Technology, Marketing, and Security E-Activity Term Paper

Total Length: 823 words ( 3 double-spaced pages)

Total Sources: 2

Page 1 of 3

The company might be a victim of online criminals and might end up as an extortion target. The company is exposed to attacks because of its limited resources to maintain the defense. The company is online and is mobile connected. If it loses this benefit, it will have lost the business. It is necessary for the company to be aware of the possible threats and implement security policies to address the risks.

Logical controls would be the best safeguards for the company's information system. They involve the application of data and software to control and monitor computing systems and access to information systems. For instance, network and password-based firewalls, access control lists, data encryption, and machines for detecting system intrusion. The principle of least privilege is an important safeguard, which has been increasingly overlooked. This control requires that a system, program, or individual are not granted any extra access privileges in accessing programs to surf and read emails. When individuals are granted this privilege, they might over time, violate the safeguard. This occurs when an individual is promoted, transferred or when their duties are changes (Khosrowpour, 2004).

Case Study 14.1

In order to manage a sports arena effectively, the ICT system in place needs to facilitate the ticketing process, security and emergency dispatch, standard office connectivity, capabilities of ordering inventory, security monitoring, and provide resources for the attendees and the media.

Stuck Writing Your "Technology, Marketing, and Security E-Activity" Term Paper?

The most essential of these is the point of sale hardware and software that facilitate payments for events. The arena should have a point of sale that provides customers with payment options such as the EFTPOS. The arena should also have a database for managing its activities, maintaining membership, providing booking facilities, and monitoring attendance. Additionally it is necessary to have a security structure in place that ensures the facility is monitored at all times. This security equipment includes security cameras and software to monitor and store security footage. Access controls to the facility should also enhance security by providing detection of weapons and restricting unauthorized access to the facility. The incorporation of basic accounting software also becomes critical in the management of funds collected from the point of sale. The employment of necessary equipment such as computers to facilitate this and other processes are inherent to ensure the security of funds collected (Khosrowpour, 2004)......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Technology Marketing And Security E-Activity" (2013, June 01) Retrieved June 28, 2025, from
https://www.aceyourpaper.com/essays/technology-marketing-security-e-activity-91334

Latest MLA Format (8th edition)

Copy Reference
"Technology Marketing And Security E-Activity" 01 June 2013. Web.28 June. 2025. <
https://www.aceyourpaper.com/essays/technology-marketing-security-e-activity-91334>

Latest Chicago Format (16th edition)

Copy Reference
"Technology Marketing And Security E-Activity", 01 June 2013, Accessed.28 June. 2025,
https://www.aceyourpaper.com/essays/technology-marketing-security-e-activity-91334