Share
Explore BrainMass

Organizational Security in IT and e-Commerce

Describe the security monitoring activities that should be conducted in an organization with both internal IT (payroll, human resources, inventory, general ledger, and so on) and e-commerce (Internet sales and marketing) applications. Include the rationale supporting each monitoring activity you propose and any recommended course of action to be taken when a significant risk is identified.

Solution Preview

I have provided you with organizational securities that are used in any organization. I have addressed both internal IT as well as e-commerce and listed the security monitoring activities for each. You can use this as a rationale for any organization of your choice. All citations are relevant and credible.

Organizational Security

First, let us look at what organizational security really is:
What is Organizational Security? Security within an organization has multiple dimensions and is diverse. In the business framework, this security encompasses a system of financial control so that the functioning of the various agencies of the organization may be improved, duplications of work by different departments and employees may be eliminated, customer service may be improved, and financial information can remain secure. Countermeasures are needed to reduce vulnerabilities in all organizations. Here we will look at internal IT and eCommerce in terms of organizational security separately.

Internal IT:
What is internal IT? Information Technology or IT mainly deals with computer applications. The common work environment today is totally dependent on computers. "These include storage and protection of content, processing and transmitting of dedicated information and the secured retrieval of information, when and as required. IT promotes computing technology, covering everything from installing applications to developing databases" (Buzzle.com, 2010).

Why should it be secured? The use of information technology (IT) affects the fundamental manner in which transactions are initiated, recorded, processed, and reported. This computerized information system uses automated procedures to initiate record, process and report transactions and are therefore vulnerable to potential threats. The benefits if IT security can be listed as:
?Add value to an organization's internal control
?Risk management
?Assurance to all stakeholders involved
?Effective and efficient organizational operations
?Promotes the organization's reliability and integrity
?Safeguarding of the organization's assets
?Compliance with state and federal laws, contracts and regulations

Security monitoring activities for Internal IT
?Information security roles and responsibilities - "Assign roles and responsibilities, as needed, to address administrative tasks defined in the ...

Solution Summary

The solution discusses the security monitoring activities that should be conducted in an organization with both internal IT (payroll, human resources, inventory, general ledger, and so on) and e-commerce (Internet sales and marketing) applications. The two are looked at seperately and the actions an organization must take to minimize threats.

$2.19