Get Similar Asssignment Answers & Custom Paper Writing Services

To hire a writer, fill the order form with details from your nursing assessment task brief.

Posted: August 11th, 2022

IT systems security issues and solutions at Desco Corp

Business Case Technology Plan
INSTRUCTIONS:
– This research project is an assignment consisting of four papers that will build on one another.

– Suggest a fictional company, and incorporate your research findings to justify a business case for the use of technology.

– Homework help – Writer can pick a topic of their choice (from provided list). PLEASE ENSURE TOPIC IS STRONG ENOUGH TO COMPLETE A 4 PART PROJECT.

* Grading Rubric included for reference

*Please include required information in paper.
Please let me know if writer needs any other information or clarification

IT systems security issues and solutions at Desco Corp.
Introduction
Desco Corporation is a medium business that provides its services through online platforms, including the organization website, a third-party marketing platform, and social media platforms. Desco business operations involve customers ordering the goods through an e-commerce platform or through other online channels connected to the company website. The company also delivers the goods to the customers’ homes, with the customer having to provide their home address for the delivery to be conducted. The company payment methods are both online or cash payments. The business operation of the Desco requires it to have a robust Information Technology with high security to protect the business and customer information and data. The federal government’s current requirements in terms of protecting customer information and privacy have forced Desco management to consider an evaluation of their IT system security status (Gupta & Hammond, 2005). The study provided in this paper concerning the security issues, problems, and solutions for the Desco IT system will enable the company to implement recommended measures to tighten its security and remain compliant with the information laws and regulations.
Research Hypothesis
It is hypothesized that, subsequent to the legislation and standards regarding the IT system security, the security issues and problems have solutions. The research will focus on providing solutions to IT system security issues and problems with stipulated standards and legislations (Pereira & Santos, 2014).
Definitions
• National Institute of Standards and Technology (NIST) – A Computer Security Resource center organization of the United States that provides several documents regarding computer and system security.
• Information security – It is the process and procedure of protecting the information in the organization’s IT systems by mitigating the information’s threats and risks through various measures and techniques.
• Information security management – Involves the controls that an organization implements to ensure it has the ability to protect the IT systems and the information confidentiality, integrity, and availability against security threats.
• Security standards – Set of policies, standards, and procedures published to establish a common language, specification and other criteria designed to guide and define IT systems security.
• Computer security – Involves technical and procedural measures required to prevent unauthorized access, use, modification, and dissemination of data stored on a computer or IT systems, preventing deliberate denial of service and protecting the system from physical harm.
• Privacy – Is the issue regarding the computer community with regard to maintaining personal information on individual consumer or citizen in computerized-record-keeping systems (Turn & Ware, 1976).
Research Plan
An interdisciplinary will be employed in studying the security issues, problems, and solutions since no single disciplinary perspective can adequately address the IT system security issue. The company’s IT system will be evaluated and tested based on different security standards, threats, and information security management strategies. The research will be used to analyze Desco IT systems’ security and provide recommendations for implementing solutions to enhance IT system security where necessary. The research will also examine the role of different legislations, laws, rules, and government policies and regulations regarding maintaining IT system security.
Expected Conclusion
It is anticipated that in response to the Desco IT system security issues and problems, the company will be able to implement solutions that will be recommended in the research. The research outcome will also provide other organizations that depend on IT systems for their business operations mechanisms of protecting and avoiding IT systems security issues and problems.

References
Gupta, A., & Hammond, R. (2005). Information systems security issues and decisions for small businesses: An empirical examination. Information Management & Computer Security, 13(4):297-310. doi: 10.1108/09685220510614425
Pereira, T., & Santos, H. (2014). Challenges in Information Security Protection. 13th European Conference on Cyber Warfare and Security (ECCWS-2014). https://www.researchgate.net/publication/264116803_Challenges_in_Information_Security_Protection
Turn, R., & Ware, W. (1976). Privacy and Security Issues in Information Systems. IEEE Transactions on Computers, Vol. C-25, Iss.12, Pp. 1353-1361. doi: 10.1109/TC.1976.1674604

Order | Check Discount

Tags: IT systems security issues and solutions at Desco Corp, Business Case Technology Plan

Nursing Assignment Help For You!

Special Offer! Get 20-30% Off Your Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.

Affordable Prices

Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.

100% Plagiarism-Free

No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you decide to place an order with Nursing Study Bay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much guidelines - instruction details as possible.

Assignment of Writer

We assess your order and pair it with a skilled writer who possesses the specific qualifications for that subject. They then start the research/writing from scratch.

Order in Progress and Delivery

You and the assigned expert writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also review testimonials from other clients, from where you can select your preferred professional writer to assist with your homework assignments.

For Similar Answers, Custom Essay Writing & Assignment Help Services

Find an expert by filling an order form for your nursing paper. We write AI-plagiarism free essays and case study analysis. Anytime!

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00