Friday, February 7, 2020
Case Study Example | Topics and Well Written Essays - 500 words - 9
Case Study Example One of the most effective policies to employ in the organization for greater security is the usage of key passes. These are very important, as they will help in the identification of people who enter and live various sections and rooms in the organization. The policy of ensuring that every employee in the organization has a key pass will help secure the organizationââ¬â¢s assets such as computers as the organization works through the internet. In case of any mishap, the information technology specialists in the organization just have to review the latest people to access the place in question. This is a short-term goal as the keys can be created from inside the organization A long-term goal that can be set for the organization in terms of security is ensuring that it creates firewalls. These are very important in an effort to save the files that are located in the computers through the continuing commercial activities. Firewalls are important in that they assist in the prevention of hackers. In the contemporary world, hacking has become one of the widely recognized activities in the field of Information technology. E-commerce involves the trading of commodities online, there are people who may hack and alter the system to some form such as it would seem as they have paid money for a commodity, hence go ahead, and claim it. This form of hacking is bound to be curtailed by the installation of firewalls. The installation of a diverse and complex backup system is very influential. This is one of the policies that should be put as a long-term aspiration. Back-up systems are influential in that they assist in the recovery of files in case of a crash of systems due to some of the contemporary issues that may arise such as a sweep of the system by some form of Electromagnetic wave (Newman, 2009). Another issue noted in the field of commerce is the increased number of players. With an increased number of players, one of the increasing
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.