International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 1 | Views: 225 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science and Information Technology | Kenya | Volume 11 Issue 2, February 2022 | Popularity: 5.2 / 10


     

Security Measures for Protecting of Information Technology Assets

Masese Nelson


Abstract: Information systems security is very important to help protect against this type of theft. Organizations are especially vulnerable hence there is need to have appropriate measures to protect the information technology assets. The objectives of this paper include. To review risk mitigation measures and To identify techniques used to safeguard information assets Methods/Statistical analysis: Primary data was used drawn from mobile social users in Nairobi and Mombasa Counties in Kenya.481 respondents, both descriptive and inferential statistics was used to analyze the data. Findings: From the study it was found out that user education is important to safeguard information technology assets the study indicated that 65.6% of the respondents agreed user education can mitigate threats and risks. Further 62.3% who emphasized that authentication of various users is also important to safeguard the information technology assets. The study findings indicated that 73.8% of the respondents acknowledged encryption protects data from unauthorized access recommendations there is need to explore digital forensics security so that to enhance the security of information technology assets.


Keywords: Security, Mitigation, Measures, Information Technology, Techniques


Edition: Volume 11 Issue 2, February 2022


Pages: 401 - 405


DOI: https://www.doi.org/10.21275/SR22129224133



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Masese Nelson, "Security Measures for Protecting of Information Technology Assets", International Journal of Science and Research (IJSR), Volume 11 Issue 2, February 2022, pp. 401-405, https://www.ijsr.net/getabstract.php?paperid=SR22129224133, DOI: https://www.doi.org/10.21275/SR22129224133



Similar Articles

Downloads: 0

Review Papers, Computer Science and Information Technology, Qatar, Volume 11 Issue 12, December 2022

Pages: 189 - 197

Quran Ontology: Review on Recent Research Issues

Rasha I. Ahmed, Mohamed H. Sayed, Talaat M. Wahbi

Share this Article

Downloads: 0

Research Paper, Computer Science and Information Technology, India, Volume 12 Issue 3, March 2023

Pages: 900 - 903

Web Mining

Sunkara Nagasivaanjaneya Reddy, R. Nagarjuna Yadav, Alka Choksi

Share this Article

Downloads: 0

Analysis Study Research Paper, Computer Science and Information Technology, United States of America, Volume 13 Issue 6, June 2024

Pages: 579 - 584

Advanced Machine Learning Techniques to Improve Genomic Data Accuracy for Precision Medicine

Neha Dhaliwal

Share this Article

Downloads: 0

Informative Article, Computer Science and Information Technology, India, Volume 12 Issue 4, April 2023

Pages: 1936 - 1940

Zero Trust Network Segmentation

Anvesh Gunuganti

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science and Information Technology, Nepal, Volume 11 Issue 1, January 2022

Pages: 613 - 618

Cyber Security, Big Challenges in Nepal and E-Governance

Dr. Shailendra Giri, Resham Giri

Share this Article



Top