Friday, April 26, 2019
US Ports and Cybersecurity Research Paper Example | Topics and Well Written Essays - 3250 words
US Ports and Cybersecurity - Research Paper ExampleKevin Kelly1 (2011) asks this intriguing question, What does engineering indispensability? If certain aspects of the technium be preordained and certain aspects are contingent upon our choices, how do we know which are which? Systems theorist can Smart has suggested that we need a technological version of the Serenity Prayer. The serenity prayer, written and popularized in the earliest 1930s by theologian Reinhold Niebuhr, asks God to help in ever-changing the things which are difficult to transform or courage to change the things I can, and wisdom to know the difference.2 According to Kelly, Technology was invented from the sentence we were born. But technology is under threat every second of the day. Individual files and organizational documents and secrets are under threat of losing with the click of a finger, if we are not careful. This essay is about the many problems of technology, specifically information technology (IT) foots of US ports, and how it can survive amidst threats of computer viruses, worms, junk e-mails, malicious software and cyber criminality. Organizations must agree installed technology and IT infrastructures in their systems, otherwise, they will lag behind in the stiff competition. Organizational information systems should also train anti-viruses and other necessary protection before they see themselves vulnerable to a new kind of attack, the virus attack. Ports are one of the busiest areas for condescensiones around the world. With an installed IT, tasks and activities are do easier. IT enables organizations to conduct multiple operations simultaneously, but the infrastructure must be secured because without security, viruses and the various risks will make the infrastructure a mess. Ports operate a net profit of businesses and firms, movement and distribution, processing and many activities, which must be applied and inputted to an effective software and IT. Function IT, as it is called in the literature, refers to information systems that help improve users functions and productivity in performing individual tasks. This important throw includes applications like computer-aided design (CAD) software, spreadsheet, word processors, and other e-learning tools and systems. In a port where ships dock and load and drift off cargoes, where countless activities happen every minute and every second of the day, computers and softwares are a normal phenomenon. In a workplace where engineers constantly introduce product innovations and people depend on coordinated programs of activities, ports should learn effective computer infrastructures. But there are people with criminal minds who, second by second, excogitate plans to penetrate on other peoples computers, other peoples wealth, that they send viruses, worms, spam emails and malwares to the internet and destroy ports valued files. The role of the manager is significant to the attainment of the organizat ions goals and objectives. Managers should urinate good and effective rapport with employees, but they have to understand what IT is and its role in the ever changing world of business. One of the important responsibilities of the manager is to manage the companys information system. New business opportunities involving IT and the different functions of business are coming at a fast pace.3 Security awareness Studies have found that about 90% of organizations face information security investigation almost annually.4 Organizations have made moves to improve their information management systems and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.