logo

Strategic IT Management: Research Proposal

5 Pages855 Words270 Views
   

Added on  2019-10-18

Strategic IT Management: Research Proposal

   Added on 2019-10-18

ShareRelated Documents
Strategic IT Management (Business module)Research Proposal for IT Intervention at Yahoo!Student NameInstitution
Strategic IT Management: Research Proposal_1
Strategic IT Management (Business module)Introduction Problems with Cybersecurity Management are one of the major problems for every organization. For the research article, the major IT intervention in an organization is chosen as per the topic. Already there were lots of problem in the organization regarding data breaches and IP attacks. In this research thus the IT Strategy is being discussed and analyzed. Also, the Security Incident Management is discussed in this respect and it is found that this concept is used to solve the problem of cybersecurity in an organization. Cybersecurity is essential for any organization, which has a huge information database which is not allowed to bear the loss. With regards to programmers, there are lots of organizations which are defenceless against attacks. When experts know about the significance of cybersecurity, only then it is being seen to able to secure the company from cyber-attacks. This is the reason this topic needs a research and it is also beneficial for the organization. Background/Review of the LiteratureOn April 2018, the organization agreed to pay a punishment of $ 35 million for neglecting toreport 2014 information infringement in which programmers stole individual information from a huge number of client accounts. In the least month only, a judge had decided that casualties of information infringement had the privilege to disagree with Yahoo for inability and negligence to disclose the security vulnerabilities of the framework[CITATION Article \l 1033 ].Yahoo isn't the only one; a large number of organizations have faced the disaster of Public Relation in a previous couple of years around security break. On one hand, the pattern is acknowledged; Cyber attacks are becoming more typical than any time in a recent couple of years since attackers have turned out to be more proficient on curved frameworks.The whole research is divided into two Parts: Part A and Part B. Part A consists of a poster, which reflects the implementation of IT strategy for cybersecurity It also consists of graphs and much more.
Strategic IT Management: Research Proposal_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Challenges in Cybersecurity in Business Assignment PDF
|12
|3096
|38

Report Role of ICT in Silobreaker Cybersecurity Organization
|23
|4538
|219

Cyber-attack on Microsoft company - Research Proposal
|12
|764
|90

Future of the Cybersecurity Profession - ITECH7000
|6
|1177
|32

HI6008 - Business Research - Challenges in Cyber Security in Business
|10
|2609
|313

Importance of Cybersecurity
|9
|1925
|214