Professional Documents
Culture Documents
Advanced Technology Has Introduced Advanced Framework Which Have Been Applied in Major Industry - Edited
Advanced Technology Has Introduced Advanced Framework Which Have Been Applied in Major Industry - Edited
IT security change
Student name
Professor
Course
Date of submission
IT SECURITY CHANGE 2
Advanced technology has introduced a sophisticated framework that has been applied in
the primary industry. Security infrastructure is one of the essential benefits of advanced
processes. Firms and organizations have, therefore, structured and introduced new techniques in
the security sector. On the broader scope, change is depicted in evaluations, analysis, and
security approved mechanisms and denied security infrastructure. Despite the significant
advantage of the entire process, there is a wide range of threats, risks, and challenges that have
First, some organization has adopted changes that are not approved by the international
standard organization and the national institute of technology. In this case, they have managed to
comply with the existing law, and thus the change lacks merit. The organization has suffered
from adopting the wrong system because of the weak market research versus the cause of
purchase. Some of the security systems available in the market have bot attained the threshold.
Consequently, the principle of data management has not been achieved. It puts then the
organization is a risk of data exposure and risk of manipulation (Mohr et al., 2010). On the same
note, the adoption of an advanced security system has come along with application and security
algorithms. Hackers have, therefore, developed vulnerabilities that Fraud attack, manipulate,
Advanced security has introduced database and cloud computing as part of enhancing
compliance and security. Technological integration, upgrading, and management of the security
framework resources require a tremendous amount of capital that is always a challenge. When
the organization has taken database and security processes to the cloud, they cannot account.
IT SECURITY CHANGE 3
Other related problems include employee turnovers because of reduced technical knowhow.
Lastly, some security techniques, such as biometrics, fingerprint prints, and voice are affected by
References
1910. https://doi.org/10.2175/193864711802713036
15. https://doi.org/10.33642/ijbass.v5.n3p1