StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information Security Management - Essay Example

Cite this document
Summary
A group of staff members was set up to create recommendations on ways to improve a) the security of the information system, and b) the confidentiality of data, prevention of disaster, and safe storage devices.
An appropriate judgment had to be put in place to ensure that team…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
Information Security Management
Read Text Preview

Extract of sample "Information Security Management"

Download file to see previous pages

There is a need for ensuring an appraisal of the operations of the information system at Hewlett-Packard in a bid to consolidate an organized arrangement in the prevention of danger. In view of the rise in the level of an insecure system within the operation systems of Hewlett Packard, there is a need to come up with various measures that can curb the danger that the company is exporting. In addition, there is also need for addressing the possibility of the occurrence of disasters like fire that may end up damaging property within the company.

Presently, the operating system the staff is using is susceptible to threats outside and within the company. There is need for a safe operating system that the staff uses in order to ensure confidentiality of information within the organization. This report comes up with the appropriate recommendations that have to be considered to ensure safety of the entire operating system. There were complaints raised regarding the access of computers without the knowledge of the users of the computers. The report looks at the provision of the use of passwords and various data storage devices within the organization.

This research was conducted through investigation and filling of questionnaires by the staff members. A number of 250 questionnaires were distributed to the employees, and they were filled based on the scales that surround that security and confidentiality of the jobs that they do. The survey concentrated purely on the security of the work being done rather than the individual details in the environment. The staff members who took part in the survey were volunteers and their details were anonymous.

The management having been briefed of the challenges being faced within the firm, they decided to appoint a team of IT experts led by the IT systems administrator to look into the situation and address the matter amicably before it got out of

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Security Management Essay Example | Topics and Well Written Essays - 6000 words”, n.d.)
Information Security Management Essay Example | Topics and Well Written Essays - 6000 words. Retrieved from https://studentshare.org/management/1653240-information-security-management
(Information Security Management Essay Example | Topics and Well Written Essays - 6000 Words)
Information Security Management Essay Example | Topics and Well Written Essays - 6000 Words. https://studentshare.org/management/1653240-information-security-management.
“Information Security Management Essay Example | Topics and Well Written Essays - 6000 Words”, n.d. https://studentshare.org/management/1653240-information-security-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security Management

Summary (Information Security Management )

Last but not the least Yahoo conducts company-wide education and training programme to constantly educate employees about Information Security Management.... Comparatively, NSIT lays out on security management by identifying 17 controls organized into three categories: The Management Control section addresses security topics that can be characterized as managerial.... It does not mandate specific information security controls but stops at the level of the management system....
2 Pages (500 words) Essay

Security Legislations and Standards

Some of the well known examples of these rules and regulations comprise the Clinger Cohen Act, the GPRA (Government Performance and Results Act) and FISMA (Federal Information Security Management Act).... Legislations and Standards Serving their Purposes Global Information Security Management guidelines play a significant role in organizing and determining organizational information system security.... Thus, to cope with these limitations, it is assessed that Information Security Management strategy should be observed as a library of policies material on information safety management for the committed companies (Siponen & Willison, 2009)....
4 Pages (1000 words) Essay

Differences and Similarities between Existing Security Standards

For instance, whole 27000 series is intended to cover numerous areas of information security as well as risk management: (JBwGroup, 2009; Government of the HKSAR, 2008) IS0 27000 – Information Security methods, basics as well as vocabulary ISO 27001 – Information Security Management System Requirements (available: 10/2005) ISO 27002 – Code of Practice (available: 06/2005) ISO 27003 – Planned ISMS Implementation ISO 27004 – Directions intended for Information Security Management Metrics as well as Measurement ISO 27005 – Guide intended for Risk Management (available 06/2008) ISO 27006 – Worldwide Accreditation Requirements (available 03/2007) However, business corporations that have adopted ISMS and attained self-governing 3rd party certification regarding their information security plans have gained a number of strategic benefits (JBwGroup, 2009; Government of the HKSAR, 2008)....
4 Pages (1000 words) Essay

Technical and Formal Security

Formal System security management of information system security requires a development of organizational structure and processes for ensuring adequate protection and integrity.... Full Paper Title Name University information security Cyber-criminals are intelligent as well as organized.... Effective change management and configuration management procedures along with documentation are the most effective controls for minimize security vulnerabilities that may arise from incompatible modules or hardware modification from the system (Prin of computer security 2E2010)....
4 Pages (1000 words) Research Paper

Information Security Management Frameworks

Instructor Date Comparisons of two Information Security Management Frameworks The purpose of this program plan is to outline an efficient framework that will guide the health care industry in enhancing their cyber security and obtaining an appropriate but cost effective insurance cover.... hellip; It defines essential elements of effective information security program without infringing the borders of law and other regulations governing it.... This include important steps like assessing the risks both imminent and long term, having a structure responsible for information security and assigning the responsibilities, setting up personnel policies related to security and finally monitoring the security program the company will formulate....
4 Pages (1000 words) Essay

Information Security Management of BS 7799

This paper "Information Security Management of BS 7799" focuses on the fact that BS 7799 is the most influential globally recognised standard for Information Security Management systems around the world.... BS7799, which now has the international number ISO 27001:2005, is the international best practice Information Security Management standard, defining and guiding Information Security Management System development.... Part 1 (the original Code of Practice) of the revised BS7799 standard was re-titled "Code of Practice for Information Security Management" and provides guidance on best practices in Information Security Management....
6 Pages (1500 words) Case Study

Information Security Management

In addition, the investigation showed that when the attackers entered into their network, the Target's security team was able to determine only some of their actions.... However, the security team carefully evaluated their actions and responded accordingly.... Though, Target uses a very useful tool known as FireEye that repeatedly removes malicious code or software, however the Target's security team had turned it off before this attack (KrebsonSecurity)....
4 Pages (1000 words) Research Paper

Information security management framework

It is an overall description of the Topic: Information Security Management Framework Security Policies, Standards and Guidelines So that information can be protected, organizations and businesses are supposed to execute regulations and controls concerned with safeguarding of information as well as the systems used for the storage and processing the information.... This is typically achieved through executing information security policies along with standard and guidelines....
1 Pages (250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us