Here is the synopsis of our sample research paper on IT and the Security and Risk Manager. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 6 page paper looks at the way in which the risk and/or security manager may need to have IT skills due to the potential risks associated with the use of and asks if it is possible to be a risk manager or a security manager today without good IT competences. The bibliography cites 7 sources.
Page Count:
6 pages (~225 words per page)
File: TS14_TEITmanager.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
on the physical aspects of a business, protecting those assets, including the use of physical barriers, putting in policies and surveillance and other tangible aspects of protection as well as
the sue of strategies to increase security and reduce exposure to risk. The commercial environment has changed, moving from one where there is the use of technology to provide
security, to where the technology itself can be a security threat. It may be argued that the changing role and important of IT/IS in the commercial environment is making it
difficult to be a security manager, without having a sound grounding in IT or IS. When looking at the risks associated with IT in general there is a general
underestimation of the level of security that is required in IT terms. "Security and IT resource planning havent yet risen to the prominence they deserve, exposing companies to internal and
external risks," (Levitt, 2001). In the software risks the main risk must be seen as hacking, and as recent incidents where
even Microsoft have had their security breached and been hacked, in the case of Microsoft it was their hotmail accounts that were compromised. More recently Monster.com have had their main
servers security breached and hacked into (Acohido, 2009). Hacking into system can poses a very serious security threat, especially when we also consider a recent report of the theft of
over a million credit card numbers for in excess of forty e banking and e commerce site we can start to appreciate the scale of the problem (Levitt, 2001). In
the case of MOnstoer.com there were a vast array of personal details, including addresses, social security numbers and all the details needed to commit identity fraud, in addition to this
...