This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Discussion 1: IT Project

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

 

 

 

 

 

 

 

 

 

 

 

Discussion 1: IT Project

Student’s Name:

Institutional Affiliations:

 

Introduction

With the advancement of technology in the world, our organization has facing devastative attacks that affect the performance and productivity of the organization. In order to beef up the security system within an organization, cybersecurity measures must be employed within the organization in order to safeguard the customers’ information and safeguard from any internal or external attacks.  This entailed creating of password policy for the organization, controlling the accessibility within the organization, putting up a firewall, installing intrusion detectors for monitoring network systems, and any unusual activity and installing and updating the company software and programs (Coburn, 2018).

One of the challenges that I experienced when implementing the IT project on employing cybersecurity measures was a lack of trained personnel. Even though my team has implemented the required security measures, the organization lacked skilled staff for maintaining the applications and monitoring the security condition as well as finding or discovering any loopholes or ongoing attacks. This was a significant drawback to the implementation of cybersecurity measures. Secondly was the compliance of the employees or any member within the organization. This was one of the toughest challenges in implementing cybersecurity in creating awareness for all the employees to comply with the established security policies (“Challenges In Implementing Cyber Security”, 2019).

The solution to the above challenges firstly was recruiting a well-trained staff for maintaining the security protocols and coordination of the implemented security measures. Secondly is training the employee on the importance of observing the employed security measures. Issues such as clicking a spam email or transferring files from organization devices to personal computer risks following the password policy should be addressed (Coburn, 2018).

References

Challenges In Implementing Cyber Security. (2019). Retrieved 20 May 2020, from http://siriniti.net/challenges-in-implementing-cyber-security.php.

Top of Form

Coburn, A. (2018). Solving Cyber Risk: Protecting Your Company and Society. Wiley & Sons Canada, Limited, John.

Bottom of Form

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask