Explore BrainMass

Impact of information technology security

Research reputable sources (reputable technical periodicals) regarding information technology security. Give two examples of organizations that have identified security and briefly explain how to solve them. From your research on information technology security and the concepts presented, what is the impact of information technology security on the organizational community?

Solution Preview

The response addresses the queries posted in 963 words with references.

// The rapid enhancement in the field of technology has made it essential for all the businesses to implement such technology in their business processes, so that competitive advantage over others can be achieved. One of the important aspects that need to be considered in such implementation process is related to the security of such information technology. The following paragraph contains a brief description about the information technology security in general//.

With the increasing benefits of implementing the technology in the business places, most of the business organizations have identified such technology as one of the crucial aspects for achieving success. The importance of IT has been recognized by most of the business organizations which compel them to implement such technology in their business processes. With the increasing number of business organizations experiencing the benefits of IT implementation, there also evolves a threat of damage to their business processes. As a result, the security of their business has been a major cause of concern. In fact, the aspect of security has been given due importance by these business organizations and as such, it is no longer considered as an event or a part time assignment, rather it has been taken as a continuous process from both, the technology and management perspective. The increasing number of computer hackers has also become a major cause of concern for these business organizations, as they have the potential to badly impact the important information of ...

Solution Summary