StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Security Governance - Assignment Example

Cite this document
Summary
The author of this paper "Information Security Governance" concerns a mini case about IT governance on the company Blackboard Inc. has been established. The study also discusses different IT governance principles within the Blackboard LMS, cost, and bandwidth issues of the company. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful
Information Security Governance
Read Text Preview

Extract of sample "Information Security Governance"

Information Security Governance: Introduction: Information technology governance focuses upon the corporate governance division over the information technology systems and management of associated risks and performance. Assets’ security in the organization is first thing that requires the resources to be secured. Information technology emergence has impacted all other sectors in their progress. Information technology has been the significant factor that enabled the metamorphosis of all business activities. Products, services, delivery modes, channels and other related processes in the online business are moved from the physical to the electronic format. Company Profile Blackboard Inc. is known as the leading E-learning services and products in more than seventy countries of world. Its main offices are located in Netherland, and USA. Company has more than 2400 clients in all over the world. There are about 12 million current users of company’s services. Learning system of company is modeled in 11 languages. Blackboard’ success lies in connection with students, parents and teachers to perform their tasks. Blackboard has a team of software development for creation of the online programs. A content management system enabled by the company is to create and manage the course contents in a digital format (Hoovers Inc., 2015). Background Information: What do they perform? New established enterprises’ practices are affected by the Data security standards, PATRIOT acts and Sarbanes-Oxley act etc. Learning and teaching platform services are provided to make the successful implementation. Both, platform training and pedagogical training are given to increase the team effectiveness and capabilities respectively. Clients can access the enterprise services through mobile applications. Company connects the instructors, students and staff for key services anywhere and anytime. Information security setup in the organization Most of colleges use primarily the Content Management System (CMS) of company. Course material is organized in reference of their types such as tools, communication and course contents. Security has been the special asset of the company such as the Blackboard (Hoffman, 2011). Company provides the platform to its users by integrating the learning management capabilities and course with the security, student information and authentication protocols. Academic Suite of Blackboard has been noted in the WCET EduTools that has an option of encryption of entire user’s session through the SSL. Due to more options and flexibility in respect of security, potential clients are attracted. Blackboard is compatible with both outbound and inbound authentications that enable for a rich interaction with the external applications. Information security problem facing the Company Students raised the information security concerns. Even they access the Blackboard through putting a password; hackers might be able to enter the system without any authorization. Information overload issue is faced by many students because professors’ identification is not ensured when they post the information. Vulnerability that could allow the students to make changes in their grades and download the future assignments. It has been reported that phishing emails come from the Blackboard to its clients. This issue has been recently reported with a high severity. Although, no product has been affected by these phishing emails but users’ emails are continuously targeted. Web portal system of Blackboard has significant impacts of cost and waste the bandwidth when contents are downloaded or viewed (Bradford et al., 2007). Four Relevant Questions 1. What are the security holes for hackers; how they can be overcome by the Chief Security Officer of company? 2. Describe the relationship between business/IT Alignment and IT Governance? 3. Do stakeholders of the Blackboard system suffer from various versions released of company? How they can avoid any loss caused by incorrect installation of a Blackboard version? 4. How cost and bandwidth wastage can be controlled when accessing the content from Blackboard. Answers to Questions Answer 1 Security flaws have been reported by the Australian research company called as Securus in the Blackboard. According to a report, the online system used for classrooms contained flaws when criminals accessed the system to steal the confidential information. In these situations, university administrators did not confess the occurrence of any security breaches. Blackboard recognized that security holes existed that resulted into alter of customers on September 21, 2011. However, hackers could not access the login and privileged information. University officials were not concerned about the information security threats for future. Some of the academic institutes install the software patches when available to prevent the hackers’ attack on the system. Security awareness is also intensified by using the prevention techniques. It must be checked that whether any agent program is installed and entry of DDoS agent on the system traffic must be observed. Therefore, anti-Trojan and antivirus software must be installed and updated regularly on the system. Security is kept up to date to protect the system from entry of malicious code insertion in the network (EC-COUCIL, 2010). In order to attain the organizational goals, Chief Security Officer must ensure the security of personnel and equipments. The CIO sets out the plans and wide policies to acquire and manage the information systems. CIO in Blackboard Inc. can take decisions to align the functions of company to its business partners. Information is the major source of company Blackboard and CIO needs both business and technical skills (Stair & Reynolds, 2012). CIO is importantly called the facilitator of the information security. After, risks from hackers are identified in the Blackboard Inc. CIO should obtain the risks’ impacts. Without the model of security governance, it is not clear that who is supposed for risk acceptance. CIO needs to build the strategy for information security to meet the business requirements and develop the managerial and technical controls against the hackers’ risks. Security Planning: Potential, tactical and strategic plans are connected together and each type of plan provides the varying focuses towards the security enhancement for the Blackboard Inc. Appropriate planning by CIO is made on the projects with respect to whether short term or long term goals are met or not. CIO role also exists in the following given form. Developing the appropriate structure of Blackboard that is appropriate towards the business’ needs. Operating procedures, departmental objectives and goals must be established. Because new investment increases for Blackboard, and CIO needs to communicate and assess the risks related with the new investments. Business continuity and disaster recovery plan must be developed and executed for Blackboard. Re-engineering of information technology must be assessed with new recommendations of improvements. CIO may leverage the COBIT for assessment of the IT processes in Blackboard including problem management, change management and software development life cycle (SDLC). Management of infrastructure groups and internally function performed for security are complicated operations (ISACA, 2015). External and internal hackers require the network access to perform their illegal activities. Hackers send the spam emails that entice the users to provide the confidential information about username and password. Sometimes users are encouraged to see the bait websites that contain the infected programs. CIO can use a set of tools for controlling and monitoring the activities on the network such as the intrusion and detection system. These tools or piece of software will monitors the log activities performed from users and report the activity, which does not conform to standards and procedures set by the software. If such activity is found then system activates response to track back a real source of this breach. System administrator must initiate the security procedures before any such incident occurs (Vacca, 2013). Blackboard has been committed to settle the security vulnerabilities carefully and quickly. Customers’ information protection is ensured through a feedback system, and all vulnerabilities are confidentially and responsibly intimated to investigate and respond the every vulnerability. Because of diverse software and hardware configurations, applications are connected to a third party. Software modifications are done through the analysis before these are implemented across the different versions of products. Blackboard applications should run efficiently in testing facilities as well as customers’ environments. On client side, data security is also ensured through prompt and scheduled software updates (Blackboard Inc, 2015). Answer 2 Aims behind implementation of IT governance are to attain the better alignment between information technology and business of company Blackboard Inc. This question ultimately defines that how the IT governance implementation in its structure, relational mechanisms and processes enable the IT business alignment. Concept of Business alignment with IT strategy has been a complex topic, because several studies and publication are aimed to unravel the topic. Balanced approach for managing the IT strategies, business strategies and IT processes is applied. Alignment with the business strategies, IT strategies and IT processes can enable the company to drive and achieve the change. Examining the association between alignment and IT governance, potential antecedents for alignment are required (Haes & Grembergen, 2009). In current era of technology, IT and business have been closely related and share the complementary approaches and provide the continuous and improved insight to the company. However, gap between alignment of business and IT exists due to allocation of insufficient resources. Maximizing the business value of Blackboard Inc. requires the more investment in IT portfolio management. Business management that owns the separately or joint with other parties make decisions in selecting the investment for the IT portfolio that can bring the changes. Business managers in Blackboard must acquire the requisite skills, training and experience in respect of the organization. Business managers have the cursory knowledge about the information technology. Information technology managers will have to become more strategic in order to work at a high level in the organization in execution of strategic plans and corporate business. Alignment of IT and business must be ensured throughout the entire life cycle to develop the strategic and business plans. Strategic plans and business must derive input from IT to leverage the opportunities and assess the risks and dependencies related with the information technology. High level of alignment between business and IT, CIO of company should communicate to higher management to assimilate the new technologies. It will improve the outcomes from incorporation of new technologies (Kuruzovich et al., 2012). In an article, Larsen (2014) focused on talking about strategic alignment and leadership, but practically a huge difference existed. Blackboard Company was called an organization that has profound difference. Answer 3 Learning system of Company has a course management and virtual learning system. Company has the platform of web-based server that contains the course management and scalable design for integration of student information system as well as authentication protocols. There have been several iterations since the development of learning management system. However, company’s LMS and other products have challenges for stakeholders. Increased usage level of clients requires the appropriate scalability and maintenance. Uninterrupted and seamless migration paths Although, LMS created many advantages for users but it contained the concerns for stakeholders. Success of LMS is highly dependent upon the stakeholders’ identification and involvement in the system. A LMS becomes outdated due to advancement and technology changes. Routine updates are required to secure the system and provide services that need the downtime for its maintenance. The LMS remains off during the downtime, students and instructors cannot access the services. The system will require the services of trained people (Squillante et al., 2014). Cloud version of Blackboard LMS has been launched in summer 2014. Software-as-a-Service (SaaS) for new version of LMS has features of managed hosting and on-premise editions. LMS new offerings are cloud-based. Institutions using the Blackboard’s new cloud services have different requirements. Blackboard helps the modes of services delivery, because SaaS also gives options of working in the hosting environment. Blackboard administration claimed that a new service of SaaS model gives the automatic updates (Schaffhauser, 2014). In a survey of 720 faculty, students and staff about the Blackboard, it was found that Blackboard system was harder to learn. Majority of faculty members found that course management was the inflexible and time-consuming. Majority of students were not found proficient with the use of new technology. Older students were found to be non-experienced with the new technology as compared to the resident students. However, troubleshooting the issues of users is not focused too much in the Blackboard system. Initial version released in year 2001 was found to be compatible to only Microsoft servers and users of other than Microsoft server were confused about the services. Many critics have commented on the Blackboard’ programs and applications developed for particular operating systems. Most of critics of Blackboard’s web portal services say that mobilized technology is advantageous than traditional usage of technology. Open source technologies are also offering good services to customers. A record expense has been taken from colleges and universities using the Blackboard LMS. Initial subscription charges of Blackboard LMS are low but increase as a user integrates more functions to the Blackboard. These causes have produced various drawbacks for faculty members, students and staff from academic institutions (Bradford et al., 2007). There is an urgent transition of Flagship learning management system to single instance of Cloud. Every client on the same application and same version is a hard task for Blackboard, but necessary for a viable forward development. Dual advantage exists in the native cloud applications, but management of changes and updates are the serious headaches. All development and research sources should be devoted to the latest outcomes. In order to support the legacy applications on varying local servers and their infrastructures means that sources can be deployed for client care and product development. Thus a clear roadmap is required of migration of customers and technology to the cloud (Kim, 2012). Another issue that most of users of company’s LMS have informed is the slow connectivity of the LMS. However, this issue can be resolved if hosting university or colleges manage the internet connection with a high speed. New versions have support for modern browsers Internet Explorer, Safari, Firefox and Chrome. Blackboard LMS 9.1 has core features and deep capabilities that produce the more intuitive and focused deliverable for clients. Service Pack 14 has been developed by the collaboration of designers, administrators, students and educators. Answer 4 E-learning services are not so cheap as well as cost-effectiveness. Online delivery of education for colleges and universities has made economic issue more concerning. Due to rise in recent prices, commercial LMS have become relatively more investing. Cost of LMS from system to system varies. Teachers and administrators are loaded with the high academic work and also concern with cost associated for teacher and student interaction for distance learning. Cost associated with teachers and students’ interaction is increased with the increase in number of students. Time spent on the online interaction of teachers with students also increases.  Baggaley & Belawati (2010) also pointed out that many private institutes also used commercial LMS but they did not prove to be sustainable due to their high cost. Because private sector universities and colleges have limited funds and cannot provide successively required expenditure. Owing to a high cost of LMS, private sector institutes have started the use of open source software for LMS. Beijing University started the use of company’s academic suite for some courses. However, it could not be continued more due to technical agreement with the service provider and high cost. A rough estimate of expenditures on use of company’s LMS was noted as 20% to 30% for registered users. A high cost was paid for annual licensing of the system’s proprietary. University of Dar Es Salaam deployed the Company’s LMS in 1998 and used it for 10 years. They decided to use the Open Source Software LMS KEWL. They preferred the Moodle OSS LMS. Open Source Software LMS have become popular since last ten years, because of their lower cost of maintenance. Some of the users of OSS LMS have argued that OSS LMS are highly organized and support for human skills’ creativity, collaboration and learning (Munaku, 2011). Innovative products from OSS have been welcomed by the higher education in various countries. Moodle has been extraordinary as compared to other OSS in academic industry. Moodle has support and flexibility for students’ enrollment, start and end dates. Bandwidth and connection issues are associated with the LMS execution of courses. Sometimes, offline facilities are applied to address the connectivity concerns. However, offline support requires the establishing the structure that works as a helping system. Increased bandwidth has enabled the users to integrate the learning contents. All content documents including the audio and video materials provide the interactive demonstrations and connect to a single course shell. As human life passes through the development cycle, and Company’s products should be improved for e-learning purposes. Maturation phase of commercial LMS, and growing popularity of Open Source Software have serious market threats for Blackboard Inc. Other educational technology companies have spent millions of dollars on new research on the development of online systems, which are secure, and proficient in their applications. Some suggestions for security of company’s network are required. Firewall must not function like a router to protect the company at present. Institutions’ servers connected to NetBIOS are permitted from the off-campuses. Company’s policies have permitted the resistance towards any modification for faculty members. New patches must be introduced and installed on the secured network. Both, Blackboard and institutions using company’s services must work in a collaborative way and use available sources to meet the challenges ahead. Conclusion In this paper, a mini case about IT governance on the company Blackboard Inc. has been established. Blackboard Inc. is a major player of online provider of learning and teaching contents. Blackboard LMS has been a chosen area where different IT governance principles are discussed. Although, paid LMS web-based portals are developed with a high number of features, but lack some of features, which critics point out in favor of products and services from other companies. Information security is the fundamental objective of the company that has been questioned by many users. Business alignment with IT is another area where company invests to provide best services and achieve their business goals. Stakeholders’ concerns from incorrect installation and configuration have been briefly discussed. In the final section of paper, cost and bandwidth issues of company are detailed discussed. Online users of LMS have trends towards the Open Source Software LMS due to above given concerns. References Baggaley, J., & Belawati, T. (2010). Distance Education Technologies in Asia. New Delhi SAGE Publication Ltd. Blackboard Inc. (2015). Vulnerability Management Commitment and Disclosure Policy for Blackboard Learn, Available from http://www.blackboard.com/Footer/Security-Policy.aspx Accessed on 08-04-2015. Bradford, P., Porciello, M., Balkon, N., & Backus, D. (2007). THE BLACKBOARD LEARNING SYSTEM. The Journal of Educational Technology Systems, 35, 301-314. EC-Council. (2010). Ethical Hacking and Countermeasures: Threats and Defense Mechanisms. New York: CENGAGE Learning. Haes, S. D., & Grembergen, W. V. (2009). An Exploratory Study into IT Governance Implementations and its Impact on Business/IT Alignment. Information Systems Management, 26, 123-137. Hoffman, S. J. (2011). Teaching the Humanities Online: A Practical Guide to the Virtual Classroom. New York: M.E. Sharp Inc. Hoovers Inc. (2015). Blackboard Inc. company profile, Available from http://www.hoovers.com/company-information/cs/company-profile.Blackboard_Inc.0bd3701ec022817b.html Accessed on 10-04-2015. ISACA (2015). COBIT Case Study: Blackboard Uses Powerful Tool to Navigate Change, Available from http://www.isaca.org/Knowledge Center/cobit/Pages/Blackboard-Inc-.aspx Accessed on 07-04-2015. Kim, J. (2012). Blackboards Challenge, from https://www.insidehighered.com/blogs/technology-and-learning/blackboards-challenge Accessed on 09-04-2015. Kuruzovich, J., Bassellier, G., & Sambamurthy, V. (2012). IT Governance Processes and IT Alignment: Viewpoints from the Board of Directors Paper presented at the 2012 45th Hawaii International Conference on System Sciences, Maui, HI. Larsen, A. (2014). In pursuit of alignment, from http://www.rainmakerfiles.com/2013/11/08/in-pursuit-of-alignment/ Accessed on 08-04-2015. Munaku, M. (2011). Experience of Course Migration from Blackboard to Moodle LMS – A Case Study from UDSM (pp. 1-15): University of Dar Es salaam. Schwager, M. (2011). University not affected by security holes in Blackboard software, from http://www.gwhatchet.com/2011/10/10/university-not-affected-by-security-holes-in-blackboard-software/ Accessed on 06/04/2015. Schaffhauser, D. (2014). Blackboard Unveils Cloud Version of Learn from http://campustechnology.com/articles/2014/10/01/blackboard-releases-cloud-version-of-learn.aspx Accessed on 09/04/2015. Squillante, J., Wise, L., & Hartey, T. (2014). Analyzing Blackboard: Using a Learning Management System From the Student Perspective. Mathematics and Computer Science Capstones, 1-51. Stair, R., & Reynolds, G. (2012). Fundamentals of Information Systems. Boston: CENGAGE Learning Inc. Vacca, J. R. (2013). Computer and Information Security Handbook. Waltham: Elsevier Inc. Yin, L. R., Lien, N., & Werner, J. M. (2010). Learning in Virtual Groups: Identifying Key Aspects of a Course Management System Affecting Teamwork in an IT Training Course. Information Technology, Learning and Performance Journal, 25(2), 30-41. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Information Security Governance Assignment Example | Topics and Well Written Essays - 3000 words - 1, n.d.)
Information Security Governance Assignment Example | Topics and Well Written Essays - 3000 words - 1. https://studentshare.org/information-technology/1868739-assignment-it-governance
(Information Security Governance Assignment Example | Topics and Well Written Essays - 3000 Words - 1)
Information Security Governance Assignment Example | Topics and Well Written Essays - 3000 Words - 1. https://studentshare.org/information-technology/1868739-assignment-it-governance.
“Information Security Governance Assignment Example | Topics and Well Written Essays - 3000 Words - 1”. https://studentshare.org/information-technology/1868739-assignment-it-governance.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security Governance

Security as a management or technological issue

The paper will discuss the technical as well as the managerial aspect of the three domains: information system security, privacy and data protection.... This study looks into information system security that is becoming a dominant and challenging factor for organizations, as it leverages many risks that are constantly changing.... Every now and then, there are new security breaches resulting in massive losses in terms of customer confidence, as well as revenue....
12 Pages (3000 words) Essay

Information Security Risk Assessment Framework

Solms identifies risk in neglect of the ten aspects highlighted in Information Security Governance plan causes flaws in the security plan of an organization.... (2005) Information Security Governance: COBIT or ISO 17799 or both?... Two models used in Information Security Governance are COBIT and ISO 17799.... The two frameworks are complimentary and preferred frameworks for Information Security Governance.... Computer Sciences and Information Technology Annotated Bibliography Topic: information security Risk Assessment Framework and Metrics in the South Australia Real Estate Sector....
15 Pages (3750 words) Annotated Bibliography

Information Security Program

This paper "Information Security Program" points out what Information Security Governance is in a banking software company, its implementation.... The paper gives an information security policy that provides total control, hence compliance, to ensure effective Information Security Governance.... The company Information Security Governance formulates strategic goals, ensures achievement of goals, manages risks; make use of resources, and carefully assess the achievement of the information security program....
14 Pages (3500 words) Case Study

Are the frameworks and principles of information security management

Information Security Governance: Toward a Framework for Action.... If the public relies on those who possess their personal details it could be dangerous to their information security.... … Thus, the development of an efficient information security policy is extremely necessary.... In this regard, the information security management framework involves countrywide, worldwide, managerial, and worker values to perform information security management....
2 Pages (500 words) Research Paper

Technical and Formal Security

Full Paper Title Name University information security Cyber-criminals are intelligent as well as organized.... We have divided security into two aspects i.... technical and formal security.... Technical System security After identifying the purpose, there is a requirement of identify weaknesses or vulnerabilities along with impact and types.... As per (Dhillon, 2007) threats are categorized as Modification, Destruction, Disclosure, Interception, Interruption and fabrication and implies on hardware security, data security and software security....
4 Pages (1000 words) Research Paper

Security Frameworks Comparison

However, it is worth noting that they are all security standards aimed at providing good security to… In , addition these security standards are characterized by similar complex IT in their development and utilization. Control Objectives for Information and Related Technology (COBIT) is a framework developed by ISACA for IT governance and management.... Control Objectives for Information and Related Technology (COBIT) Control Objectives for Information and Related Technology (COBIT) is a framework developed by ISACA for IT governance and management....
1 Pages (250 words) Case Study

Scurity Policy Framework Outline

governance provisions for security highly depend on the conglomerate amid the midpoint of Administration, Branches, and Agencies (Siponen, 2000), persons employed in the security group, their distribution partners, and eventually all employed staff on behalf of ASWERA.... Ultimate accountability for ASWERA security policy lies with the Cabinet Office.... Divisions and Organizations, through their Chief Executives, must administer their security risks inside the limits established in this structure, as sanctioned by the Official Committee on… 2....
2 Pages (500 words) Essay

Information Security Governance - Blackboard Inc

The author of this study "Information Security Governance - Blackboard Inc" discusses the information security problems facing the company, cost, and bandwidth issues of the company.... tudents raised information security concerns.... In this paper, a mini case about IT governance on the company Blackboard Inc.... hellip; Some suggestions for the security of the company's network are required.... New established enterprises' practices are affected by the Data security standards, PATRIOT Act and Sarbanes-Oxley act, etc....
13 Pages (3250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us