Information Technology: Issues of Trust

Introduction

Computer and information systems play a major role in the operations of any given organization. However, trust is an imperative component in ensuring the effectiveness and reliability of their use in the organization. A possible internet security threat is obvious if an inappropriate strategy of controlling their use is not implemented. This is because many people are involved, either employees within the organization or experts in installing hardware and software, programming, and system design.

Proper precautions have to be undertaken because of the involvement of many people in setting up and using information systems. Therefore, besides using these precautions educating and training users on the management of internet security risks is essential. In addition, transparency and communication enable a sustainable trust to be built in minimizing information technology security risks and interruptions of the systems.

Security Defenses against Internet-Based Attack

As more people and businesses move online, it is obvious for their information to be stored in computer databases. Hence, some companies have established themselves in harvesting this information, which in turn can be used in an unethical manner such as; terrorism, hacking, financial stealing among other crimes (Stanford, 2003). In asserting and safeguarding information, an organization has to institute various security strategies.

One of the e-security appropriate is installing up to date antivirus programs. Antivirus is important software that scans incoming and outgoing mails (Stanford, 2003). They also scan computer memory to ascertain if there is a change in pattern in program files, which might be an indication of virus infections. When a virus is detected, the antivirus automatically removes it, thus safeguarding your information. Another important security measure is choosing and protecting passwords (Stanford, 2003). Password provides an effective security measure while online. Password should be carefully be designed, hence. It should be based on individual private information, should be designed using a combination of both special characters, numbers, and letters. Careful design of passwords enhances one’s security on the internet.

Management of Information Security

Implementation of effective preventive measures to information technology vulnerabilities serves to promote the velocity of any organization through trust. Simply, because systems are in place to empower appropriate conduct among employees without infringing on anyone’s privileges or rights.

Minimizing emerging internet threats should be through an installation of encryption services, firewall configurations, appropriate software to block viruses, and setting up organization procedures and policies to guide employees in the organization. According to Chen et al (2004), these play a key role in governing the organization’s values and practices to uphold integrity, trust, and good conduct. Besides, individuals online should take precautionary measures, which can protect them from e- based security. Security measures such as; visiting trusted e-sites, avoiding downloading suspicious files, and ensuring that they don’t disclose personal or sensitive information such as; credit cards, telephone numbers, and their identity (Lee et al, 2002).

Role of Trust, Transparency, and Controls in Information Security Design

Trust, transparency and control are fundamental in enhancing the security concerns of an organization. Proper communication strategies create conscious leadership and responsive employee hence building trust and transparency. Proactively involving all stakeholders in information security design without necessarily revealing too much information is vital. With the invaluable contribution by internet users to give feedback and in demonstrating competency in an enabling environment most people tend to take responsive action (Chen et al, 2004). For example, reporting security-relevant issues, some will recommend the adoption of new and effective security procedures.

Creating physical space in an organization is significant in providing privacy to protect integrity, and confidentiality, especially among its avid users (Lee et al, 2002). Conveying basic information like authorizing individuals with passwords for work to be done is a priority to data administration. This helps to strengthen trust and build transparency. The organization’s response to any data breach should be fair and accountable for one’s action to model security conscience believes and practices at all levels from the information technology managers to the users (Lee et al, 2002). Transparency ensures a participatory approach in responding to phishing attacks or any online fraud without necessarily alienating anybody and without compromising any network protocol and security.

Information Technology Resources in Management of Information Security

The reliance on IT systems and its rapid growth makes it possible for good business to thrive but also more fraudulent schemes are on the increase. Therefore, management, control, combating of fraud and theft-related system breaches is important. Creating awareness of the organization’s policies, procedure, and network protocol give guidelines on effective control measures. For example, a very loyal employee might leave his or her computer in a place that is not secure where fraudsters might assess it.

According to Lee et al (2002) security management practices such as training or general information on the importance of using and changing setup passwords regularly is a way of managing unauthorized access to crucial organization’s data. Information on how to identify email threats, viruses, or cyber terrorism protection and control password distribution even among friends helps in an organization’s ability to protect itself from Internet-based attacks (Chen et al, 2004). This serves to protect the integrity, and the company’s processes before any bleach occur and ensure they actively update their automated user operating systems.

Conclusion

The use of Information technology is fundamental in affecting the performance of tasks of an organization. However, this continued reliance on computer systems creates loopholes in the integrity and trust among users as network threats emerge. Communication and transparency, education, and the implementation of control measures to manage accessibility and eliminate excess privileges among users are very important in creating a high-trust organization.

References List

Chen,L., Longstaff, A. T., and Carley, M. K., (2004).The Economic Incentives Of Providing Network Security Services On The Internet Infrastructure, Journal of Information Technology Management. (XV), pp. 3-4.

Lee, W., Fan, W., Miller, M., Stolfo,S., and Zadok, E. (2002) Toward cost-sensitive modeling for intrusion detection and response. Journal of Computer Security (10), pp.1-2.

Stanford, S. (2003) Containment of Scanning Worms In Enterprise. Networks. Journal of Computer Security.

Cite this paper

Select style

Reference

Premium Papers. (2024, February 6). Information Technology: Issues of Trust. https://premium-papers.com/information-technology-issues-of-trust/

Work Cited

"Information Technology: Issues of Trust." Premium Papers, 6 Feb. 2024, premium-papers.com/information-technology-issues-of-trust/.

References

Premium Papers. (2024) 'Information Technology: Issues of Trust'. 6 February.

References

Premium Papers. 2024. "Information Technology: Issues of Trust." February 6, 2024. https://premium-papers.com/information-technology-issues-of-trust/.

1. Premium Papers. "Information Technology: Issues of Trust." February 6, 2024. https://premium-papers.com/information-technology-issues-of-trust/.


Bibliography


Premium Papers. "Information Technology: Issues of Trust." February 6, 2024. https://premium-papers.com/information-technology-issues-of-trust/.