You Can Order For A Similar Custom Written Paper 24/7!

For all college assessment assignments, fill the order form with the requested details and get your essays done promptly.

Posted: August 11th, 2022

IT systems security issues and solutions at Desco Corp

Business Case Technology Plan
INSTRUCTIONS:
– This research project is an assignment consisting of four papers that will build on one another.

– Suggest a fictional company, and incorporate your research findings to justify a business case for the use of technology.

– Ace my homework – Writer can pick a topic of their choice (from provided list). PLEASE ENSURE TOPIC IS STRONG ENOUGH TO COMPLETE A 4 PART PROJECT.

* ~ Hire our professional writers now and experience the best assignment help online with our custom paper writing service. We ensure your essays and assignments are expertly researched, written and delivered on time. ~ Grading Rubric included for reference

*I need help writing my essay – research paper include required information in paper.
I need help writing my essay – research paper let me know if writer needs any other information or clarification

IT systems security issues and solutions at Desco Corp.
Introduction
Desco Corporation is a medium business that provides its services through online platforms, including the organization website, a third-party marketing platform, and social media platforms. Desco business operations involve customers ordering the goods through an e-commerce platform or through other online channels connected to the company website. The company also delivers the goods to the customers’ homes, with the customer having to provide their home address for the delivery to be conducted. The company payment methods are both online or cash payments. The business operation of the Desco requires it to have a robust Information Technology with high security to protect the business and customer information and data. The federal government’s current requirements in terms of protecting customer information and privacy have forced Desco management to consider an evaluation of their IT system security status (Gupta & Hammond, 2005). The study provided in this paper concerning the security issues, problems, and solutions for the Desco IT system will enable the company to implement recommended measures to tighten its security and remain compliant with the information laws and regulations.
Research Hypothesis
It is hypothesized that, subsequent to the legislation and standards regarding the IT system security, the security issues and problems have solutions. The research will focus on providing solutions to IT system security issues and problems with stipulated standards and legislations (Pereira & Santos, 2014: 2024 – Essay Writing Service | Write My Essay For Me Without Delay).
Definitions
• National Institute of Standards and Technology (NIST) – A Computer Security Resource center organization of the United States that provides several documents regarding computer and system security.
• Information security – It is the process and procedure of protecting the information in the organization’s IT systems by mitigating the information’s threats and risks through various measures and techniques.
• Information security management – Involves the controls that an organization implements to ensure it has the ability to protect the IT systems and the information confidentiality, integrity, and availability against security threats.
• Security standards – Set of policies, standards, and procedures published to establish a common language, specification and other criteria designed to guide and define IT systems security.
• Computer security – Involves technical and procedural measures required to prevent unauthorized access, use, modification, and dissemination of data stored on a computer or IT systems, preventing deliberate denial of service and protecting the system from physical harm.
• Privacy – Is the issue regarding the computer community with regard to maintaining personal information on individual consumer or citizen in computerized-record-keeping systems (Turn & Ware, 1976).
Research Plan
An interdisciplinary will be employed in studying the security issues, problems, and solutions since no single disciplinary perspective can adequately address the IT system security issue. The company’s IT system will be evaluated and tested based on different security standards, threats, and information security management strategies. The research will be used to analyze Desco IT systems’ security and provide recommendations for implementing solutions to enhance IT system security where necessary. The research will also examine the role of different legislations, laws, rules, and government policies and regulations regarding maintaining IT system security.
Expected Conclusion
It is anticipated that in response to the Desco IT system security issues and problems, the company will be able to implement solutions that will be recommended in the research. The research outcome will also provide other organizations that depend on IT systems for their business operations mechanisms of protecting and avoiding IT systems security issues and problems.

References
Gupta, A., & Hammond, R. (2005). Information systems security issues and decisions for small businesses: An empirical examination. Information Management & Computer Security, 13(4):297-310. doi: 10.1108/09685220510614425
Pereira, T., & Santos, H. (2014: 2024 – Essay Writing Service | Write My Essay For Me Without Delay). Challenges in Information Security Protection. 13th European Conference on Cyber Warfare and Security (ECCWS-2014: 2024 – Essay Writing Service | Write My Essay For Me Without Delay). https://www.researchgate.net/publication/264116803_Challenges_in_Information_Security_Protection
Turn, R., & Ware, W. (1976). Privacy and Security Issues in Information Systems. IEEE Transactions on Computers, Vol. C-25, Iss.12, Pp. 1353-1361. doi: 10.1109/TC.1976.1674604

Order | Check Discount

Academic Paper Writing Help For You!

Get 20-25% Off On Your Order!

Why choose us

You Want Quality and That’s What We Deliver

Professional Writers

We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing

Discounted Prices

Our service is committed to delivering the finest writers at the most competitive rates, ensuring that affordability is balanced with uncompromising quality. Our pricing strategy is designed to be both fair and reasonable, standing out favorably against other writing services in the market.

AI & Plagiarism-Free

Rest assured, you'll never receive a product tainted by plagiarism or AI-generated content. Each paper is research-written by human writers, followed by a rigorous scanning process of the final draft before it's delivered to you, ensuring the content is entirely original and maintaining our unwavering commitment to providing plagiarism-free work.

How it works

When you decide to place an order with Nurscola, here is what happens: