Date Posted: 4/24/2012 11:48:17 AM
Posted By: SimonMburu Membership Level: Silver Total Points: 838
Security is a very vital part of any Information Communication Technology project but for many Kenyan ICT projects, developing security functionality mostly comes last. Example, a new hotel management system will mostly likely be designed with the requirements of important stakeholders in mind like management, chefs, and suppliers.Very little or no effort will be considered on making the system secure, this is because the rush in finalizing and implementing the project on time is paramount.As far as security is concerned ICT projects should be understood as business projects and security of the same impact should be treated with equal importance. These projects should be taken with the same seriousness as consumer product company would take in developing a marketing project.The following reasons illustrate why these projects desperately need security measures that will determine the project's success.Security access:A good project should incorporate well established security access measures. People accessing the systems should first pass through a stiff security check before granted the access to the system in order to keep unauthorized personnel at bay.Many unauthorized users:The last minute rush to establish security measures in these systems allows many users, example, programmers to access the system hence compromise the security of the organization's information. Hackers are very alert in identifying and exploiting these flaws.Compromised data security:The security of important information is at stake when many users have the ability to access the system. ICT project managers should therefore aggressively enforce the business need of information security in these projects.
Next: Reasons for reduced education quality in kenyaPrevious: Common types of cybercrime affecting banks in Kenya