Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Running Head: IT SECURITY CHANGE 1

IT security change

Student name

Professor

Course

Date of submission
IT SECURITY CHANGE 2

Change Management Process for IT security.

Advanced technology has introduced a sophisticated framework that has been applied in

the primary industry. Security infrastructure is one of the essential benefits of advanced

processes. Firms and organizations have, therefore, structured and introduced new techniques in

the security sector. On the broader scope, change is depicted in evaluations, analysis, and

security approved mechanisms and denied security infrastructure. Despite the significant

advantage of the entire process, there is a wide range of threats, risks, and challenges that have

faced the security sector (Caliskaner et al., 2011).

First, some organization has adopted changes that are not approved by the international

standard organization and the national institute of technology. In this case, they have managed to

comply with the existing law, and thus the change lacks merit. The organization has suffered

from adopting the wrong system because of the weak market research versus the cause of

purchase. Some of the security systems available in the market have bot attained the threshold.

Consequently, the principle of data management has not been achieved. It puts then the

organization is a risk of data exposure and risk of manipulation (Mohr et al., 2010). On the same

note, the adoption of an advanced security system has come along with application and security

algorithms. Hackers have, therefore, developed vulnerabilities that Fraud attack, manipulate,

alternate, and destroy the security architecture adopted.

Advanced security has introduced database and cloud computing as part of enhancing

compliance and security. Technological integration, upgrading, and management of the security

framework resources require a tremendous amount of capital that is always a challenge. When

the organization has taken database and security processes to the cloud, they cannot account.
IT SECURITY CHANGE 3

Other related problems include employee turnovers because of reduced technical knowhow.

Lastly, some security techniques, such as biometrics, fingerprint prints, and voice are affected by

nature and can cause a denial of service (Thiagarajan, 2010).


IT SECURITY CHANGE 4

References

Caliskaner, O., Celeste, S., & Bennett, B. (2011). Comparison of three filtration Technologies to

meet tertiary level discharge and unrestricted reuse requirements. Proceedings of the

Water Environment Federation, 2011(15), 1899-

1910. https://doi.org/10.2175/193864711802713036

Mohr, J. J., Sengupta, S., & Slater, S. F. (2010). Marketing of high-technology products and

innovations. Pearson Prentice Hall.

Thiagarajan, S. (2019). Challenges faced by micro and small businesses in Belize. International

Journal of Business and Applied Social Science, 1-

15. https://doi.org/10.33642/ijbass.v5.n3p1

You might also like