StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Frameworks Comparison - Case Study Example

Cite this document
Summary
One of the factors that distinguish the three is the fact that they are produced from different companies or organizations. However, it is worth noting that they are all security standards aimed at providing good security to…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
Security Frameworks Comparison
Read Text Preview

Extract of sample "Security Frameworks Comparison"

COBIT, NIST and PCI DSS does not have a lot in common. One of the factors that distinguish the three is the fact that they are produced from different companies or organizations. However, it is worth noting that they are all security standards aimed at providing good security to business premises. In , addition these security standards are characterized by similar complex IT in their development and utilization. Control Objectives for Information and Related Technology (COBIT) Control Objectives for Information and Related Technology (COBIT) is a framework developed by ISACA for IT governance and management.

Much of successful organizations understand the importance of Information technology in ensuring business success. Therefore, COBIT acts as a supporting toolset that enables managers to bridge the gap between technical issues, control requirements and business risks. The business orientation of the Control Objectives for Information and Related Technology consists of linking business goals to IT goals, providing maturity and metric models to measure their success and identifying the associated obligations of business and Information Technology process owners.

The unique nature of COBIT is that: its focus is illustrated through a process model that subdivides Information Technology into 4 domains and 34 processes in line with the responsibility areas of planning, developing, running and monitoring, providing the much needed view of IT (Brand, 2007). NIST from National Institute of Standards and Technology Founded in the year 1901, the National Institute of Standards and Technology is one of the US oldest physical science laboratories. NIST measurements support the smallest of technologies to the largest and most complex of human made creations.

Much of its developed technology ranges from earthquake resistant skyscrapers to wide-body jetliners to world wide communication networks. The lab assists the industry in the development of technology that helps in: improving product quality, modernization of the manufacturing processes and facilitation of rapid commercialization of products based on current scientific discoveries (NIST monograph, 1900). PCI DSS from the PCI Standards Council Data security standard (PCIDSS) is one of the security standards offered by PCI security standards council.

The PCI data security standard (PCI DSS) provides an actionable framework for building a full-bodied payment card data security process which comprise of detection, prevention and appropriate reaction to security incidents. Data Security Standard (PA-DSS) was developed to help in provision of definitive data standard for software vendors that develop payment applications. Its uniqueness is bestowed upon the fact that it is aimed at preventing development of payment applications for third parties from storing prohibited secure data including CVV2, magnetic stripe or PIN (Wright, 2011).

ReferencesBrand, K., Boonen, H., & IT Service Management Forum. (2007). IT governance based on CobiT® 4.1: A management guide. Zaltbommel: Van Haren Publishing.NIST monograph. (1900). Gaithersburg, Md.: U.S. Dept. of Commerce, National Institute of Standards and Technology.Wright, S. (2011). PCI DSS: A Practical Guide to implementing and Maintaining Compliance. Ely: IT Governance Pub.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Frameworks Comparison Case Study Example | Topics and Well Written Essays - 250 words”, n.d.)
Security Frameworks Comparison Case Study Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1619763-security-frameworks-comparison
(Security Frameworks Comparison Case Study Example | Topics and Well Written Essays - 250 Words)
Security Frameworks Comparison Case Study Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1619763-security-frameworks-comparison.
“Security Frameworks Comparison Case Study Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1619763-security-frameworks-comparison.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Frameworks Comparison

Information Security Management Frameworks

Instructor Date Comparisons of two Information Security Management frameworks The purpose of this program plan is to outline an efficient framework that will guide the health care industry in enhancing their cyber security and obtaining an appropriate but cost effective insurance cover.... hellip; It defines essential elements of effective information security program without infringing the borders of law and other regulations governing it.... This include important steps like assessing the risks both imminent and long term, having a structure responsible for information security and assigning the responsibilities, setting up personnel policies related to security and finally monitoring the security program the company will formulate....
4 Pages (1000 words) Essay

Important Parts of the .net Platform

Also that this IL makes the comparison and inter operability between codes of different high level languages possible as all the .... The other important features provided by CLR are memory management, thread management, garbage collection, exception handling and security.... ET platform what it is by providing buffering between the developer and the operating system and the vast amount of reusable code for efficient application development and at the same time providing important services such as security mechanisms, memory management and exception handling....
2 Pages (500 words) Essay

Information Security Risks

An analysis and comparison of the existing framework and potential synergies will follow, to showcase what are the tools readily available for corporations to use in managing the risk.... The information security requirements that these frameworks have is going to be researched and any an attempt to assign it to the general categories of information security risks will be made to facilitate an easier management  Methods: We performed multiple literature searches on several areas of pertinent research and undertaken interviews and survey questionnaire in order most he relevant up-to dictate informal-to adults “Achieving information security is extremely complicated and requires the combination of technical resources and management procedures....
8 Pages (2000 words) Essay

Web Information System

Franco (2008) has presented a comprehensive comparison of the important features of AJAX frameworks with ActionScript in the form of matrix as mentioned below: Both technologies have their own benefits and limitations, and honestly speaking, it is very difficult to decide when to use what technology....
4 Pages (1000 words) Essay

Analysis of Global Governance

The current paper focuses on the critical examination and comparison of two studies focusing on global governance: the study of Held & McGrew (2002) and that of Wilkinson & Hughes (2002); both of these studies refer to the criteria, the characteristics and the implications of global governance.... hellip;  The criteria used for the evaluation of political and social frameworks worldwide are likely to be differentiated being influenced by the local ethics and values; the position of each country in the international community and its power to influence the decisions of international organizations are also likely to affect the country's political and social characteristics and initiatives....
12 Pages (3000 words) Essay

HLS Response and Recovery

In all cases, a logical comparison of pieces of information should be in existence to avoid errors.... Analysis frameworks for structured situation analysis and risk assessment frameworks are designed from risk management and emergency preparedness approaches that assist in setting up an integrated system.... Under risk assessment frameworks, risks are identified and a thorough analysis carried out to determine the level of threat that they pose to security (Stellman, 1998)....
1 Pages (250 words) Essay

Food Security/Food Sovereignty Brief

The condition of food security is attained when people of a country or a given region can regularly access ample quantities of food.... There are challenges that are involved in the effort of maintain both the food sovereignty and security.... The contrary of the state of having the food security is the insecurity....
5 Pages (1250 words) Essay

Access Control Methods in Information Security

This paper ''Access Control Methods in Information Technology'' tells that access control is one of the most sensitive aspects of computer and computer systems' security.... With these types of controls, access is granted as per one's allowed extent of exposure to information security systems....             In this access control method, a policy or policies are made to enforce security policies independent of user operations....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us