Week 6What responsibilities do companies have to protect your data? How should they protect it? What are the consequences for the company if they don’t protect customer data?Last week we discussed requirements for IT systems. Among the most significant requirements are those that define the security of the system and the data it houses. Security requirements need to be defined at the beginning of the project; they must be tested as the system is developed and deployed; and they must be continuously tested to ensure the security of the system is maintained throughout its useful life. This week you will learn about information systems security, and you will develop security requirements as part of your Stage 3 Assignment due this week. You will also learn about enterprise systems—what they are and how they are used by businesses to achieve a strategic advantage. This week you will complete the third section of your report, the Stage 3 Assignment, in which you will apply what you learned in earlier weeks about how IT can improve business processes and how to write requirements for an IT solution.By the end of Week 6, you will be able to: (All readings will be posted in the attahcmnets)identify the high-level concepts surrounding information securityidentify the benefits of enterprise systems and their importance in helping to achieve business objectivesidentify current process problems and how a technology solution can improve themdevelop requirements for an IT solutionExplaining System Performance Requirements (This part is not required but posted as a reference for the responses)Refer to the readings Requirements and Developing Requirements for an IT System provided in Week 5, where the types of requirements are defined and examples are given. System performance requirements address quality (how the system must perform) and security. The areas listed are:UsabilityScalabilityAvailabilityReliabilityMaintainabilityPerformancePortabilityInteroperabilitySecurityProtection of data as it is transmitted and when it is storedUser authenticationAuthorization of user to perform specific functionsData backup and recoveryGroup 2: For this week’s discussion, Group 2 will post an initial response with:Choose one of the system performance or security areas listed abovePut the area you selected into the Subject/Title of your postingExplain what this area means in terms of system performance. Use the definitions provided in the Week 5 Requirements reading. If you need additional clarification, you can search for other sources, but be aware that these terms are defined and used differently for other purposes; be sure you find explanations that support the definition provided in the Requirements reading.Explain why it will be important to the MTC Hiring System.————————————————————————————————————————————————————What is required: (Minimum 1 to 2 paragraphs per response)Reply to four different classmate main postings. You are to critically evaluate all of the following as you reply: Each classmates initial response will be in the attachments.Responses to initial postings should be specific and assess whether the posting accurately and sufficiently addresses the questions asked in the discussion topic and should incorporate relevant research correctly. Explain your assessment as to why the information is or is not correct and/or complete, providing correct information to enhance the discussion.