Font Size: a A A

Research On Strategy Optimization Of A Security Company To Deal With Information Security Risk Under The Background Of Digitalization

Posted on:2024-08-11Degree:MasterType:Thesis
Country:ChinaCandidate:F F YueFull Text:PDF
GTID:2568307052995309Subject:(professional degree in business administration)
Abstract/Summary:PDF Full Text Request
With the development of science and technology,big data,cloud computing,AI and other technologies are widely used,and China has entered the era of digital economy.The development of digitalization brings not only dividends but also information security risks.The risk comes not only from external illegal intrusion,but also from internal illegal use.The security industry obtains and analyzes massive data every day,ensuring information security is related to the interests of individuals,enterprises,society and even the country.The state attaches great importance to legislation and has issued laws and regulations to ensure information security.The international trade situation is complex,and the state of cooperation and confrontation between China and the United States has existed for a long time.Therefore,it is necessary to elevate the information security protection problem to a strategic height and optimize the existing strategy of enterprises to maintain the sustainable development of enterprises.A Security company was founded in 2001,is a video as the core of intelligent Internet of things solutions and big data service providers,its service objects are mainly public industry government groups,enterprises and institutions and small and medium-sized customer groups,business all over the world.This study takes A security company as the research object.First of all,through investigating its information security development status,it puts forward the information security risks faced by the company.It is mainly the information acquisition compliance risk caused by the contradiction between digital development and imperfect legal system,the information transmission risk caused by the Internet sharing amplified by digital development,and the data compliance use risk caused by the contradiction between digital development and insufficient enterprise management.The causes are analyzed.Secondly,PEST analysis is used to analyze the macro environment of A security company,which provides a theoretical premise for the formulation of strategy optimization.Thirdly,SWOT analysis is used to analyze internal strengths,weaknesses and external opportunities and threats,so as to position the strategic environment of A security company.It is concluded that its current weaknesses are greater than advantages,opportunities are greater than threats,and it is in the WO state and needs to adopt a turnaround strategy.Finally,it puts forward specific implementation measures for strategic optimization,including technological innovation based on external illegal attacks,compliance management based on internal data security,business selection and improvement of business terms based on trade globalization.At the same time,from the four aspects of organization,consciousness,system and talent to formulate security measures to ensure the implementation of strategic optimization measures.Through this study,we strive to effectively avoid the current security video surveillance security construction is not systematic,there are still serious security problems,the risk brought to the enterprise;Clarify our country below current complex international situation,security enterprise strategy change and choice.Under the background of digital information security problems,not only A security company,but also thousands of security enterprises,this study aims to explore the strategic optimization scheme of security enterprises in dealing with information security risks,to help enterprises give full play to their advantages and obtain the possibility of sustainable business development.
Keywords/Search Tags:Digitization, information security, technology innovation, compliance management, strategic optimization
PDF Full Text Request
Related items