ITM Data and System Security


ITMData and System Security



Thelast few numberof decades has seen a tremendous change in the world of datamanagement. Thishas been influenced by the increasinggrowth of information technology locally and at global levels.Business managers are faced by the dilemma of safety in their crucialreports and data. The pervasive aspect of the internet has alsocontributed to a drastic change in the world of data management. Datais paramount to the organization as it may contain secret codes orformulae or even reports on decisions made (Petković &amp Jonker,2010).

Globaldata management standards also have to be adhered to by themanagement of the company. This also poses a significant challenge inthe current business world in terms of decisions made. Businessorganizations are conducting business away from the usual offices,sometimes in the field. This calls for an employee to access the dataof a business securely and conveniently (Shelly &amp Rosenblatt,2010). This factor contributes to the decision of securing data toavoid cases of compromise. Additionally, cyber crimes have been onthe rise globally which calls for data safety.

Accordingto material facts obtained from e-Security planet, data management iscurrently the most significant aspect of doing business. This isfounded on the principle of globalization where business hasexperienced dynamism. On the contrary, there is also the ethicalissue of database management in the discipline of informationtechnology. At an advanced level of data multiplication, own and evencorporate privacy is sometimes compromised (Yu &amp Jajodia, 2007).There is a need to maintain the privacy of the information belongingto an individual or a business corporate. This technologicaladvancement trend is expensive to maintain especially for smallbusiness corporations.

Manager’srole in securing organizational data

Informationsystem management has experienced the challenge of managing theprivacy of the clients’ data. Business leaders have the role oftaking special precautions to avoid cases of fraud and otherinformation technology related crimes. For instance, phishing for thepast couple of years has affected many people. Consumers have beentricked to update their credit card details only to lose moneythrough this fraud. A 2006 report by Fraud Watch International showedthat the major financial market players such as Bank of American,Chase, JP Morgan, Visa, and Citibank were the most targeted groups byphishers (Shelly &amp Rosenblatt, 2010). This has resulted topeople scaring away from using online payments and also cards. Italso has a cost on the balance sheet of a business firm.

Asa twenty-first-century manager, one has a role to oversee datasecurity and safety measures are followed to the letter. Any case ofcompromise should be reported and dealt with in a quick way. Themanager in charge of security aspects of the organization shouldenforce a two-tier authentication procedure for all the onlineconsumers. This will help one to come up with a secret question to beasked in the event one want to change or update their online detailsin relation to finances. It is equallythe duty of the manager to set up a powerful information managementteam with the capacity to counter all the fraudsters (Yu &ampJajodia, 2007).

Managersshould also head the IT team in the development of a monitoring plan.This policy will be aimed at lowering the risks of online frauds andother phishing activities targeting potential customers. Anotherstrategy as a manager is to steer the development of theanti-phishing strategy which will target all the fraudsters’ sites(Yu &amp Jajodia, 2007). Technology should also be incorporated atadvanced levels in areas such as deployment of anti-phishing softwareand other services aimed at minimizing security risks. The managementhas the authority to educate the consumers on the topic of security.

Securityeffectiveness and relative cost

Managementof an organization’s data is an expensive and involving task. It,therefore, seeks the involvement of several stakeholders in thedecision-making process. The first step in data management is riskassessment and management. Management should carry out a riskassessment audit of the entire system to help in identifying thetargeted areas. This will also incorporate the financial risk auditincurred in the event of a fraud. The frequency of the risk occurringshould also be analyzed, and a precise report issued through the helpof information system specialists (Shelly &amp Rosenblatt, 2010).

Costof security and safety measures are two variables which can not beseparated. High security is as a result of the resources committed tothe system and the vice versa. As a manager, therefore, it isparamount to incorporate the costs analysis in the process of datamanagement and security programs. The cost-benefit analysis should beconducted and expounded through the help of the IT and Financepersonnel. Low-security levels discourage consumers from using theonline payment platforms. It has also resulted to huge losses amongbanks and other financial institutions. It is, therefore, crucial tointegrate the two variables of cost and security level to achieve theorganizational objective and also place the company at a competitiveedge in the industry (Petković &amp Jonker, 2010).

Managementshould apply disaster recovery programs to increase the level ofsafety in data management. Innovation should be encouraged in thefield of data protection to increase the measures on data security.


Petković,M., &amp Jonker, W. (2010). Security,privacy, and trust in modern data management. Berlin: Springer.

Shelly,G. B., &amp Rosenblatt, H. J. (2010). Systemsanalysis and design.Boston, Mass: Thomson Course Technology.

Yu,T., &amp Jajodia, S. (2007). Securedata management in decentralized systems.New York: Springer.