Purchase Solution

Internal IT and eCommerce Security Monitoring

Not what you're looking for?

Ask Custom Question

Describe the security monitoring activities that should be conducted in an organization with both internal IT (payroll, human resources, inventory, general ledger, etc.) and eCommerce (internet sales and marketing) applications. The paper will include the rationale supporting each monitoring activity you propose and any recommended course of action to be taken when a significant risk is identified.

Purchase this Solution

Solution Summary

The solution deals with two types of organizational security - internal IT and eCommerce. It lists the reasons why they should be secured and the activities organizations can take to mitigate the identified risks. The two forms of securities are looked at seperatetly. Five references are included formated in APA styling.

Solution Preview

Hello and welcome to Brainmass. Please use this guideline as a tool to assemble you final paper in the format that was requested from your professor. There is adequate information in here that I am sure you will find useful in completing your assignment.

Organizational Security

First, let's look at what organizational security really is:
What is Organizational Security? Security within an organization has multiple dimensions and is diverse. In the business framework, this security encompasses a system of financial control so that the functioning of the various agencies of the organization may be improved, duplications of work by different departments and employees may be eliminated, customer service may be improved, and financial information can remain secure. Countermeasures are needed to reduce vulnerabilities in all organizations. Here we will look at internal IT and eCommerce in terms of organizational security separately.

Internal IT:
What is internal IT? Information Technology or IT mainly deals with computer applications. The common work environment today is totally dependent on computers. "These include storage and protection of content, processing and transmitting of dedicated information and the secured retrieval of information, when and as required. IT promotes computing technology, covering everything from installing applications to developing databases" (Buzzle.com, 2010).

Why should it be secured? The use of information technology (IT) affects the fundamental manner in which transactions are initiated, recorded, processed, and reported. This computerized information system uses automated procedures to initiate record, process and report transactions and are therefore vulnerable to potential threats. The benefits if IT security can be listed as:
?Add value to an organization's internal control
?Risk management
?Assurance to all stakeholders involved
?Effective and efficient organizational operations
?Promotes the organization's reliability and integrity
?Safeguarding of the organization's assets
?Compliance with state and federal laws, contracts and regulations

Security monitoring activities for Internal IT
?Information security roles and responsibilities - "Assign roles and responsibilities, as needed, to address administrative tasks defined in the procedures. Ensure that there is an adequate ...

Purchase this Solution


Free BrainMass Quizzes
Excel Introductory Quiz

This quiz tests your knowledge of basics of MS-Excel.

Java loops

This quiz checks your knowledge of for and while loops in Java. For and while loops are essential building blocks for all Java programs. Having a solid understanding of these constructs is critical for success in programming Java.

Word 2010: Table of Contents

Ever wondered where a Table of Contents in a Word document comes from? Maybe you need a refresher on the topic? This quiz will remind you of the keywords and options used when working with a T.O.C. in Word 2010.

Inserting and deleting in a linked list

This quiz tests your understanding of how to insert and delete elements in a linked list. Understanding of the use of linked lists, and the related performance aspects, is an important fundamental skill of computer science data structures.

Basic UNIX commands

Use this quiz to check your knowledge of a few common UNIX commands. The quiz covers some of the most essential UNIX commands and their basic usage. If you can pass this quiz then you are clearly on your way to becoming an effective UNIX command line user.