{"id":296,"date":"2026-02-08T13:06:10","date_gmt":"2026-02-08T13:06:10","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/david-flowers\/?p=296"},"modified":"2026-04-29T17:29:40","modified_gmt":"2026-04-29T17:29:40","slug":"components-of-a-business-in-the-modern-era","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/david-flowers\/2026\/02\/08\/components-of-a-business-in-the-modern-era\/","title":{"rendered":"Components of a business in the modern era"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><br>David Flowers<br>Department of video game development and design, Old Dominion University<br>CYSE-200: Cybersecurity, Technology &amp; Society<br>Dr. Christopher Bowman<br>February 8, 2026<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><br>Other Component of an organization and where do they \u201cfit\u201d<\/h2>\n\n\n\n<p class=\"has-text-align-left\"><br>One component of a business should be information security. This component would<br>monitor how sensitive information is handled and what employees are able to access\/know the<br>businesses sensitive information. I could see this component fitting inside or working with the<br>legal component of a business. The reason I say this is because information security can be<br>secured by using non disclosure agreements (NDA), and these can be handled by the legal<br>department. If an employee were to breach confidentiality they could then be sued by the<br>company and the legal department would be the ones who would handle that. This does not mean<br>that the legal department regulates what sensitive information certain employees should know,<br>and how that information is stored and protected, thus the information security department would<br>fit in the company by working with the legal department for NDA\u2019s and by regulating what<br>information employees know and how sensitive information is stored.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><br>Where does IT \u201cfit\u201d in an organization and what are IT\u2019s responsibilities<\/h2>\n\n\n\n<p class=\"has-text-align-left\"><br>IT also known as information technology fits inside of an organization by regulating how<br>the technology works inside of the company. They do this by ensuring that the technology is still<br>working and fully operational This is seen inside of the reading from this week when it is stated<br>by Aldabagh (2025)\u201cThe IT department ensures that the company\u2019s software and hardware stay<br>current, secure, and dependable.\u201d(p.7). The roles and responsibilities that are within IT is that<br>they make sure that the computers, programs, and networks are constantly updated and operating<br>cleanly while also constantly looking out for cyber attacks Aldabagh (2025)\u201cThey keep key<br>systems like computers, programs, and networks running smoothly while actively monitoring<br>cyber threats.\u201d(p.7). The way that IT should be organized is by having the team that looks out for<br>cyber attacks in a separate component since this can increase the efficiency of both teams, and<br>this is proven in the reading by Alabagh (2025) \u201cThis separation can offer better visibility,<br>quicker responses to emerging risks, and greater independence in assessing vulnerabilities across<br>all departments.\u201d (p.8). This way the other portion of the IT department can work on making sure<br>that the computers, programs, and networks are updated and operating at full capacity.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Works Cited<\/strong><\/p>\n\n\n\n<p>Aldabagh, H. (n.d.). <em>Cybersecurity, Technology, and Society<\/em>. Perusall. https:\/\/app.perusall.com\/courses\/202520_cyse200t_25254-cybersecurity-technol-society\/cybersecurity-technology-and-society-first-edition-2025?filter=all&amp;panel=citation<\/p>\n","protected":false},"excerpt":{"rendered":"<p>David FlowersDepartment of video game development and design, Old Dominion UniversityCYSE-200: Cybersecurity, Technology &amp; SocietyDr. Christopher BowmanFebruary 8, 2026 Other Component of an organization and where do they \u201cfit\u201d One component of a business should be information security. This component wouldmonitor how sensitive information is handled and what employees are able to access\/know thebusinesses sensitive&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/david-flowers\/2026\/02\/08\/components-of-a-business-in-the-modern-era\/\">Read More<\/a><\/div>\n","protected":false},"author":31890,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/users\/31890"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":301,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/posts\/296\/revisions\/301"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}