- 23/11/2012
- Posted by: essay
- Category: Free essays
a. Improvement of information systems
One of the major ways to improve the management of IT security is the introduction of new information systems and updating of existing ones. Threats keep progressing and information systems should progress respectively to the progress of technologies and threats (Dhillon, 2007). At the same time, the development of new information systems is essential because information technologies are progressing at the unparalleled pace. On the other hand, the improvement of information systems leads to the higher data protection. In such a situation, managers should focus on the use of new information systems and regular updating of information systems. In other words, managers should stimulate IT specialists to develop new information systems or to update existing ones.
b. Introduction of new access control systems (biometric IT security systems)
Furthermore, numerous threats to IT security derive from the poor control system. In this regard, the role of the management of IT security can hardly be underestimated because management should develop effective systems of control to prevent the unsanctioned access to private information and important data stored in electronic databases. In this regard, modern companies as well as other organizations tend to introduce new access control systems, which are based on biometric control systems. For instance, one of such systems involves the use of fingerprints to identify the user. In fact, access control systems based on the use of biometric data are considered to be very effective because biometric data are unique for each user. Therefore, the use of access control systems based on the use of biometric data can minimize the risk of identity theft, unsanctioned access to information and other threats to IT security. Nevertheless, until now, there is still no ideal access control system.
c. Cryptography
Finally, cryptography is the traditional method used to improve IT security and the management of IT security should focus on the improvement of cryptography and introduction of new approaches to cryptography (Andrew, 2007). In fact, cryptography implies that the access of unauthorized users to private information, for instance, is protected by the system of codes. In addition, the data or private information, which is supposed to be protected by IT security, are ciphered as well. As a result, the management of IT security can use cryptography to enhance the data protection and the level of IT security. On the other hand, cryptography has to progress constantly because outdated cryptography can be easily surpassed by hackers and, therefore, the risk of the unsanctioned access to private information increases.
Conclusion
Thus, taking into account all above mentioned, it is important to place emphasis on the fact that the management of IT security should cope with emerging threats to IT security. In this respect, it is worth mentioning such threats as identity theft, information breaches and violation of intellectual property rights. In such a situation, the management of IT security should improve existing information systems, update them regularly, and introduce new, effective systems of access control
References
Andrew, S. (2007). Computer Networks. (6th Ed), Prentice Hall.
Bloch, M., Peigneur Y. and Segev A. (2009). “Leveraging Electronic Commerce for Competitive Advantage: a Business Value Framework.” The Ninth International Conference on EDI-IOS, Bled, Slovenia.
Dhillon, G. (2007). Principles of Information Systems Security: text and cases. John Wiley & Sons.
Harris, Shon (2008). All-in-one CISSP Certification Exam Guide (4th Ed. ed.). New York, NY: McGraw-Hill
Lucas, H. and Baroudi, J. (2002). “The role of Information Technology in Organization Design.” Journal of Management Information Systems, vol. 10(4), 45-52.
Leave a Reply
You must be logged in to post a comment.