Verified Document

Technology, Marketing, And Security E-Activity Term Paper

The company is exposed to attacks because of its limited resources to maintain the defense. The company is online and is mobile connected. If it loses this benefit, it will have lost the business. It is necessary for the company to be aware of the possible threats and implement security policies to address the risks. Logical controls would be the best safeguards for the company's information system. They involve the application of data and software to control and monitor computing systems and access to information systems. For instance, network and password-based firewalls, access control lists, data encryption, and machines for detecting system intrusion. The principle of least privilege is an important safeguard, which has been increasingly overlooked. This control requires that a system, program, or individual are not granted any extra access privileges in accessing programs to surf and read emails. When individuals are granted this privilege, they might over time, violate the safeguard. This occurs when an individual is promoted, transferred or when their duties are changes (Khosrowpour, 2004).

Case Study 14.1

In order to manage a sports arena effectively, the ICT system in place needs to facilitate the ticketing process, security and emergency dispatch, standard office connectivity, capabilities of ordering inventory, security...

The most essential of these is the point of sale hardware and software that facilitate payments for events. The arena should have a point of sale that provides customers with payment options such as the EFTPOS. The arena should also have a database for managing its activities, maintaining membership, providing booking facilities, and monitoring attendance. Additionally it is necessary to have a security structure in place that ensures the facility is monitored at all times. This security equipment includes security cameras and software to monitor and store security footage. Access controls to the facility should also enhance security by providing detection of weapons and restricting unauthorized access to the facility. The incorporation of basic accounting software also becomes critical in the management of funds collected from the point of sale. The employment of necessary equipment such as computers to facilitate this and other processes are inherent to ensure the security of funds collected (Khosrowpour, 2004).
References

Fridell, G. (2007). Fair trade coffee: The prospects and pitfalls of market-driven social justice. Toronto: University of Toronto Press.

Khosrowpour, M. (2004). Annals of cases on information technology: Vol. 6. Hershey, Pa: Idea

Sources used in this document:
References

Fridell, G. (2007). Fair trade coffee: The prospects and pitfalls of market-driven social justice. Toronto: University of Toronto Press.

Khosrowpour, M. (2004). Annals of cases on information technology: Vol. 6. Hershey, Pa: Idea
Cite this Document:
Copy Bibliography Citation

Related Documents

Internet Technology, Marketing, and Security
Words: 1677 Length: 5 Document Type: Essay

Aer Lingus, 2012a () No security breach has even been recorded on the Aer Lingus website so the website can be thought to be tightly secure and that all the necessary steps have been taken to ensure that the personal information of their customers is kept safe. Methods for ensuring greater security for customers One of the ways which the company can ensure that they continue maintaining this record of security and

Internet Technology Marketing and Security
Words: 2528 Length: 8 Document Type: Term Paper

Internet Technology, Marketing, And Security Reasons why social media marketing has become exceedingly popular among businesses of all sizes Business marketing is one of the most lucrative activities that enable a business to reach out to its consumers in the market. The inherent values within business marketing are creation of awareness and traction of customer preferences and tastes towards the qualities therein in the product. Social media marketing is a recent activity

Security Monitoring Strategies Creating a Unified, Enterprise-Wide...
Words: 1131 Length: 3 Document Type: Essay

Security Monitoring Strategies Creating a unified, enterprise-wide security monitoring strategy for any organization must be based on a series of strategic goals and objectives that encompass every functional area and system of a business. The intent of this analysis is to define the objectives that must anchor a security monitoring strategy to ensure its success, followed by specific recommendations for security monitoring of each major functional area. Defining Security Monitoring Strategies For an

Marketing Research How Can a
Words: 591 Length: 2 Document Type: Term Paper

Marketing research results may either be confidential or may be posted publicly for any people to see. From the previous question, I was provided with the idea of considering whether I should make the marketing research results private or public. Communicating marketing research results may not be necessarily confidential or public. Instead, concerned individuals such as the customers and clients should be the major focus as to where marketing

Marketing Plan Aimed at Launching
Words: 3583 Length: 11 Document Type: Term Paper

On one hand, this may alter the consumers' trust in the company's products which are perceived as intangible compared with those goods that can be purchased from the shelves of specialized stores. On the other hand, resorting to intermediaries implies paying a certain commission which results in higher prices for the respective products. Moreover, the success of selling through indirect channels depends, to a great extent, on the distributors'

Marketing / Business GRADE11 Marketing / Business
Words: 936 Length: 3 Document Type: Essay

Marketing / Business Grade11 Marketing / Business Activity Activity 1: Braun Pocket Radio Entertainment has always been the most integral and essential part of lives of people regardless of the demographics, socio economical backgrounds, or age groups. The form of entertainment has evolved over a period of time with the evolution in technology. One of the most common and popular form of entertainment is music. Music lovers exist around the world and in

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now