Security Issues, Problems and Solutions in Organizational IT Systems
Annotated Bibliography
Biringer, Betty E., and Rudolph V. (2007), Security risk assessment and management a professional practice guide for protecting buildings and infrastructures. Hoboken, N.J.: John Wiley. Print.
In this analysis, Biringer and Rudolph discussed various aspects of security risk assessment and highly recommended to assure the security of any organization. They stated that It is very important for an organization to make sure that the management and costs are completely appropriate according to the risks and challenges faced by the organization
Cisco Systems, Inc. (2006). Top Five Security Issues for Small and Medium-Sized Businesses.
In this paper, different security issues are highlighted that are mostly faced by small and medium sized business organizations. There are a number of vulnerabilities and threats posed by people who are intended to damage data and information privacy of any organization. This paper has also mentioned some of effective solutions that can help in coping up with those security concerns.
Detmar, W., Seymour,E. Baskerville,R.(2008). Information Security: Policy, Processes, and Practices, M.E. Sharpe.
Focusing on different vulnerabilities and threats that are mostly faced by the IT department of any organization, Detmar, Seymour, and Baskerville have stated the policies and procedures that can be implemented and can be highly beneficial for the organization.
Dhotre, V. and Bagad, S. (2009). Information Security, Technical Publications.
In this book, Dhotre, and Bagad have mentioned security attacks (fabrication, modification, interception, and interruption) and security services including availability, access control, non-repudiation, integrity, authentication and confidentiality. Different aspect of information threats are discussed including UDP hijacking, ARP attacks, Internet standards and RFCs, man-in-the-middle attacks, TCP session hijacking, and Buffer overflow and format string vulnerabilities.
Grama,J.(2010). Legal Issues in Information Security, Jones & Bartlett Publishers. In this handbook, a comprehensive and clear guidance and basic knowledge of information security vulnerabilities and relevant legal concerns are discussed. Author has mentioned the significance of legal issues that are involved in data and information threats. Information theft is a considered to be a crime and there are strict policies applied against the criminal.
Johnson, R.(2010). Security Policies and Implementation Issues, Jones & Bartlett Publishers.
Johnson stated that the security policies and its implementation helps to measure various areas of business like compliance related to the regulations of changing government, power and information technologies, measures of health and safety to employees, variation in the prices of commodity-based materials and a number of other features of business. Once an organization assessed their business on the basis of these factors, a risk map can be used as a helpful tool for calculating the importance of each risk as well as the probability of the risk that occurs actually.
Julia, K. and Jeffrey, S. (2011). Top Five Privacy and Data Security Issues for Nonprofit Organizations, Association of Corporate Counsel Nonprofit Organizations Committee Legal Quick Hit.
Julia and Jeffrey discussed the most highlighted issues of data privacy in nonprofit organizations and further they have provided the solutions that can enhance organizational ability in providing measures against hurdles of ...