Preview

ICT Infrastructure_TOA Uwanga

Powerful Essays
Open Document
Open Document
2313 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ICT Infrastructure_TOA Uwanga
Hochschule Wismar
Cape Peninsula University of Technology

ICT Infrastructure
INFORMATION COMMUNICATION AND TECHNOLOGY
SAFETY AND SECURITY
Tonata Odey Ashie Uwanga
03 June 2013

CONTENTS
Abstract...................................................................................................................................... 3
Overview of Risks and Controls ................................................................................................. 3
Data Center and Network Operations ........................................................................................ 4
Information Security ................................................................................................................... 8
System Change Control and management................................................................................11
ISO Domain Areas ....................................................................................................................13
Conclusion ................................................................................................................................14
References ...............................................................................................................................15

Page 2

ABSTRACT
In recent years there has been significant and rapid change in the financial industry.
The value of Information Technology (IT), and the information, processes and knowledge that are stored and managed by these technologies is greater than ever before. Consequently with these changes and developments in business, there is an increased focus on Information and Communication Technology (ICT) security and safety. The paper looks at ICT security and safety within a company, the risks and threats IT is facing and General Computer Controls (GCC) and ways of managing and mitigating these risks and threats.
Keywords: Information Technology (IT), Information and Communication

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Corporation Tech will face many security risks with their current network. The user domain is the single most vulnerable part of any network and as such poses the most obvious security risk. To mitigate risks involving the users is to implement policies and training to educate the user on proper use and security best practices. By educating the user on security practices such as secure passwords, safe web surfing, and securing their workstations, many potential attacks can be avoided. Policies and training are also necessary because they can be used as evidence when taking administrative action against a user or intruder in the event the system or data information is compromised.…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT1310 NFPA Codes

    • 1390 Words
    • 5 Pages

    In order for us as a person and an IT Administrator is to stay safe. History has shown the safety departments about having to write policies which are used to provide recommended practices for the design and installation of safety standards with the Telecommunications infrastructure that will support a wide variety of existing and future services, using industry accepted design and installation methods.…

    • 1390 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Ict Cousework

    • 1730 Words
    • 7 Pages

    During my coursework I will be inventing an Ict system for Mr Robert black as he has approached me to help his new catering company ‘mobile lunches 4u’. There are a few business parks around the local area where Mr Black has decided that there are opportunities for a mobile catering business, selling snacks and drinks at lunchtimes to people who work at offices in the business parks. Mr Black has been running this business for about 6 months but has had trouble keeping records of his income and expenditure. This problem has occurred because since Mr Black has started is business he wrote everything by hand, he has faced problems like he was unable to read his writing due to messy writing and this caused most data to be read wrong which meant that all the calculation were wrong. This problem is a most common problem faced by company that do everything by hand and do not use an Ict system. For this reason I decided to help Mr Black by creating an Ict system for his company mobile lunches 4u. Moreover, this Ict system will be beneficial for Mr Black because he won’t have to worry about anything being misread or any wrong calculation, this mean he will be more organised and accurate. However, this is also constructive for his company because this will allow his company to become more professional and modern. This can be an advantage because most people like to eat and go to professional places which mean more costumers that can lead to more profit.…

    • 1730 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    There are quite a few vulnerabilities that can affect organizations productivity. These vulnerabilities can be environmental, utilities & service, criminal behavior, equipment failure, and information security issues. To protect the organization against loss of productivity and data loss we have created an assessment of the potential danger each category of threat presents. We created a worksheet (located on the last page of this document) listing each type of vulnerability and ranked the probability and severity of each of the threats. Using a probability and severity legend that had one…

    • 2036 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Security + 280 Exams

    • 2838 Words
    • 12 Pages

    | (TCO 1) What is the most common threat to information security in an organization?…

    • 2838 Words
    • 12 Pages
    Satisfactory Essays
  • Powerful Essays

    In a global economy, businesses thrive with good Information technology infrastructures. Information technology plays vital roles in successful businesses. Although tools like online advertising, and e-commerce can help businesses thrive in today’s global economy. However, this paper will focus on the importance of Information security functions within Ecolab’s IT organization. Furthermore, the impacts of information security functions from a business perspective will be discussed.…

    • 1661 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Pervasive influence of information technology with penetration of computers and communication in all aspect of the workplace, it is important for a organization to keep up with the advancement of technology in the criminal justice and security agency. Technology is playing a major role in how criminals for committing crimes, which is why there has been a increase in cyber crimes because a criminal…

    • 750 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Brainia Essay FirstDraft

    • 601 Words
    • 2 Pages

    Shockingly, in today’s modern workplace, employers seemingly turn their heads to e-risk management despite the consequences. Experts claim millions of dollars are lost in productivity, computer assets, credibility and customer confidence. Is someone really watching what employees click? The Internet in the workplace causes security risks because of employee misuse, lack of employer policy and inadequate firewall systems.…

    • 601 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Internet Security Threats

    • 1630 Words
    • 7 Pages

    This paper is going to be on the different security threats on the internet, and the different ways to prevent and protect yourself from them. The different…

    • 1630 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    business plan

    • 429 Words
    • 2 Pages

    This research paper is mainly subjected on issues how the organizations overcoming the risk management. It focuses specifically on need for security, security risk from outer environment and security threats through humans. The following issues are considered for recommending different kind of security strategies, coding and decoding the security , reducing about organization security issues, developing of advance security strategy frame work. These issues are the key roles for developing the advance security in organizations and make stepping stones for security management model.…

    • 429 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Technology risks. This risk appears when Padini uses of the internet (such as online company’s website (Refer to figure 1.12 under appendixes), online distribution channel (Refer to figure 1.13 under appendixes), and so forth) in order to ensure its businesses are smoothly and efficiently operate. As everyone known, there are certain risks when using internets such as hacking or virus attacks. The main reason for the appearance of this risk is because hackers want to steal or unauthorized manipulation of company data and information.…

    • 950 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Casestudy 1

    • 2144 Words
    • 9 Pages

    It emphasizes in this chapter the importance of information security and what is the effect and causes in our work or in our organization. Today, many people and employees of an organization are engage in online activities while at work or using company technologies the create information vulnerabilities for their own organization. Gen Y employees are using “nonsanctioned IT tools while at work or using company technology include instant messaging, open source technologies, social networking sites, and many others.…

    • 2144 Words
    • 9 Pages
    Better Essays

Related Topics