A Study On IT Security Essay

Question:

Discuss about the A Study on IT Security.

Answer:

Introduction

Apple Inc. is the leader among technology companies throughout the world and has the best and brightest brains working for the development of software, consumer’s electronics, smart phones, computers and more. Today, Apple is known for its security and its privacy matters. The latest feud between the FBI and the Apple Inc. has highlighted the company’s footing on the topic of security and privacy value. With millions of people investing in the Apple’s software and electronics, it surely applies that the company should also invest in proper security and services that are associated with the company. The company’s strict policy requires that the company members are strict about what information they share to the outside worlds. It includes the various aspects that are important for the growth and development of the company. Being the leader in information technology it is quite obvious that other companies look up to Apple for the benchmark in security as well as from the technology standpoint it makes it important for the company to keep its reputation as a strict follower and also a company which takes security as an important matter (Lashinsky, 2014).

Apple Inc is still the largest American com play that deals with technology and the development of new technologies. The company has been a rebel since the time it went live, focusing on new ways to evolve and innovating its services it is to be noted that the company is still the leader among the technology companies and through many small breaches have been made mostly Apple has made itself clear that it would make all necessary ways to create and maintain its status as a company that's dedicated towards security. The unprintable of the company's core values suggest that the company makes all possible ways to get to the optimum value of their services. But with more and more threats being made against the company it is true that the company should look into more ways to deal its security systems more dependable and ensure that no more such breaches are made (Schuler, 2000).

The Current Security Situation of your Selected Organization

The current security condition of Apple is stable as it has already mended the problems that have been known to create security problems earlier. The most of the matter has been updated through more rigid systems that are created using the new standards of the security measures which ensure that the product details are not leaked any more. The more amount of money is issued for the same purpose of security and thus it has been seen that the present condition with the changes applied the company has seen no more breaches. But leaking of product information and design has to be prevented in the future, today everyone has a Smartphone to carry with themselves at all point and clicking a picture is as easy as a second’s whim. To control that secret designs and techniques do not travel outside it is important for the people of the Apple Inc. to create better security, erasures (Johnson, 2012).

What the Research Paper is About?

The research paper highlights the many security problems that is being faced by the apple community and has been slowly addressed as the time passes. The most interesting part is that there have been an unsaid decorum within the community of workers at Apple who believe in the secrecy of their work yet there are people who will disregard their professional oath as well as the various problems that might be associated with leaking confidential designs and specification details but they do it for money. In this paper we highlight the various problems faced by apple and how the future company watts to handle the said situation. There are important roles for the people associated with looking after the product security as well as intellectual product security within Apple (Testa, 2006) The Company employs the best of the talents and is among the best and the most challenging workplaces to work in, but there is surely a better way to handle the security. Stringent measures are needed to look after the various problems that are associated with the high performing company like Apple. Such is the power of the Apple Inc. that it has won battles against the federal justice system which provides it ample backing it take certain measures to ensure that the intellectual property of their corporation does not learn the premises and does not become the asset of someone else (Testa, 2006)

In the below research paper much has been said about the various security breaches concerning Apple Inc. These breaches have been a result of poor security or have been caused by people within the community. Though nearly impossible, the community does have its share of people who are not sure about the amount of secrecy that is needed to keep all the information perceived by the people working at the corporation (Lunenburg, 2010).

Body Context

Apple is a company that's involved in the innovation of some of the industry leading products and services which have been the benchmark standard for multiple years. The innovation and looks apart, something which has been the reason why the Apple products are so largely accepted and used is the importance of privacy and security of using an Apple product. The apple system is associated with the properly secure system of operating. The large Apple Inc. company has a great number of people working under the company to understand the importance for security and be true to their oath towards a secure work field. In order to create a good security program it is important that it should reflect back on important aspects like the roles that are currently included and also the roles and titles of the various people associated with the security. There is ample scope for development of the security aspect within the company. In the last few years there have been various cases where the much hyped about and secret designs of the upcoming products have been leaked, either through the invasion from external sourced to the internal information. The security breaches and the spillage of intellectual property on the internet should be ample reason for creating a better and more rigid security system.

Apple’s internal security system is a close knit system which is held together by the oath of secrecy taken by each member of the team. Top development team as well as other members is trained to not disclose any details that is associated with the company’s innovation or can disclose facts about the company’s development of innovative products (Prantor, 2015).

Apple has been closely guarding its intellectual properties and deems it the most important security concern. With millions of people ready to take a peek into the ongoing product development, Apple has been always under constant pressure from media to disclose the details. The employees too are immensely pressured for the safekeeping of the intellectual property. The employees at Apple are habituated with the security system that’s in effect now which ensures that there are no ways for information leak. The recent Samsung legal battle made it possible for Apple to secure its innovation and technology and also incurred fines from the said competitor. In a company as large as Apple, there are multiple issues that can and need to be addressed.

Over the years, the secure system of the Apple has been penetrated multiple times by external forces resulting in breach of security, theft of information and creative content. There are many security programs in effect at the Apple Inc. development centers for the aid of the employees but there are very less options for any breach of information. Still information has been transferred from within the corporation to the outside world and in many cases the media. The suppliers have been benefitted monetarily or through other compensation methods for supplying the information. This requires that Apple make sure that leaving employees as well as the present employees are bound into a professional secrecy bond which would prohibit them from sharing sensitive information about the company with the outer world. The company is also liable for ensuring that there are no ways for the employees to carry information about the new technologies outside (Mostovicz, 2015).

The people who come in contact with the products or technologies who are not the original workers of apple should also be targeted and trained to contain the information properly (Kutsar, 2014).

Overall Security Program

The Security as the Apple Inc. is quite stringent with encryption which is military grade and which helps the different layers of information in the various sources to get transported digitally and through the different medium without being hacked. But there have been problems with it too. Since the inception of the company, the most important person in the History of Apple, Steve Jobs was highly interested in creating a secure phone which ensures that the persons associated with its usage are all protected from the prying eyes of the other users, or the government. The privacy and security of the customers have been an inseparable part of the culture of the company which it still riders important and ensures that all its devices are compliant of its privacy and security measures (Andolsek, 2013).

While there are instances of the company letting it’s users down, it has accepted its mistakes and recovered itself in all situations. The main aspect of the recovery of the company is trusted to the innovative designs and its customer centric way of working. Interested in giving customers the easies t and safest way of doing anything makes them the best solution to any problems. Also with so many ways to increase sales it has not let security measures take a toll. Been today the Apple/s security is a benchmark of the category and ensures that the users not only have their data secured by also backed up for easy access. The various measures are taken for the safety of the intellectual properties within the Apple and the company takes ample measures to keep itself at the top of the innovation chart ensuring that there is no breach of security (Andolsek, 2013).

The Security as the Apple Inc. is quite stringent with encryption which is military grade and which helps the different layers of information in the various sources to get transported digitally and through the different medium without being hacked. But there have been problems with it too. Since the inception of the company, the most important person in the History of Apple, Steve Jobs was highly interested in creating a secure phone which ensures that the persons associated with its usage are all protected from the prying eyes of the other users, or the government (Griffin, 2009). The privacy and security of the customers have been an inseparable part of the culture of the company which it still riders important and ensures that all its devices are compliant of its privacy and security measures. While there are instances of the company letting it’s users down, it has accepted its mistakes and recovered itself in all situations. The main aspect of the recovery of the company is trusted to the innovative designs and its customer centric way of working. Interested in giving customers the easies t and safest way of doing anything makes them the best solution to any problems. Also with so many ways to increase sales it has not let security measures take a toll. Been today the Apple/s security is a benchmark of the category and ensures that the users not only have their data secured by also backed up for easy access. The various measures are taken for the safety of the intellectual properties within the Apple and the company takes ample measures to keep itself at the top of the innovation chart ensuring that there is no breach of security (Limited ,Red Pixels Ventures , 2016).

Professional Plan of Training Requirements

There will be a large requirement for the training of the new staff for the new and more stringent security systems. There should be enough time for the staff to understand ad apprehend the changes they will face in the coming days in order for the system to work properly there will be a need for the administrators and the Chief Security Officer to jointly create a plan to educate and provide the information about the new processes and the new notions. The main aspect for this has been achieved by the fact that the there is a need for proper training of the staff and other workers how are associated with the company. The company requires it’s all workers to be properly knowledgeable and know the various limits that are posed upon the, people and they should be made aware of the new ways utilize the existing systems and also reap maximum the benefits of the new systems. The changes in administration and planning should be properly notified to the people concerned for better results. This can also be done with applying certain rules and limitations which ensures that not everyone has equal rights to the information especially sensitive information that can be used against the company. The main impact of this will be seen among the less option for people to leak information or become s treat to the security to the compact or its assets, Another important aspect is to be noted that also keeping a check on the people who are being involved with the development of approdict should be selected carefully and after checking every aspect of their personality to ensure that they adhere to the terms mentioned to them at the time o joining of the durries. They should be able to handle their professional oath of secret and should not give in to the media (Adams ,Susan , 2015).

ISO Security Standards

The ISO 27001system compels the standard for the security of the company and the standards that the company should maintain in order to attain and keep up with the market standers. The company Apple Inc. should try to attain and even cross the benchmarks set by the international governing bodies. The security standards allow the company t assess he minimum requirements for the company to attain the minimum skills (Johnson, 2012).

Information Security Certifications

There have been many security concerns that have made Apple’s integrity and security systems under the microscope. There have been multiple cases where Apple has been unable to provide proper explanation for the security breaches within its esteemed iOS software. Also there have been multiple cases of information leak. The apple inc has been fast to comprehend the situation by improving its security as well as subjecting its system to a multiple of Security Certifications which have given them back their states as a safe software which prevents information loss and theft for the company and the esteemed users of the company’s products. The Apple’s main focus has been with privacy and with the latest few security breaches, the same took a hard hit when there have been multiple cases of information leak (Isaacson, 2011)

Risk Assessment

There are multiple risks associated with the inclusion of new terms for the Security systems for Apple. The main reason for this is that the huge amount of staff is required to be trained and informed about the change of the systems and features. The most important aspects of the change of security is that there should be more control over what the staff can share about their workplace and how much they should be informed . Being always under the media’s gaze, it is important that the people involved are always informed about the treats and the bindings they have about the information about the company and its innovative parody’s. Serious assessment should be done as to what the impacts of the new system could be for the better assessment of the problems that can be created with the new use of products and security services (Nonaka, 1991).

Conclusion

The Apple Inc. is a company that's dedicated to the safety and security of its users. The main issue associated with Apple is that it requires improving its security for better and industry leading standards. The internal security system of Apple is also quite serious as the company follows strict intellectual and creative security measurements as to the betterment of the company. Apple believes that the employees get paid to work and innovate for the company, so the details and information is only the company's to explore and no employee can share it with anyone, not even their spouses. This makes it important that the company includes a high and advanced intellectual property rights and security. The fleet of 66,000+ employees as on 1st January 2015 is needed to be protected and officered the multinational company in order to make use of a proper security plan and proceed on the steps laid out by the plan. Only through improved planning, better innovation and better security systems, apple will be able to protect its creativity, its innovations and progress into the development of new and better products. In this age of security, being integral in the approach and ales being a step ahead in time is required to attain the best solutions. The company surely needs to focus on keeping their customer happy and content; also there is a need for more stringent security systems and far more strict terms for workers with respect to the leak of information.

References

Adams ,Susan , 2015. Is Apple The World's Most Innovative Company?. [Online]
Available at: www.forbes.com/sites/chrismyers/2016/06/29/take-it-from-hamilton-why-unyielding-ambition-is-a-blessing-and-a-curse-for-entrepreneurs/#9c5671f644ba
[Accessed 01 July 2016].

Andolsek, D. M., 2013. Human Resource Managers and Employees’ Rights, s.l.: Emerald Group Publishing Limited.

Griffin, R. W., 2009. Management’ Houghton Miffin Company, New york: Library of Congress.

Isaacson, W., 2011. Steve Jobs. illustrated, reprint ed. s.l.:Simon and Schuster.

Johnson, K., 2012. The Innovative Success that is Apple, Inc.. The Wall Street Journal, pp. 1-42.

Johnson, K., 2012. The Innovative Success that is Apple, Inc.. The Wall Street Journal, 3(1), pp. 1-43.

Kutsar, V., 2014. Leadership Analysis Using Management Tools: Steve Jobs. American International Journal of Contemporary Research .

Lashinsky, A., 2014. Inside Apple: How America's Most Admired-And Secretive-Company Really Works. s.l.:Business Plus.

Limited ,Red Pixels Ventures , 2016. APPLE PHONES. [Online]
Available at: gadgets.ndtv.com/mobiles/apple-phones
[Accessed 01 July 2016].

Lunenburg, F. C., 2010. The Interview as a Selection Device:Problems and Possibilities. International Journal Of Scholarly Academic Intellectual Diversity.

Mostovicz, E., 2015. A Dynamic Theory of Leadership Development, s.l.: Leadership & Organization Development Journal.

Nonaka, I., 1991. Towards a new theory of innovation management:A case study comparing Canon, Inc. and Apple Computer, Inc. Journal of Engineering and Technology Management, 8(8), pp. 67-83.

Prantor, N., 2015. Working with and leading people, s.l.: Field Guide to Case Study Research in Tourism, Hospitality and Leisure.

Schuler, R. S., 2000. The internationalization of human resource management. Journal of International Management, pp. 239 - 260.

Testa, J., 2006. The Thomson Scientific journal selection process. International Microbiology , pp. 135-138.

How to cite this essay: