Security Monitoring
Autor: boss38 • July 14, 2012 • Research Paper • 493 Words (2 Pages) • 1,264 Views
Security Monitoring
CMGT/442
Lisa Schultz
July 7, 2012
University of Phoenix
Introduction
One of the biggest concerns in today’s society relates to security in internal IT and e-commerce applications. Security is handled by passing and transactions between client browser and Internet server entering a secure site. The client browser is passed a public key by which transactions between client, and the web is encrypted. The process of monitoring security plays a vital function in any organization’s computer use both internally and externally.
Security Organization
Within a secure organization the business structure can cover a system of financial control, such as payroll, human resources, inventory, and general ledger vary the variety of agencies of the organization may be enhanced. Vulnerabilities in organizations will diminish, staff may be eliminated and so will duplications of work within departments, monetary information can stay secure, and most customer service may be better.
Internal IT
Internal IT is a beneficial service such as, compliance with federal and state laws, add valve to an organization’s internal control. Safeguarding the organization assets, and risk management just to name a few, mainly deals with computer applications monitors and manages employee’s activities, for instance it more of a help desk, side services, or a desk-side service infrastructure and application support. The computerized information system uses automated procedures to report transactions, and initiate records. As any applications there are some risks to be considered such as, identify thefts, secret misappropriation viruses, money thefts, and worms.
Security monitoring activities for Internal IT
Information and Communication, Management Oversight, and the Control Culture, Monitoring, Risk Assessment, Evaluation, and Control Activities are classifications of internal
...