Purchase Solution

Security Measures in Technology Management

Not what you're looking for?

Ask Custom Question

Assume that you have been asked to consult for a company that has branch offices in four continents. You have implemented a management information system that will enable its managers to exchange information about various company activities in the areas of marketing, sales, HR, finance, and administration. As part of the implementation process, you are required to make a recommendation on the types of security measures that should be taken with implementation of this system.

Write 4-6 paragraphs responding to the following questions:

1. What are some of the potential security threats to managing information related to these activities across multiple locations?

2. What strategies or tools could be used to minimize these types of threats upon implementing a system in this situation?

Purchase this Solution

Solution Preview

1. What are some of the potential security threats to managing information related to these activities across multiple locations?

Information Technology has changed the way information is stored and shared both within and outside the company. If the firm's information is not properly protected, the company might find itself in a precarious condition. Information security is concerned with data regardless of the form the data may take. The vast amount of data today is stored on computer systems. Therefore restricting access to computer systems both internally and externally is a major issue to management. Information security initiatives are put in place to protect information assets not only the information itself, but also computer software, hardware, networks and indeed the infrastructure supporting the entire information system.

The prime concerns of information control and security to management rise in the areas of confidentiality, integrity and availability of data, possession/control, authenticity and utility. Confidential information must only be accessed, copied, or disclosed by people who have been authorized to do so. However, a break of confidentiality occurs when information is accessed by ...

Solution provided by:
Education
  • MBA, Aspen University
  • Bachelor of Science , Berea College
Recent Feedback
  • "Thank u"
  • "Thank You!"
  • "Thanks!"
  • "Thank you so much"
  • "Great job...thanks."
Purchase this Solution


Free BrainMass Quizzes
Academic Reading and Writing: Critical Thinking

Importance of Critical Thinking

Operations Management

This quiz tests a student's knowledge about Operations Management

SWOT

This quiz will test your understanding of the SWOT analysis, including terms, concepts, uses, advantages, and process.

Six Sigma for Process Improvement

A high level understanding of Six Sigma and what it is all about. This just gives you a glimpse of Six Sigma which entails more in-depth knowledge of processes and techniques.

IPOs

This Quiz is compiled of questions that pertain to IPOs (Initial Public Offerings)