Components of a business in the modern era


David Flowers
Department of video game development and design, Old Dominion University
CYSE-200: Cybersecurity, Technology & Society
Dr. Christopher Bowman
February 8, 2026


Other Component of an organization and where do they “fit”


One component of a business should be information security. This component would
monitor how sensitive information is handled and what employees are able to access/know the
businesses sensitive information. I could see this component fitting inside or working with the
legal component of a business. The reason I say this is because information security can be
secured by using non disclosure agreements (NDA), and these can be handled by the legal
department. If an employee were to breach confidentiality they could then be sued by the
company and the legal department would be the ones who would handle that. This does not mean
that the legal department regulates what sensitive information certain employees should know,
and how that information is stored and protected, thus the information security department would
fit in the company by working with the legal department for NDA’s and by regulating what
information employees know and how sensitive information is stored.


Where does IT “fit” in an organization and what are IT’s responsibilities


IT also known as information technology fits inside of an organization by regulating how
the technology works inside of the company. They do this by ensuring that the technology is still
working and fully operational This is seen inside of the reading from this week when it is stated
by Aldabagh (2025)“The IT department ensures that the company’s software and hardware stay
current, secure, and dependable.”(p.7). The roles and responsibilities that are within IT is that
they make sure that the computers, programs, and networks are constantly updated and operating
cleanly while also constantly looking out for cyber attacks Aldabagh (2025)“They keep key
systems like computers, programs, and networks running smoothly while actively monitoring
cyber threats.”(p.7). The way that IT should be organized is by having the team that looks out for
cyber attacks in a separate component since this can increase the efficiency of both teams, and
this is proven in the reading by Alabagh (2025) “This separation can offer better visibility,
quicker responses to emerging risks, and greater independence in assessing vulnerabilities across
all departments.” (p.8). This way the other portion of the IT department can work on making sure
that the computers, programs, and networks are updated and operating at full capacity.

Works Cited

Aldabagh, H. (n.d.). Cybersecurity, Technology, and Society. Perusall. https://app.perusall.com/courses/202520_cyse200t_25254-cybersecurity-technol-society/cybersecurity-technology-and-society-first-edition-2025?filter=all&panel=citation

Leave a Reply

Your email address will not be published. Required fields are marked *