University Report: Information Technology Governance Analysis
VerifiedAdded on 2022/08/21
|5
|1021
|14
Report
AI Summary
This report provides an overview of Information Technology (IT) governance, emphasizing the critical need for data protection across public, private, and non-profit sectors. It highlights the increasing importance of safeguarding organizational data, given the rise of cyber threats and the potential impact on business services and consumer trust. The report discusses the different types of organizations, the importance of data, and various types of hackers. The report emphasizes the importance of data protection strategies, including the implementation of effective data security laws, employee supervision, and the adoption of technologies like IoT, cloud computing, and big data analytics. The report also covers the types of hackers and their methods, underscoring the need for robust data protection measures to maintain data confidentiality and prevent unauthorized access.

Running head: REPORT ON INFORMATION TECHNOLOGY GOVERNANCE
REPORT
ON
INFORMATION TECHNOLOGY GOVERNANCE
Name of the Student
Name of the University
Author Note:
REPORT
ON
INFORMATION TECHNOLOGY GOVERNANCE
Name of the Student
Name of the University
Author Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1INFORMATION TECHNOLOGY GOVERNANCE
What aspects of public, private, or non-profit sector are under protected and
why?
Answer:
Public, private, or non-profit sector:
Considering the current industrial growth it is identified that public organizations are
nothing but the types of organizations that are owned by government and the primary objective
of these organizations are to serve services to the public such as the field of education,
government sector and healthcare. Along with this one of the significant aspect present in these
types of organization is that these organization does not seek for profit all time such as
hospitality industry, retail industry as well as food industry. Along with these types of
organizations it is also identified that private organizations are such types of organization which
is operated by profit and multi-shared partners. Whereas the non-profit organizations are those
organizations whose primary purpose is to serve services to public without benefits such as
government sectors.
What needs to be protected?
Followed by these concern it is identified that in all of these organizations, the
organizational data is a common factor which needs to be handled with care. Thus it is observed
that in the public, private as well as in non-profit organizations data protection is in high priority.
Making allowance to this concern it is identified that since, the organizational data holds several
confidential information about the user and about the citizens as well the organization will
definitely protect it.
What aspects of public, private, or non-profit sector are under protected and
why?
Answer:
Public, private, or non-profit sector:
Considering the current industrial growth it is identified that public organizations are
nothing but the types of organizations that are owned by government and the primary objective
of these organizations are to serve services to the public such as the field of education,
government sector and healthcare. Along with this one of the significant aspect present in these
types of organization is that these organization does not seek for profit all time such as
hospitality industry, retail industry as well as food industry. Along with these types of
organizations it is also identified that private organizations are such types of organization which
is operated by profit and multi-shared partners. Whereas the non-profit organizations are those
organizations whose primary purpose is to serve services to public without benefits such as
government sectors.
What needs to be protected?
Followed by these concern it is identified that in all of these organizations, the
organizational data is a common factor which needs to be handled with care. Thus it is observed
that in the public, private as well as in non-profit organizations data protection is in high priority.
Making allowance to this concern it is identified that since, the organizational data holds several
confidential information about the user and about the citizens as well the organization will
definitely protect it.

2INFORMATION TECHNOLOGY GOVERNANCE
Thus, it is highly essential to implement effective data protection strategies and laws.
While analyzing these aspects it is identified that data protection within the organization reflects
the sign of effective services and good impression on the consumers. Similarly, less effective
data protection strategies causes significant limitations on the business service and effectiveness.
Making allowance to this concern it is identified that incorporation of effective data security law
will definitely help the organizations to protect their data (Almeida et al., 2017).
According to the study of UNITED NATIONS PUBLICATION (2020) it is identified that
the issues of data protection has increased due to the lack of data protection strategies into the
organizations. Whereas, it is also identified that the adoption of several technologies may
significantly impact the data protection strategies of the organizations. Those technologies
includes internet of things, cloud computing as well as Bigdata analytics. Although these
technologies are enhancing the data protection within the organization it is identified that misuse
of these technology may influence the data privacy of the consumers. Followed by this
investigation it is identified that the organizations definitely requires to protect this assets.
Considering the above discussion it is identified that only protecting the organizational
data will not help to enhance the data security within the organization but it is also essential to
supervise the activities of the employ within the organization as supervision will help to get a
detail idea on the activities of the employ and detect unusual activities too.
Thus, it can be summarizes that within any public, private and non-profit organization
one of the assets is the organizational data which needs to be protected with effective laws and
regulations as this will help to ensure the data confidentiality of the consumers.
Thus, it is highly essential to implement effective data protection strategies and laws.
While analyzing these aspects it is identified that data protection within the organization reflects
the sign of effective services and good impression on the consumers. Similarly, less effective
data protection strategies causes significant limitations on the business service and effectiveness.
Making allowance to this concern it is identified that incorporation of effective data security law
will definitely help the organizations to protect their data (Almeida et al., 2017).
According to the study of UNITED NATIONS PUBLICATION (2020) it is identified that
the issues of data protection has increased due to the lack of data protection strategies into the
organizations. Whereas, it is also identified that the adoption of several technologies may
significantly impact the data protection strategies of the organizations. Those technologies
includes internet of things, cloud computing as well as Bigdata analytics. Although these
technologies are enhancing the data protection within the organization it is identified that misuse
of these technology may influence the data privacy of the consumers. Followed by this
investigation it is identified that the organizations definitely requires to protect this assets.
Considering the above discussion it is identified that only protecting the organizational
data will not help to enhance the data security within the organization but it is also essential to
supervise the activities of the employ within the organization as supervision will help to get a
detail idea on the activities of the employ and detect unusual activities too.
Thus, it can be summarizes that within any public, private and non-profit organization
one of the assets is the organizational data which needs to be protected with effective laws and
regulations as this will help to ensure the data confidentiality of the consumers.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3INFORMATION TECHNOLOGY GOVERNANCE
Why the data needs to be protected?
During this analyze it is observed that into a private, public or government organization
one of the core element is data which influences the services of these organizations. One of
significant reason that causes this scenario is the influence of hacker into the organizations
infrastructure. As it is observed that the hackers has become more harmful that is impacting the
data privacy of those organizations. Making allowance to this concern it is identified that there
are three types of hacker present which includes the black hat hackers, white hat hackers as well
as the grey hat hackers. While analyzing this aspect it is identified that the black hat hackers are
mostly responsible for Distributed Denial of Service attack as well as these types of the attackers
also develops worm attacks (Gil 2020).
Followed by this concern it is identified that the white hat hackers are the attacks which
are mostly initiated with respect to the aspect of ethical consideration. Making allowance to this
concern it is identified that these types of attacker manipulates the user mind and get the
unauthorized access of the organizational data. Along with these hackers gray hat hackers are
also one of the threat full hacker that attacks the victims system and manipulates the system
according to their preference by which they get the unauthorized access of the organizational
data. While analyzing the influence of these hackers it is identified that these hackers are
becoming very strong day by day which may significantly impact that services of the
organization (Gil 2020).
Thus, it is very prominent that incorporation of advance data protection is needed which
will protect the organizational data with the purpose to maintain data confidentiality within the
organization.
Why the data needs to be protected?
During this analyze it is observed that into a private, public or government organization
one of the core element is data which influences the services of these organizations. One of
significant reason that causes this scenario is the influence of hacker into the organizations
infrastructure. As it is observed that the hackers has become more harmful that is impacting the
data privacy of those organizations. Making allowance to this concern it is identified that there
are three types of hacker present which includes the black hat hackers, white hat hackers as well
as the grey hat hackers. While analyzing this aspect it is identified that the black hat hackers are
mostly responsible for Distributed Denial of Service attack as well as these types of the attackers
also develops worm attacks (Gil 2020).
Followed by this concern it is identified that the white hat hackers are the attacks which
are mostly initiated with respect to the aspect of ethical consideration. Making allowance to this
concern it is identified that these types of attacker manipulates the user mind and get the
unauthorized access of the organizational data. Along with these hackers gray hat hackers are
also one of the threat full hacker that attacks the victims system and manipulates the system
according to their preference by which they get the unauthorized access of the organizational
data. While analyzing the influence of these hackers it is identified that these hackers are
becoming very strong day by day which may significantly impact that services of the
organization (Gil 2020).
Thus, it is very prominent that incorporation of advance data protection is needed which
will protect the organizational data with the purpose to maintain data confidentiality within the
organization.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4INFORMATION TECHNOLOGY GOVERNANCE
Reference:
UNITED NATIONS PUBLICATION. (2020). Data protection regulations and international data
flows: Implications for trade and development [Ebook] (9th ed.).
Gil, P. "What Are 'Back Hat' and 'White Hat' Hackers? And What Are 'Grey Hats' and
'Hacktivists'? " (Links to an external site.). Lifewire.com. Retrieved 22 January 2020,
from https://www.lifewire.com/black-hat-hacker-a-white-hat-hacker-4061415
Almeida, V. A., Doneda, D., & de Souza Abreu, J. (2017). Cyberwarfare and digital
governance. IEEE Internet Computing, 21(2), 68-71.
Reference:
UNITED NATIONS PUBLICATION. (2020). Data protection regulations and international data
flows: Implications for trade and development [Ebook] (9th ed.).
Gil, P. "What Are 'Back Hat' and 'White Hat' Hackers? And What Are 'Grey Hats' and
'Hacktivists'? " (Links to an external site.). Lifewire.com. Retrieved 22 January 2020,
from https://www.lifewire.com/black-hat-hacker-a-white-hat-hacker-4061415
Almeida, V. A., Doneda, D., & de Souza Abreu, J. (2017). Cyberwarfare and digital
governance. IEEE Internet Computing, 21(2), 68-71.
1 out of 5