Friday, August 9, 2019
US Ports and Cybersecurity Research Paper Example | Topics and Well Written Essays - 3250 words
US Ports and Cybersecurity - Research Paper Example Kevin Kelly1 (2011) asks this intriguing question, ââ¬Å"What does technology want?â⬠If certain aspects of the technium are preordained and certain aspects are contingent upon our choices, how do we know which are which? Systems theorist John Smart has suggested that we need a technological version of the Serenity Prayer.â⬠The serenity prayer, written and popularized in the early 1930s by theologian Reinhold Niebuhr, asks God to help in changing the things which are difficult to change or ââ¬Å"courage to change the things I can, and wisdom to know the difference.â⬠2 According to Kelly, ââ¬Å"Technology was invented from the time we were bornâ⬠. But technology is under threat every second of the day. Individual files and organizational documents and secrets are under threat of losing with the click of a finger, if we are not careful. This essay is about the many problems of technology, specifically information technology (IT) infrastructures of US ports, and how it can survive amidst threats of viruses, worms, spams, malicious software and cyber criminality. Organizations must have installed technology and IT infrastructures in their systems, otherwise, they will lag behind in the stiff competition. Organizational information systems should also have anti-viruses and other necessary protection before they see themselves vulnerable to a new kind of attack, the virus attack. Ports are one of the busiest areas for businesses around the world. With an installed IT, tasks and activities are made easier. IT enables organizations to conduct multiple operations simultaneously, but the infrastructure must be secured because without s ecurity, viruses and the various risks will make the infrastructure a mess. Ports operate a network of businesses and firms, movement and distribution, processing and many activities, which must be applied and inputted to an effective software and IT. Function IT, as it is called in the literature, refers to information systems that help improve usersââ¬â¢ functions and productivity in performing individual tasks. This important feature includes applications like computer-aided design (CAD) software, spreadsheet, word processors, and other e-learning tools and systems. In a port where ships dock and load and unload cargoes, where countless activities happen every minute and every second of the day, computers and softwares are a normal phenomenon. In a workplace where engineers constantly introduce product innovations and people depend on coordinated programs of activities, ports should have effective computer infrastructures. But there are people with criminal minds who, second b y second, devise plans to penetrate on other peopleââ¬â¢s computers, other peopleââ¬â¢s wealth, that they send viruses, worms, spam emails and malwares to the internet and destroy portsââ¬â¢ valued files. The role of the manager is significant to the attainment of the organizationââ¬â¢s goals and objectives. Managers should have good and effective rapport with employees, but they have to understand what IT is and its role in the ever changing world of business. One of the important responsibilities of the manager is to manage the companyââ¬â¢s information system. New business opportunities involving IT and the different functions of business are coming at a fast pace.3 Security awareness Studies have found that about 90% of organizations face information security investigation almost annually.4 Organizations have made moves to improve their information management systems and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.