, semiconductors, telecom equipment and many others. The organization utilizes this system for helping the people to interact with the technology for the purpose of supporting the several business processes. The proper relationship between business processes, computer systems and information systems is extremely important for each and every organization (Raineret al. 2013). Moreover, the performance of the business operations and processes are also checked and controlled with the help of information technology systems. Advantages of Organizational IT Systems The competitiveness of several organizations is widely based on the efficient as well as effective utilization of information technology systems. The most significant purpose of these information systems is to provide the appropriate information to the correct place and the correct time (Petter, DeLone and McLean 2013). These types of IT systems are solely utilized for tracking, storing, manipulating as well as distributing the relevant information from the collected data to the specified individuals whenever required. The organizations get various significant and important advantages after proper implementation of these systems within the business. The major and the most significant advantages of the IT systems within an organization are as follows: i)Better Communication: The first and the foremost advantage of the IT systems is the better communication (Galliers and Leidner 2014). Since, these systems provide features like instant messaging, voice calls, video calls and emails, the entire communication process becomes extremely easier, quicker as well as cheaper for all organizations. ii)Cost Effectiveness: The second important and significant advantage of these IT systems is its cost effectiveness. This type of systems could be easily afforded by each and every organization and no extra cost is incurred apart from the infrastructure and hardware.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 SECURITY ISSUES IN IT SYSTEMS iii)Higher Productivity: Another important and noteworthy benefit of the IT systems within any organization is that it provides higher productivity to that particular organization (Panetto and Cecil 2013). iv)Easy Availability: The fourth vital as well as noteworthy advantage of the organizational information technology systems is that it makes the business open 24X7 throughout the world. This subsequently means that the business could be open anywhere and anytime and even makes the business more convenient than any other business. Security Issues in Organizational IT Systems Although, organizational IT systems consist of several important and significant advantagesand featuresthatare effectivefor the respectivecompany(Mason 2017). However, few security issues are also present within these systems that are required to be eradicated time for providing utmost efficiency to the business. The most important and significant issues of organizational IT systems are computer abuse or computer crime. There are several serious and major effects of computer crime or abuse issues. The respective users of the information systems solely depend on the systems and hence a smaller set back could cause major setbacks for that particular organization (Chenet al. 2014). The security issues of organizational IT systems are as follows: i)Identity Theft: The first and the foremost security issue in the IT systems is identity theft. This type of issue occurs when the cyber attacker or hacker impersonates as an authenticated person for the purpose of practicing any type of malfunction. The identity theft is done by simply accessing the personal details of that particular authenticated person (Weaveret al. 2016). These personal data or information involve social security numbers, passport numbers, confidential organizational data and several others.
5 SECURITY ISSUES IN IT SYSTEMS ii)Phishing:Thesecondimportantandnoteworthysecurityissuewithinthe organizational IT systems is phishing. It is the fraud attempt for the purpose of obtaining sensitive or confidential information like usernames, passwords as well as credentials of credit cards by disguising as the trust worthy entity within the electronic communication. Phishing is majorly spread through emails and it is a type of identity theft. iii)Physical Damage: The next important security issue or threat to the organizational IT systems is physical damage (Birkset al. 2013). The loss as well as corruption of data is extremely common due to such issue in IT systems. Moreover, the infrastructure or hardware are damaged due to the security issue of physical damage. The security issues could either be accidental or intentional or could even by caused by the natural disasters. iv)Spamming: The spamming could be stated as the specific utilization of the messaging systems for the purpose of sending any type of spam or unsolicited message, majorly advertising or sending the messages repeatedly on that particular web site. The most popular as well as significant recognized form of spam is the spamming of electronic mails (Feng, Wang and Li 2014). However, the spamming is also applied to other media like wiki spam, instant messaging spam, mobile phone messaging spam, social spam, blogs spam and several others. The extra costs like fraud and lost productivity are also possible for the presence of spamming within the organizational IT systems. v)Hacking: The next subsequent security issue for the organizational IT systems is hacking. The hacking solely refers to any type of unauthorized or unauthenticated intrusion into the network or computer. The significant person, who is engaged within any type of hacking activity is called a hacker (Mishra, Srinivas and Mukhopadhyay 2014). The hacker mightevenalterthesecurityfeaturesorsystemfeaturesforthecorepurposeof accomplishing the goals and objectives, which are different from the original purpose of the
6 SECURITY ISSUES IN IT SYSTEMS respective system. This even refers to the non-malicious activities after the inclusion of improvised as well as unusual alterations to the processes and equipment. vi)Jamming: The sixth important and significant security issue for any of the organizational IT system is jamming. The major purpose for executing the jamming threats is to find out a specific method for tying up of the lines to the system (Goes 2014). This is done behind a web site and when the lines are being tied up, the legitimate users could easily access the web site and hence these lines could be jammed with the illegal users. viii)Malicious Software: The presence of malicious software within the IT systems is yet another important security issue for any organization. This type of software provides full or partial control of the systems for doing anything the creator of malware needs. The malicious software could either be a virus, Trojan horse, spyware, adware, worm or any other (Worrell, Di Gangi and Bush 2013). This type of software is responsible for bringing some of the major and the most significant changes or threats within the organization by stealing the confidential information or data. ix)Lack of Encryption: Another important and noteworthy security issue for the organizational information technology systems is lack of encryption. The protection of sensitive business data within transit is extremely important and the effectiveness is measured distinctly. If the data is not protected and does not comprise of encryption, the authenticated users would loss the data integrity and confidentiality. x)Inadequate Security Technology: The next important and significant security issue fortherespectiveorganizationalITsystemsistheinadequatesecuritytechnology (Dahlstrom, Walker and Dziuban 2013). The software is responsible for monitoring the overall network security for becoming a specific growing trend within the enterprise space. It is designed for sending subsequent alerts as soon as the intrusion attempts are occurring and
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7 SECURITY ISSUES IN IT SYSTEMS only valuable alerts are effective for resolving them. The organizations majorly rely on the technologies for being completely protected against the security attacks, only when they are meant to be a managed tool or technique. Probable Solutions for Solving the Security Issues The proper management of data is easily done with the information technology. These data could be of any form like texts, voice, images, audio and many others. The advanced data management is possible with the help of information technology systems. The above mentioned issues or threats related to security of the organizational IT systems are extremely dangerous and vulnerable for the business and the business related data (Laudon and Laudon 2015). There are some of the major and the most significant solutions for each and every security issue of the IT systems within the organization and these probable solutions are provided below: i)Implementation of Antivirus Software: The first and the most effective solution for the proper removal of all types of security issues within the organizational IT systems is the effective as well as efficient implementation of antivirus software. This type of software is also termed as the anti-malware. It is a specific computerized program that is utilized for the purpose of prevention, detection as well as removal of malware. The major purpose of this type of software is to detect and remove the computer viruses and it is extremely effective for all systems. ii)Implementing Firewalls: The firewall is the network security system, which is solely responsible for monitoring and controlling of the incoming and outgoing network traffic on the basis of the previously determined security rules (Galliers and Leidner 2014). The firewall acts as the barrier within the trusted internal networks and the untrusted external networks like the Internet connection. The organizational IT systems would be absolutely
8 SECURITY ISSUES IN IT SYSTEMS safe and secured from all types of security issues and hence the respective data would be protected. iii)Using Encryption: The next important and significant solution for removing the security issues in the organizational IT systems is the proper utilization of encryption technique. This is the basic procedure for encoding of an information or message so that only the authenticated and authorized parties could access them. Hence, the data would be safe and secured. iv)Using Updated Passwords: The passwords are yet another effective and efficient method of solving all types of issues related to security in the organizational IT systems (Mason 2017). Moreover, the passwords should also be updated in a periodical manner. Conclusion Therefore, from the above discussion, conclusion can be drawn that information technology deals with computing and is majorly involved in the information and systems transmittalforproperlyfacilitatingthecommunication.Thevarioussignificant responsibilities that are required to be fulfilled by the respective information technology department are quite vital for the respective organization. The major examples of the IT systems are computers, network structure, phone systems, security systems, software, data analysis tool, auditing systems, programming languages and various others. Communication is the major benefit of these types of systems as it makes the entire process of communication quite easier. Apart from communication, these information technology systems are also popular for its productivity, better availability and cost effectiveness. The above report has clearly depicted the several advantages as well as security issues of the respective IT systems. Moreover, the probable solutions for each and every security issue of these information technology systems are provided in the report with relevant and appropriate details.
9 SECURITY ISSUES IN IT SYSTEMS
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10 SECURITY ISSUES IN IT SYSTEMS References Birks, D.F., Fernandez, W., Levina, N. and Nasirin, S., 2013. Grounded theory method in information systems research: its nature, diversity and opportunities.European Journal of Information Systems,22(1), pp.1-8. Chen, H., Hailey, D., Wang, N. and Yu, P., 2014. A review of data quality assessment methodsfor publichealthinformationsystems.Internationaljournal ofenvironmental research and public health,11(5), pp.5170-5207. Dahlstrom, E., Walker, J.D. and Dziuban, C., 2013.ECAR study of undergraduate students and information technology(p. 2013). 2013. Davies, R.S., Dean, D.L. and Ball, N., 2013. Flipping the classroom and instructional technologyintegrationinacollege-levelinformationsystemsspreadsheet course.Educational Technology Research and Development,61(4), pp.563-580. Feng, N., Wang, H.J. and Li, M., 2014. A security risk analysis model for information systems:Causalrelationshipsofriskfactorsandvulnerabilitypropagation analysis.Information sciences,256, pp.57-73. Galliers, R.D. and Leidner, D.E., 2014.Strategic information management: challenges and strategies in managing information systems. Routledge. Goes,P.B.,2014.Designscienceresearchintopinformationsystemsjournals.MIS Quarterly: Management Information Systems,38(1), pp.iii-viii. Laudon, K.C. and Laudon, J.P., 2015.Management information systems(Vol. 8). Prentice Hall. Mason, R.O., 2017. Four ethical issues of the information age. InComputer Ethics(pp. 41- 48). Routledge.
11 SECURITY ISSUES IN IT SYSTEMS Mishra, D., Srinivas, J. and Mukhopadhyay, S., 2014. A secure and efficient chaotic map- basedauthenticatedkeyagreementschemefortelecaremedicineinformation systems.Journal of medical systems,38(10), p.120. Panetto,H.andCecil,J.,2013.Informationsystemsforenterpriseintegration, interoperability and networking: theory and applications. Petter, S., DeLone, W. and McLean, E.R., 2013. Information systems success: The quest for the independent variables.Journal of Management Information Systems,29(4), pp.7-62. Rainer,R.K.,Cegielski,C.G.,Splettstoesser-Hogeterp,I.andSanchez-Rodriguez,C., 2013.Introduction to information systems. John Wiley & Sons. Stair, R. and Reynolds, G., 2013.Principles of information systems. Cengage Learning. Weaver,C.A.,Ball,M.J.,Kim,G.R.andKiel,J.M.,2016.Healthcareinformation management systems.Cham: Springer International Publishing. Worrell, J.L., Di Gangi, P.M. and Bush, A.A., 2013. Exploring the use of the Delphi method in accounting information systems research.International Journal of Accounting Information Systems,14(3), pp.193-208.