Describe the security monitoring activities that should be conducted in an organization with both internal IT (payroll, human resources, inventory, general ledger, and so on) and e-commerce (Internet sales and marketing) applications. Include the rationale supporting each monitoring activity you propose and any recommended course of action to be taken when a significant risk is identified.© BrainMass Inc. brainmass.com August 20, 2018, 8:21 am ad1c9bdddf
I have provided you with organizational securities that are used in any organization. I have addressed both internal IT as well as e-commerce and listed the security monitoring activities for each. You can use this as a rationale for any organization of your choice. All citations are relevant and credible.
First, let us look at what organizational security really is:
What is Organizational Security? Security within an organization has multiple dimensions and is diverse. In the business framework, this security encompasses a system of financial control so that the functioning of the various agencies of the organization may be improved, duplications of work by different departments and employees may be eliminated, customer service may be improved, and financial information can remain secure. Countermeasures are needed to reduce vulnerabilities in all organizations. Here we will look at internal IT and eCommerce in terms of organizational security separately.
What is internal IT? Information Technology or IT mainly deals with computer applications. The common work environment today is totally dependent on computers. "These include storage and protection of content, processing and transmitting of dedicated information and the secured retrieval of information, when and as required. IT promotes computing technology, covering everything from installing applications to developing databases" (Buzzle.com, 2010).
Why should it be secured? The use of information technology (IT) affects the fundamental manner in which transactions are initiated, recorded, processed, and reported. This computerized information system uses automated procedures to initiate record, process and report transactions and are therefore vulnerable to potential threats. The benefits if IT security can be listed as:
?Add value to an organization's internal control
?Assurance to all stakeholders involved
?Effective and efficient organizational operations
?Promotes the organization's reliability and integrity
?Safeguarding of the organization's assets
?Compliance with state and federal laws, contracts and regulations
Security monitoring activities for Internal IT
?Information security roles and responsibilities - "Assign roles and responsibilities, as needed, to address administrative tasks defined in the ...
The solution discusses the security monitoring activities that should be conducted in an organization with both internal IT (payroll, human resources, inventory, general ledger, and so on) and e-commerce (Internet sales and marketing) applications. The two are looked at seperately and the actions an organization must take to minimize threats.