AllFreePapers.com - All Free Papers and Essays for All Students
Search

Security Monitoring

Autor:   •  July 14, 2012  •  Research Paper  •  493 Words (2 Pages)  •  1,170 Views

Page 1 of 2

Security Monitoring

CMGT/442

Lisa Schultz

July 7, 2012

University of Phoenix

Introduction

One of the biggest concerns in today’s society relates to security in internal IT and e-commerce applications. Security is handled by passing and transactions between client browser and Internet server entering a secure site. The client browser is passed a public key by which transactions between client, and the web is encrypted. The process of monitoring security plays a vital function in any organization’s computer use both internally and externally.

Security Organization

Within a secure organization the business structure can cover a system of financial control, such as payroll, human resources, inventory, and general ledger vary the variety of agencies of the organization may be enhanced. Vulnerabilities in organizations will diminish, staff may be eliminated and so will duplications of work within departments, monetary information can stay secure, and most customer service may be better.

Internal IT

Internal IT is a beneficial service such as, compliance with federal and state laws, add valve to an organization’s internal control. Safeguarding the organization assets, and risk management just to name a few, mainly deals with computer applications monitors and manages employee’s activities, for instance it more of a help desk, side services, or a desk-side service infrastructure and application support. The computerized information system uses automated procedures to report transactions, and initiate records. As any applications there are some risks to be considered such as, identify thefts, secret misappropriation viruses, money thefts, and worms.

Security monitoring activities for Internal IT

Information and Communication, Management Oversight, and the Control Culture, Monitoring, Risk Assessment, Evaluation, and Control Activities are classifications of internal

...

Download as:   txt (3.7 Kb)   pdf (71.9 Kb)   docx (11.4 Kb)  
Continue for 1 more page »