Information Technology -- Managing Information Essay

Total Length: 564 words ( 2 double-spaced pages)

Total Sources: 0

Page 1 of 2



Vandalism

Vandalism is a major concern because of the nature of the products manufactured by the organization and the high rate of theft generally associated with motor vehicles and motorcycles. It is recommended that the organization conduct a thorough perimeter and site security audit for the purposes of ensuring the maximum mitigation of any risks of vandalism and theft. To the extent that internal vandalism is a concern, it is recommended that the organization invest in security cameras to monitor critical areas. Additionally, employee physical access to specific areas on the grounds of the company should be restricted appropriately based on responsibilities. Likewise, it is recommended that different degrees of it system access be assigned to employees on the basis of need instead of allowing universal system access to all authorized it system users.

Stuck Writing Your "Information Technology -- Managing Information" Essay?



Computer Viruses

Modern it systems are inherently vulnerable to many types of malicious attempts at unauthorized infiltration and theft of data. To mitigate the risks associated with malicious intrusions carried out through computer viruses, it is recommended that the organization conduct a thorough it security audit. Based on the results of that audit, the organization should establish it security policies and protocols for the immediate upgrading of equipment and software applications to ensure maximum protection against unauthorized access. Ideally, that audit should include establishing regular procedures for testing and upgrading it systems as well as for requiring all employees with authorized access to it systems to participate in it system security training and mandatory completion of tests to ensure their understanding of it security concerns and issues......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Information Technology -- Managing Information" (2010, November 11) Retrieved April 29, 2024, from
https://www.aceyourpaper.com/essays/information-technology-managing-information-11858

Latest MLA Format (8th edition)

Copy Reference
"Information Technology -- Managing Information" 11 November 2010. Web.29 April. 2024. <
https://www.aceyourpaper.com/essays/information-technology-managing-information-11858>

Latest Chicago Format (16th edition)

Copy Reference
"Information Technology -- Managing Information", 11 November 2010, Accessed.29 April. 2024,
https://www.aceyourpaper.com/essays/information-technology-managing-information-11858