Application of Information Security Management Framework in an Organization
Module 1 - SLP
Information Security Management Frameworks
For this module, your task is to apply what you have learned about information security management frameworks to your own experiences or issues of interests. If the issue is a large-scale, complicated one, you can choose to provide an overview here and then keep discussing the same issue but with much more depth from the different perspectives in each SLP for this course. Or you can choose to discuss different issues in different modules.
Your own experiences or interests can come from your organizational work or from your personal life. If you don't have any experiences on this topic (which I hardly think so) or you think your experiences are not so relevant, then find a public issue, interview people, or do some search on the Internet.
Please apply your preferred framework of information security management to discuss an information security issue in your organization or in your personal life. Some examples are access control, virus protection, virtual private networking, business continuity, disaster recovery, etc.
Please write a 2- to 3-page write-up titled:
Applying Information Security Management Framework(s) in __________ (the information security issue of your choice)
Your paper should:
1. Introduce the information security issue.
2. Choose multiple framework(s) that best apply to the information security and provide support for your discussion.
3. Produce a comparison of the different frameworks—a table would help with this.
Your assignment will be graded according to the MSITM SLP Grading Rubric, which aligns with the following expectations. (To see the rubric, go to Assessments>Rubrics. Click the arrow next to the rubric name and choose Preview.)
SLP Assignment Expectations
Length: Follow the number of pages required in the assignment excluding cover page and references. Each page should have about 300 words.
Assignment-driven criteria (14 points): Demonstrates clear understanding of the subject and addresses all key elements of the assignment.
Critical thinking (6 points): Demonstrates mastery conceptualizing the problem. Shows analysis, synthesis, and evaluation of required material. Conclusions are logically presented.
Scholarly writing (3 points): Demonstrates proficiency in written communication at the academic level of the course.
Assignment Organization (3 points): Assignment is well organized and follows the required structure and organization of the assignment.
Citing and using references (4 points): Uses relevant and credible sources to support assertions; uses in-text citations; properly formats references.
• Please use original writing (No Plagerism)
• Please use American URLs than can be easily verified on the web on the reference page.
• Please include the page numbers in the references
• Read then background material in the attachment titled Background
• Include a table to give a comparison to the different Frameworks
Technology
Student’s Name:
University Affiliation
Application of Information Security Management Framework in an Organization
Information Systems Management (ISM) is an assessment of technology, people, organizations and the associations among them. The experts in this area help organizations to realize maximum profit from the venture in equipment, business processes, and personnel. Group-orientationemphasize on services that rely on the side-to-side technology. Management Information Systems are characteristically computer-based applications used in the data management to enable spring information, data searching and analysis easier.The system should be able to identify and evaluate emerging problems that are common in many organizations such as power struggles and tendency. Any form of management in an organization, therefore, should focus on solving these problems in case they arise in their respective firms.
There are apparent steps involved in solving these challenges. The first is a diagnosis of the problem. Evaluationis the next step and final execution of the solution. In all the situations, preventive measures should be in place in any organization to avoid crisis arising from problems.
The responsibility of management in any organization ensures theappropriate measure is in place for the healthy running of the organization. The cordial relationship between workers, proper communication and respect, are the keys for good performance within any organization. The management shall, therefore, acts the part of a good team player.
Role of the information system management
The management system ensures that associates in nursing have applied the knowledge and gathered as of the assorted supplies, executed, and transferred more to every or any of the impoverished targets. The organization has the chanceto meet the experience desire for individuals, a group of people, and the administration functionaries like bosses. The MIS assures the varied desires through a range of systems. They include question systems, analysis systems, modeling systems and call support systems. In all these areas, it assists in strategic coming up with policies, internal controls, operational management and transaction process (Gantz, 2012).
Furthermore, it supports the clerical staff in dealings' process and answering their queries on information relating to transactions, standing of particular records and references on a range of documents. It is useful to the junior management personnel in several ways. It provides the operational knowledge of coming up with ideas, programming, and management, and help them in higher cognitive processes at process level to approve Associates in Nursing out of management scenario (Johnson, 2013).
MIS supports the center of management in setting a target for dominant business functions. Employment of the management tools backs the process of development and administration. Also, it assists the executive management in setting goals, strategizing and evolution implementation of business plans.It has a significant role in acknowledgment of generation, communication, problem identification and helps within a method of higher cognitive process. Therefore, its function is in the management, administration and operations of the corporation.According to (Brock, 2000), no organization, style or techniques of control is ideal, as any type will suffer from a range of issues that develop attributable to the planning itself. This situation can be true once a corporation tries a new brand of product or service. One comparatively novel organization type, the matrix that has gained a remarkable quality in modern years also, has some considerable drawbacks (Vacca, 2013).
Encryption does not relate to authorization and authentication, but is a significant feature of guarding data, though at rest or transfer, from illegal clients. Network code of behaviors such as SMTP, FTP, and HTTP; do not give an adequate defense for responsive data passed through the systems. The records passing over the system are vulnerable to network attacks such as spying the system traffic, tampering the data, capture-replay non-repudiation, hijacking, and spoofing. Safe Socket Stratum (SSL) is a vast progression over the conventional protocols. SSL guarantees privacy and reliability of information, communication over the system. IDS propose encryption more than the wire in the course of open SSL library.
Multiple frameworks for information security management
A framework is a series of processes that are in documentation with the aim to define procedures and policies in the implementation of information management security controls in the organization.
There ar...
👀 Other Visitors are Viewing These APA Essay Samples:
-
Belief & Culture: Build Awareness
2 pages/≈550 words | 6 Sources | APA | Technology | Other (Not Listed) |
-
ITM527 The Challenges in Continuous Monitoring of Information Systems Security
1 page/≈275 words | 2 Sources | APA | Technology | Other (Not Listed) |
-
ITM527 Mod 2 SLP: Continuous Monitoring Requirements
2 pages/≈550 words | 5 Sources | APA | Technology | Other (Not Listed) |