StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Are the frameworks and principles of information security management - Research Paper Example

Cite this document
Summary
The privacy and security of personal data and information have become biggest issues to the public. If the public relies on those who possess their personal details it could be dangerous to their information security. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful
Are the frameworks and principles of information security management
Read Text Preview

Extract of sample "Are the frameworks and principles of information security management"

What are the frameworks and principles of information security management? And Why? The privacy and security of personal data and information have become biggest issues to the public. If the public relies on those who possess their personal details it could be dangerous to their information security. Thus, the development of an efficient information security policy is extremely necessary. In this regard, the information security management framework involves countrywide, worldwide, managerial, and worker values to perform information security management.

Additionally, this information security management framework is planned to encourage a unified technique that believes a procedure analysis of information inside the framework of the whole organizational working background. However, the efficient and optimistic communication between the IT executive accountable for information security management and the Chief Executive Officer (CEO) is compulsory to attain incorporation and responsibility. Moreover, the associates of the board of directors must be connected with the information security management matters (Sipior and Ward) and (Conner, Noonan and Holleyman).

It is considered that resources committed for the development of an information security management infrastructure have augmented, giving rise to an augmented understanding of information security. However knowledge is superior and the businesses do not have recognition of the form of security occurrence as well as the key technique utilized to contravene the safety. The proportion of reacting persons who stated not recognizing the amount as well as type of security occurrences went up to 29 percent in the years 2006 to 41 percent in the year 2007.

Thus, in order to understand the developments in business security, there is dire need for corporations to take a broad approach to ISM by integrating the information security management structure into the entire planned arrangement (Sipior and Ward) and (Conner, Noonan and Holleyman). A safe and reliable setting for accumulated and distributed information really improves customer advantages, production along with company performance, and corporate safety. Equally, an unconfident atmosphere produces the possibility for severe harm to governments as well as businesses that could considerably weaken customers and people.

Government has by now implemented a considerable rigid and lawmaking management all through IT security, and is thinking for an extra action. A lot of corporations are enthusiastically tackling their business data and information security requirements. What is not as extensively acknowledged is the truth that state managements or governments have previously approved into regulation numerous bills that administer how businesses have to tackle information safety matters (Conner, Noonan and Holleyman).

Information security is frequently indulgenced exclusively like a technology matter, while it should as well be indulgenced like a supremacy concern. On the other hand, the CIO only is not able to rectify the difficulty; the wide range of directors and executive administration should also be energetically employed. There is formerly wide agreement on the measures essential to rectify the issue. Absence of growth is due partially to the lack of a governance structure. If advancement is to be augmented a management structure that educates employees at diverse stages regarding how to establish solutions is vital (Conner, Noonan and Holleyman).

Federal management of the U.S. has a paradigm that could be willingly personalized to the requirements of private region. There is an awful need for security framework intended for information safety as well as security management that is designed on the instruction of ISO 17799 and FISMA and the consensus proposals (Conner, Noonan and Holleyman). Work Cited Conner, Bill, Tom Noonan and Robert W. Holleyman. Information Security Governance: Toward a Framework for Action. 2010. 18 January 2011 .

Sipior, Janice C. and Burke T. Ward. "A Framework for Information Security Management Based on Guiding Standards: A United States Perspective." Issues in Informing Science and Information Technology, Volume 5 (2008): 51-60.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Are the frameworks and principles of information security management Research Paper”, n.d.)
Retrieved from https://studentshare.org/information-technology/1405542-are-the-frameworks-and-principles-of-information-security-management
(Are the Frameworks and Principles of Information Security Management Research Paper)
https://studentshare.org/information-technology/1405542-are-the-frameworks-and-principles-of-information-security-management.
“Are the Frameworks and Principles of Information Security Management Research Paper”, n.d. https://studentshare.org/information-technology/1405542-are-the-frameworks-and-principles-of-information-security-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Are the frameworks and principles of information security management

The Zachman Framework

Enterprise reengineering has already become one of the most popular objects of information systems research.... The beginning of the 1980s was marked with the rapid advancement of information technologies and systems.... The Zachman framework “comprises descriptive representations that are essential to successful management of enterprises and future development of information systems” (Zachman, 1993).... Recent advances in information technologies and the growing role of technologies in globalization and communications urge the development of new, more sophisticated systems of enterprise engineering....
6 Pages (1500 words) Essay

Information security legislation

This realization is increasing in the wake of increasing theft occurrences and other information security… Organization currently need standards, in the past many organization mostly tended to use a single information security standard for example BS 7799 part 2 (an Never the less, times have changed and the recent past has seen a lot of regulations and legislation which impacts information security.... (Purtell, 2007) information security is an organization problem, and not a technologically one....
19 Pages (4750 words) Essay

The Development Information Security

This security framework provides steps to establish best suited information security management System (ISMS) for SMEs.... Consequently, this ever-increasing security threat has led to the development of numerous information security standards.... Moreover, it provides support for effective use of technology, central management, adaptability, flexibility, performance, interoperability and compliance on the forefront.... This essay describes increasing trend of digitized information, globalization of markets and resources has accelerated the incident of data loss and security issues....
25 Pages (6250 words) Essay

PHP Libraries and Frameworks

Traditionally, the software management process has been focussed on basic code writing and development of modules.... frameworks are significant innovation in modern website design.... Recently, great steps have been made towards using frameworks as the basis for development.... Typically, the code frameworks are a collection already created functions and classes.... For instance, PHP has several frameworks; Codeigniter, Zend Framework etc....
6 Pages (1500 words) Essay

Information Technology Security

Confirmation helps the privacy of information and the responsibility of activities performed on frameworks by checking the exceptional character of a client.... This paper ''Information Technology security'' tells that Methodology for information ought to be controlled through a method that ensures the client access rights for Spiderweb which reflect characterized and employment prerequisites.... But this appraisal demonstrates that the utilization of single-variable verification may be insufficient, it ought to execute confirmation, layered security, or different controls sensibly figured to alleviate the hazard....
12 Pages (3000 words) Essay

Information Security Measures

"information security Measures" paper states that a risk assessment approach is necessary for the development of systems with an acceptable level of risk.... nbsp; The study has been planned in several stages; review of relevant literature; study of architectures and measures in computing systems; a case study of security issues within a specific system; and recommendations for good practices for information security.... information security is not about looking at the past of an attack faced; neither is it about looking at the present with the fear of being attacked; nor is it about looking into the future about the uncertainty that might befall us....
5 Pages (1250 words) Coursework

Information Security Management in the USA

The basic issue in the paper “information security management in the USA”, which the author has chosen for discussion is information hacking.... Thus, an organized collection of procedures, people and information technology (IT) structure that protects decisive systems and information, and secure them from inside as well as outside intimidations is known as information security management (ISM) (Sipior & Ward, 2008), (Northern Illinois University, 2007) and (Grimaila, 2004)....
10 Pages (2500 words) Dissertation

The Companys Vulnerability of Information Leakages in BioMed Devices

The information security manager will avoid the loss of information into the public to avoid shame.... These individuals are the information security manager who will guarantee that no information relevant to the organization goes into general society.... … The paper "The Company's Vulnerability of information Leakages in BioMed Devices" is a worthy example of a case study on information technology.... nbsp;It has come to attention that BioMed Company is under threat of information insecurity....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us