Explore BrainMass

Explore BrainMass

    Security Measures in Technology Management

    This content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!

    Assume that you have been asked to consult for a company that has branch offices in four continents. You have implemented a management information system that will enable its managers to exchange information about various company activities in the areas of marketing, sales, HR, finance, and administration. As part of the implementation process, you are required to make a recommendation on the types of security measures that should be taken with implementation of this system.

    Write 4-6 paragraphs responding to the following questions:

    1. What are some of the potential security threats to managing information related to these activities across multiple locations?

    2. What strategies or tools could be used to minimize these types of threats upon implementing a system in this situation?

    © BrainMass Inc. brainmass.com June 4, 2020, 3:29 am ad1c9bdddf
    https://brainmass.com/business/business-management/security-measures-in-technology-management-517715

    Solution Preview

    1. What are some of the potential security threats to managing information related to these activities across multiple locations?

    Information Technology has changed the way information is stored and shared both within and outside the company. If the firm's information is not properly protected, the company might find itself in a precarious condition. Information security is concerned with data regardless of the form the data may take. The vast amount of data today is stored on computer systems. Therefore restricting access to computer systems both internally and externally is a major issue to management. Information security initiatives are put in place to protect information assets not only the information itself, but also computer software, hardware, networks and indeed the infrastructure supporting the entire information system.

    The prime concerns of information control and security to management rise in the areas of confidentiality, integrity and availability of data, possession/control, authenticity and utility. Confidential information must only be accessed, copied, or disclosed by people who have been authorized to do so. However, a break of confidentiality occurs when information is accessed by ...

    $2.19

    ADVERTISEMENT