To cater for the different needs analyzed including cyber attacks Sony has an

To cater for the different needs analyzed including

This preview shows page 5 - 7 out of 7 pages.

To cater for the different needs analyzed including cyber-attacks, Sony has an established Information Security and Privacy organization whose head is the Chief Information Security officer (CISO) .The Company has also formed global information security policies and standards to safeguard information. These policies clearly define practices and procedures that are followed by the I.T personnel. Device identifiers are used to identify unauthorized users and Monitoring
Image of page 5

Subscribe to view the full document.

TECHNOLOGY 6 the use of SCA websites from information collected to identify cases of fraud, prevent abuse and prosecute potential threats to those misusing the website. The I.T department should enforce a good and secure architecture framework, hire and retain the right staff. Use critical controls such as malware defenses, monitoring (tracking technologies such as web beacons and encryption), protecting personal information and limiting the amount of information received by people all departments. Additionally, the four tools of assessment should be utilized and training programs are held to raise awareness and improve level of security and protection of employee and customer information. Conclusion Conclusively, Sony is a multibillion company that maximally uses technology to come up with innovative products and services attracting many people. The I.T department plays a key role in ensuring security of the information systems. Therefore, through the departmental manager, should analyze and assess the discussed business needs, and take up their roles and responsibilities seriously to achieve profits. Apart from the measures suggested, it is also important to take hardware and software inventories, limit administrative permissions and automate systems that monitor networks. These measures help in knowing what is connected to its networks and running through it. At the same time, they highlight on who is capable of bypassing, overriding or changing network security settings giving the organization up to date information. The sensitive department should also comprise of the right people, with skills and connections guided by the right attitudes. This will set as an example for other international companies.
Image of page 6
TECHNOLOGY 7 References Grundy, T. (2006). Rethinking and reinventing Michael Porter's five forces model. Strategic Change , 15 (5), 213-229. MacKechnie, C. (2013). Information Technology & Its Role in the Modern Organization. Small Business . Mintzberg, H. (2003). The strategy process: concepts, contexts, cases . Pearson education. Pickton, D. W., & Wright, S. (1998). What's swot in strategic analysis? Strategic change , 7 (2), 101-109. Recklies, D. (2006). PEST Analysis. Sarrazin, H., & West, A. (2011). Understanding the strategic value of IT in M&A. McKinsey Quarterly , 12 (1), 1-6.
Image of page 7
  • Fall '16

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask You can ask ( soon) You can ask (will expire )
Answers in as fast as 15 minutes