• essayintl.com >
  • Thesis >
  • INFORMATION TECHNOLOGY SECURITY MANAGEMENT AND ITS IMPACT ON BUSINESS SUCCESS. CASE STUDY IS (H&M)

Essays on INFORMATION TECHNOLOGY SECURITY MANAGEMENT AND ITS IMPACT ON BUSINESS SUCCESS. CASE STUDY IS (H&M) Thesis

Download full paperFile format: .doc, available for editing

15th, November, 2009CURRENT SITUATIONIn business, there has been great development or growth. As new technology emerges, so does the new systems of managing and operating businesses. So many businesses nowadays use corporate applications as a medium of communication, for book keeping and for transactions. It is important to use the corporate applications but there is need to maintain security. This is the reason why it is important to develop ways of managing an organization’s information technology. The aim of this project was to design and implement server protocols that can satisfy organization’s business needs and maintain the security and integrity of the organization’s critical and confidential data.

Satisfying business needs in this case means designing and implementing system software that will enable internet marketing. The proposal was to implement such system (Secure Network Infrastructure for e-Commerce) through high level programming. There were objectives set for accomplishment of the aims of the project. These were: 1.To research on the secure network infrastructure for ecommerce. The research will include academic literatures, enterprise publications and books on secure network infrastructure for ecommerce. 2.To analyze and evaluate secure network infrastructure for ecommerce strategies. Special consideration will be made to external consultants like the IS Integration Ltd which will assist in the creation of the secure network infrastructure for ecommerce. 3.To investigate on the benefits of ecommerce and the use of internet on business. In order to identify the benefits of the new system, research will be conducted on internet marketing methods, online payments and the feasibility study will be conducted at the company4.To find the assumptions and constrains of the secure network infrastructure for ecommerce. 5.To produce a report containing the High risk factors involved in IT security Management and recommend ways of improvement. 6.To evaluate the outcome.

In an attempt to evaluate the project’s deliverability, special assumptions on current technology will be made so as to be able to analyse statisticsAchievement of these objectives was through: research which was to be done on the infrastructure, on special Information technology security management, Analysis and evaluation of secure network infrastructure for ecommerce strategiesDetermination of the benefits of e-commerce and the use of internet on business andResearch on assumptions and constrains of the secure network infrastructure for ecommerceCurrently, the following have been done: Research has been done on the sources of information about information technology security management, the secure network infrastructure for e-commerce and important information required for the accomplishment of the above objectives. Below is a description of the information already obtained and the sources from which they have been obtained. Research to be done on the infrastructure, on special Information technology security management Research has been conducted about information technology secure network infrastructure and its management.

Georgia Technology Authority (GTA) publication contains information on the required standards necessary before deployment of web services and an internet based web server (GTA, 2008).

This is a company’s article/publication on web and E-Commerce security and gives the standard that establishes the minimum security measures that should be implemented by agencies on web facing systems available for public access.

Download full paperFile format: .doc, available for editing
Contact Us