Technology Evaluation Project

Read Complete Research Material



Technology Evaluation Project

Executive Summary

The Information and Communication Technologies (ICTs) are invading all aspects of human existence and are posing serious challenges individual and social values that were considered firmly established. It is true that ICT technologies like the Internet and World-wide Web pla a vital role in creating opportunities that were not available before. In addition, it is also true that they have raised new security as well as ethical issues because the changes are affecting human relations, social institutions and basic moral principles. The increasingly widespread use of computers, as happened with other technological advances has created and is creating a myriad of new possibilities.

In response to growing problems, the IT risk management has undergone many changes in recent years as the ability to define and communicate the context of IT risk has taken much more relevance. In fatc, several areas involve risks that should be treated to provide significant benefits to an organization, like business risks, market risks, credit risks, operational risks, IT risks, engineering, etc. Thus, RM strategies vary from generic approaches, project management, IT (including information security), safety engineering, etc. Highly specific areas, like aviation or banking, are more focused on analytical methods to assess and quantify risks, rather than processes and methodologies to manage the overall risk environment.

Abstract

Organizations today are conscious about their data security more than ever before due to the frequent number of information breach. It has been seen in many organizations where employees are not well-aware of information security issues with its ethical aspect. The paper discusses the importance of data security in the workplace. The preventive measures of such breaches are also detailed out in this paper.

Table of Contents

Executive Summary2

Abstract3

Introduction5

Prevention Meaures5

Risk Management8

Conclusion9

References10

Technology Evaluation Project

Introduction

In today's rapidly changing business environment, businesses are now more dependent on information technologies and also investing on data security to protect their data (Lee et al., 2010). No doubt, the implementation of information technology became paramount for business success. However, it brought several challenges along as well. Network security is the system to safeguard against the risk of data intrusion. In addition, it is imperative for the organizations to ensure that the information sharing should be shared at the right place by right people. The privacy and the protection of personal data are among the major challenges in the development of information and Communication technology (ICT) systems and applications (Lee et al., 2010).

Prevention Measures

Organization's focus should be on a comprehensive multilayer security program to avoid the security breaches (Piccard, 2005). It is important to protect the confidentiality of organizational as well as customers' information. Keeping in view the aforementioned breaches, the following step-wise safeguards will be appropriate to avoid security breaches (Nemati, 2012).

Privacy Policy

Design a comprehensive privacy policy and appoint a department responsible to look over the privacy policy. The employees and customers could bring their questions and complaints to that department (Nemati, 2012).

Threat Prevention Programs

Implement the theft prevention program that will guide the employees about identity theft. The warning signs and consequences should be communicated throughout ...
Related Ads