StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Information Security Governance - Assignment Example

Comments (0) Cite this document
Summary
The author of this paper "Information Security Governance" concerns a mini case about IT governance on the company Blackboard Inc. has been established. The study also discusses different IT governance principles within the Blackboard LMS, cost, and bandwidth issues of the company. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
Information Security Governance
Read Text Preview

Extract of sample "Information Security Governance"

Download file to see previous pages Blackboard Inc. is known as the leading E-learning services and products in more than seventy countries of the world. Its main offices are located in Netherland and the USA. The company has more than 2400 clients all over the world. There are about 12 million current users of the company’s services. The learning system of the company is modeled in 11 languages. Blackboard’s success lies in connection with students, parents, and teachers to perform their tasks. Blackboard has a team of software development for the creation of the online programs. A content management system enabled by the company is to create and manage the course contents in a digital format (Hoovers Inc., 2015).
Most colleges use primarily the Content Management System (CMS) of the company. Course material is organized in reference to their types such as tools, communication, and course contents. Security has been the special asset of the company such as the Blackboard (Hoffman, 2011). The company provides the platform to its users by integrating the learning management capabilities and course with the security, student information, and authentication protocols. Academic Suite of Blackboard has been noted in the WCET EduTools that has an option of encryption of the entire user’s session through the SSL. Due to more options and flexibility in respect of security, potential clients are attracted. Blackboard is compatible with both outbound and inbound authentications that enable rich interaction with the external applications.
Students raised information security concerns. Even they access the Blackboard through putting a password; hackers might be able to enter the system without any authorization. Information overload issue is faced by many students because professors’ identification is not ensured when they post the information.
It has been reported that phishing emails come from the Blackboard to its clients. ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Information Security Governance Assignment Example | Topics and Well Written Essays - 3000 words - 1, n.d.)
Information Security Governance Assignment Example | Topics and Well Written Essays - 3000 words - 1. https://studentshare.org/information-technology/1868739-assignment-it-governance
(Information Security Governance Assignment Example | Topics and Well Written Essays - 3000 Words - 1)
Information Security Governance Assignment Example | Topics and Well Written Essays - 3000 Words - 1. https://studentshare.org/information-technology/1868739-assignment-it-governance.
“Information Security Governance Assignment Example | Topics and Well Written Essays - 3000 Words - 1”. https://studentshare.org/information-technology/1868739-assignment-it-governance.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Information Security Governance

Information Security Program

...? Review and evaluation of information security program In this essay, it is pointed out what information security governance is in a banking software company, how it has been implemented and its purpose in the company. It details an information security policy that provides total control, hence compliance, to ensure effective information security governance. Information is a main asset for any institution and measures to ensure security of assets is of key importance. A well implemented information security governance framework should direct and control security policies that are implemented at all levels of decision making Table of Contents 1. Introduction 3 2. Information security governance and its strategy 4 3. Regulations...
14 Pages (3500 words) Case Study

Information Security

...Information Security Governance... Information Security Governance... Issues in Network Security Introduction Before going into the discussion regarding fundamental issues in network security, let us get a better understanding of what network security actually is and why is it important in the present world. A computer network is a collection of computers connected to each other through LANs or WANs in order to carry out different business transactions. Network security is a strategy that is used to protect computer networks from different sorts of threats by identifying the potential threats to the networks and then applying the most appropriate measures to combat the identified threats. Network security is one of the most important concerns for ...
5 Pages (1250 words) Research Paper

Information Security

...Information Security Governance... Information Security Governance... SECURITY Information security Affiliation Table of Contents Table of Contents 2 SLP Information Security Management: Frameworks & Principles 3 Security Issue 3 SLP 2: Belief & Culture: Build Awareness 5 SLP 3: Politics & Legislation 7 SLP 4: Economics: Cost/benefit & Incentive Design 10 SLP 5: Security via Technology 11 Passwords Technology 12 Firewall Technology 12 Encryption Technology 13 References 13 SLP# 1: Information Security Management: Frameworks & Principles It is an admitted fact that information is extensively shared in almost all the business communication processes amongst associates, workers, clients, and other stakeholders. In this scenario, the technical...
10 Pages (2500 words) Essay

Governance for security

...Information Security Governance... Information Security Governance... QUESTION In the light of the privatisation and fragmentation of security, is there any value in insisting that internal security is a public good that should be provided by the state? NAME CLASS: DATE: 11/05/2011 Max Weber’s statement that the State has ‘a monopoly over the legitimate use of force’ illustrates the degree that his philosophical frameworks were used in the Western academic environment as a counter-force to Marxist interpretation. Weber’s writings on the interrelationship between capitalism and religion point to a conservative stewardship reflected in State bureaucracies, whereas Marxism inspired violent, insurrectionary forces worldwide. In monopolizing the...
14 Pages (3500 words) Essay

Information Security

...Information Security Governance... Information Security Governance... Information Security INFORMATION SECURITY Following the anti-virus up from McAfee that affected computers running Windows XPinternationally, the company made an official announcement, contending that a very small percentage of their clients had been affected. The apology was initially given by a spokesman for the company, and it was him who claimed that only less than 0.5% of their clients had been affected by the erroneous update (Harkins, 2013). This was the wrong person to have come out with such an apology, and it seemed that McAfee realized it. The next morning, Barry McPherson, their EVP, released a statement that was well phrased, but still unapologetic. Again, this was...
3 Pages (750 words) Essay

Information Security

...Information Security Governance... Information Security Governance... Security: Balance and Management Introduction Determining an appropriate level of information security is often complicated by the factthat different professionals, be they general managers or IT specialists, often perceive security needs through a different set of priorities. Security specialists often see complexity and increasingly secure systems as a desirable business practice (Angus, 2007; Miller, 2005) whereas general managers are more likely to view information security practices within a larger business context. The objective data demonstrates a couple of points quite clearly. First, as noted by Angus, the organizations that decide to implement the strictest types...
4 Pages (1000 words) Essay

Information Security

Based on the nature of the information, we can classify information into two board categories; private and public. Public information are open to anybody since it may not cause any harm to the public and hence it is not necessary to protect it whereas private information are intended for a specific group of people and hence it should be protected from unauthorized use. Private information can be manipulated, modified or misused in many ways for personal gains and such manipulations may cause immense problems to others and hence it is necessary to protect it from unauthorized use.
Most of the current organizations store their information on computers. Staff details, client lists, salaries, bank account details, marketing and sa...
6 Pages (1500 words) Term Paper

Information Security

...Information Security Governance... Information Security Governance... Security Table of Contents Table of Contents 2 An Overview of Information Security 3 Ensuring the Effectiveness of the Information Security Policies 3 Policies and Measures 4 Protection of the Data and the Steps Involved 5 Enhancing the Information Security 6 References 7 An Overview of Information Security The basic concept of the information security in an organization involves providing assistance to the organization’s mission. Every individual organization is open to the elements of worries which at times can influence the organization adversely (Elky, 2006). At this instance, the discussion will be based on the importance of information security of a healthcare organization...
2 Pages (500 words) Essay

Information Governance

...Information Security Governance... Information Security Governance... Paper: Information Governance Affiliation The content in this briefing paper is aimed at the Executive Board of this company with intentions of providing a feedback on a research carried out about Information Governance. As the board had previously considered Information Governance to be an area of potential investment, this paper will provide critically analyzed findings, possible pitfalls as well as the opportunities associated with it. In addition, it will give an insight as to what Information governance is as well as a solid reason for picking the specific field. With the information presented, the board will be in a better position to discuss and make a sound decision in...
12 Pages (3000 words) Essay

Information Security Governance - Blackboard Inc

...Information Security Governance... Information Security Governance... Security Governance: a. Background Information about Blackboard Inc. Blackboard Inc. is known as the leading E-learning services and products in more than seventy countries of world. Its main offices are located in Netherland, and USA. Company has more than 2400 clients in all over the world. There are about 12 million current users of company’s services. Learning system of company is modeled in 11 languages. Blackboard’ success lies in connection with students, parents and teachers to perform their tasks. Blackboard has a team of software development for creation of the online programs. Post secondary, K-12, elementary and secondary education is the primary market of...
13 Pages (3250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Information Security Governance for FREE!

Contact Us