PROJECT TOPICS || HIRE A WRITER || DOWNLOADS || CONTACT US


Information Technology and Business Security in Automobile Companies in Nigeria

Abstract 

This study was on information technology and business security in automobile companies in Nigeria. The study uses the following objectives to determine the work: To ascertain the relationship between IT and business security in automobile companies in Nigeria and to ascertain the roles IT play in business security in automobile companies in Nigeria. The study find out that there is a great relationship between information technology and business security in automobile companies in Nigeria. Consultation should be encouraged between the automotive industry bodies for which automotive cyber security is, or should be, an agenda issue, and those professional bodies and associations in non-automotive sectors that are already engaged in cyber security awareness building.

Chapter one

Introduction

1.1Background of the study

Technology has been defined as “systematic knowledge and action, usually of industrial processes but applicable to any recurrent activity”. In providing tools and techniques for action, technology at once adds to and draws from a knowledge base in which theory and practice interact and compact. At its most general level technology may be regarded as definable specifiable way of doing anything. In other words, we may say a technology is a codified, communicable procedure for solving problems. Technology, Manfred Kochen observed, impacts in three stages. First, it enables us to do what we are now doing, but better, faster and cheaper; second, it enables us to do what we cannot do now; and third, it changes our life styles. Information technology is a recent and comprehensive term, which describes the whole range of processes for generation, storage, transmission, retrieval and processing of information (http://www.egyankosh.ac.in/bitstream)

Accurately securing your business from physical and data threats can help minimize risks from thefts or physical violence. Workplace violence, corporate espionage, identity theft issues and privacy requirements necessitate ensuring your business is safe on multiple fronts.

Security refers to the capability of a product, i.e., IS, to protect data and information against the unauthorized access by persons or systems that have intention to harm it.  Identification of the security requirements is  typically  performed  only  after  the business  process  has  been  defined.  Furthermore,  it  is  observed   that  security considerations often  arise  most  usually  during  implementation or maintenance stages. Firstly, this means that security engineers get little feedback about the need for system security.  Secondly, security  risks are  very  hard to  calculate:  security-critical  systems are characterised  by  the  fact  that  the  occurrence  of  a  successful  attack  at one point in time  on  a  given  system  increases  the  likelihood  that  the  attack  will  be  launched subsequently  at  another  system  point.  This  is  a  serious  hindrance  to  secure  system development, since the early consideration of security (e.g., when defining the business processes)  allows  engineers  to  envisage  threats,  their  consequences  and  design countermeasures.  Then  the  system  design  and  architecture  alternatives,  that  do  not offer a sufficient security level, could be discarded (Alberts C. J., Dorofee A. J.:  OCTAVE,2001)

The automobile industry is often characterized in terms that limit the scope of discussion to the manufacture and sale of new automobiles. This study broadens the scope to include the broad set of complements, enablers, and constraints that make the industry one of the largest and most influential human enterprises in history. Moreover, we argue in this study that the role of information technology has been profound in the slow transformation of the industry from its original status as a product industry into what is increasingly a service industry in which “product” is something far different from what it was when the industry first became a powerful global force. The role of information technology in this process has never been in the foreground: it has always been infrastructural, making possible subtle but profound changes in nearly every aspect of the industry

Before proceeding, we acknowledge that the automobile industry is one of the most extensively researched sectors of enterprise, and a great wealth of information and insight is available to the student of the subject. We do not profess to be experts on the industry. Rather, our interest arises from long study of the application of information technology to complex domains of human activity, and especially to domains that are themselves technologically intensive, systemic, and institutionalized. The automobile industry is technology-intensive, and has been from its beginning. Gottlieb Daimler perfected the high-speed internal combustion engine in 1885, creating the first engine with a sufficiently wide power band to enable controlled acceleration of a light vehicle, and the industry has been a wellspring of technological innovation since. It is also has been highly systemic since the early part of the 20th century. Ransom Olds first applied the concept of systematic assembly processes to the industry in 1901, and Henry Ford brought the world large-scale parts standardization and process engineering in 1907. Ford’s Model T was the product of the world’s first vertically integrated mass production system that, in a period of 17 years, reduced the assembly time of a vehicle by a factor of 24 and the selling price by a factor of three. Finally, the industry is highly institutionalized, tied irrevocably to the institutions of local and national government, as well as to other industries such as insurance that are themselves highly institutionalized

Security in the automotive industry raises several distinct challenges around the connected vehicle, as well as in manufacturing plants and across enterprise IT systems. These challenges appear at each stage of the plan-build-run lifecycle. It’s not only the security of the vehicle itself that is attracting attention. The security of manufacturing plants is also a growing concern. A recent report on worldwide security breaches stated that automotive manufacturers were the top targeted manufacturing sub-industry. Based on this background the researcher wants to investigate the information technology and business security in automobile companies in Nigeria

Statement of the problem

Whenever something new connects to the Internet, it is exposed to the full force of malicious activity. When something as complex as a modern car or truck is connected, assessing the scope of threats is an immense job, and an attack surface may be left unprotected unintentionally. Many security risks now extend to vehicles malware, Trojans, buffer overflow exploits, and privilege escalation. It’s not only the security of the vehicle itself that is attracting attention. The security of manufacturing plants is also a growing concern. This work wants to want to investigate how information technology help in business security in automobile companies in Nigeria

Objective of the study

The objectives of the study are;

  1. To ascertain the relationship between IT and business security in automobile companies in Nigeria
  2. To ascertain the roles IT play in business security in automobile companies in Nigeria

Research question

  1. Is there any relationship between information technology and business security in automobile companies in Nigeria?
  2. Do IT play any role in business security in automobile companies in Nigeria?

Research hypotheses

H0: There is no relationship between information technology and business security in automobile companies in Nigeria.

H1: There is relationship between information technology and business security in automobile companies in Nigeria.

H20: There is no roles IT play in business security in automobile companies in Nigeria.

H21: There is roles IT play in business security in automobile companies in Nigeria.

 Significance of the study

The study will be very significant to students and the automobile companies. The study will give a clear insight on the information technology and business security in automobile companies in Nigeria. The study will enlighten on the role of IT in business security in automobile companies. The study will also serve as a reference to other researcher that will embark on the related topic

Scope of the study

The scope of the study covers information technology and business security in automobile companies in Nigeria. The study will be limited to selected automobile companies in Nigeria

Limitation of the study

The researcher encounters some constraints which limit the scope of the study namely:

The research material available to the researcher is insufficient, thereby limiting the study

The time frame allocated to the study does not enhance wider coverage as the researcher has to combine other academic activities and examinations with the study.

Insufficient fund tends to impede the efficiency of the researcher in sourcing for the relevant materials, literature or information and in the process of data collection (internet, questionnaire and interview).

Definition of terms

 IT: Information technology is building communications networks for a company, safeguarding data and information, creating and administering databases, helping employees troubleshoot problems with their computers or mobile devices, or doing a range of other work to ensure the efficiency and security of business information 

Business security: Accurately securing your business from physical and data threats can help minimize risks from thefts or physical violence. Workplace violence, corporate espionage, identity theft issues and privacy requirements necessitate ensuring your business is safe on multiple fronts.

Leave a Comment

ABOUT US || CONTACT US || PRIVACY POLICY || DISCLAIMER || TERMS & CONDITIONS || SITEMAP