Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Discuss how security requirements can be linked to business requirements - Essay Example

Comments (0) Cite this document
Information Technology is an evolution within an evolution. Information technology has set new trends in the generation of computers. This Trend has imbibed various technologies that improvise the life style and business aspects of every individual in accordance with technology…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
Discuss how security requirements can be linked to business requirements
Read TextPreview

Extract of sample "Discuss how security requirements can be linked to business requirements"

Download file to see previous pages The battle is on for finding out the efficient ways and design methodologies that can analyze the security risks and implement the appropriate mitigation solutions. As, every event or technique has a better impact and a worse impact, the technologies that speed up the business processes are also prone to increase risks of computer intrusion, fraud, disruption and many more.
A successful organization not only relies on finding innovative solutions or products but also on the effective implementation of those solutions. Here, technology plays a major role as these technological developments can make the implementations simpler, providing a wide range of choice. But the question arises so as to which is the right choice This can only be answered by thorough research on the cost, stability and reliability of the technology to be used (WALSHAM, 1993). The Information System of the firm should be able to process this task by taking the external (technology functionality) and internal (business environment) entities into account. Thus, the understanding and integration of technological innovations plays a key role in the modeling of any Information System to support the business goals and strategies. ...
The organization has to analyze all the possibilities and provide the solution that is technological stable and cost-effective, to implement, maintain and modify in future.
Security Management and Responsibilities
Data Owner
Each Line Department of the company, with its own computing facilities will appoint a senior member of the staff as Data Owner. The responsibilities of the Data Owner include:
Data subject enquiry procedures.
To ensure that all licenses to use systems and software is accurate, available and purchased according to financial regulations.
Preparing details of who can access what information, how and when, according to the particular classification of staff and information.
Ensuring that all systems are maintained in effective and controlled manner.
Ensure appropriate training of staff in systems and applications use.
Those systems which are operated throughout the company should also have a designated Data Owner.
Data Owners across the company will be advised by the Head of ead HeadInformation Compliance and Policy. With the existing systems, advice is available to help data owners meet their responsibility in complying with the Information Security Policy.
Systems Development
All systems must comply with the main IT strategy developed for the company by the IT team. Mark Walker, a senior systems analyst, states that an IT strategy is the single most crucial factor for the success of an organization dependent on IT for its operations (Walker, 2000). All system developments must include security issues in their consideration of new developments, seeking guidance from the Head of Information Technology.
Management Responsibilities
The management plays the most important part in building a successful ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Discuss how security requirements can be linked to business Essay”, n.d.)
Discuss how security requirements can be linked to business Essay. Retrieved from
(Discuss How Security Requirements Can Be Linked to Business Essay)
Discuss How Security Requirements Can Be Linked to Business Essay.
“Discuss How Security Requirements Can Be Linked to Business Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Discuss how security requirements can be linked to business requirements

Business Requirements

...Running head: REVISION MASTER'S PROJECT IN CHANGE MANAGEMENT-BUSINESS REQUIREMENTS ANALYSIS Revision Master's Project in Change Management-Business Requirements Analysis [Click here and type your name] [Click here and type your institution's name] Abstract One of the major problems that have not been adequately addressed during the implementation phase of the business plan review is the inclusion of the disabled or visually impaired user who uses an on-line banking system. As this should form part of the initial business project plan discussions and thus filtered down into the technical project plan implementation phase, there tends to be a lack of planning on the part of the web designers and the business unit. Due to this lack...
9 Pages(2250 words)Essay

Business requirements

... The Challenges an IT Organization Faces with Business Requirements Communication is an important aspect in everyday life whereby every person communicates with one another for various reasons. One of the reasons why people communicate is to persuade others to do something or think in a way that pleases others; therefore, persuasive communication is seen every day and everywhere. Changes in technology have largely made globalization a reality and this can be seen in the production of goods and services and their respective markets. Major transformations made in the transport, communication and information sectors have made the world a better place for everyone. Among the advances of technology, include the innovation of the micro processor...
4 Pages(1000 words)Assignment

The Relationship Between Security, Risk and Health in a Large Organisation

...’ (Bradford, 2007, 253). Organizational security is differentiated from the security involved in other human activities, for instance the environmental security (analyzed by Tennberg, 1995). The definition of security in business could be derived through the presentation of its most important aspects: a) physical security (doors, windows, etc.), b) computer security (access to the firm’s data), c) transport security (security when transporting the firm’s goods/ material required for the development of various organizational activities) (Hearnden et al., 199). At a next level, security would be involved in the protection from the acts of invaders as well as from the acts of employees. Terrorism is another threat for a firm’s premises...
9 Pages(2250 words)Coursework

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages(1750 words)Assignment

Role of the Police and Private Security

... of Criminal Justice in the Office of the Attorney General, and other law enforcement agencies specifically designated by the Director” (Mission and Executive order # 5). It also appears from various reports that terrorism is the primary crime that brings all these agencies together. Role of the police and private security personnel: The role and duty of state and local police officers have already been discussed earlier. But as you might be knowing, there is a parallel security force in the country that is not funded by the government, usually referred to as private security or private police. There are many companies and individuals offering security for corporations and individual citizens. Its staff can be hired for a specific fee...
8 Pages(2000 words)Case Study

Business Information Systems

... Information Systems , 2004). Club IT will require new and better customer management system that has the capability to manage and handle the customer needs and complaints. This system will also support and handle the customer complaints and requirements at the appropriate time and event. IT Solutions for Club IT This section will outline main security solutions which Club IT nightclub can implement regarding the effective management and handling of the business. Decision Support Systems/ DSS While Club IT nightclub implements new technology the first choice will be regarding the effectively organized decisions so decision support systems or DSSs will be the first choice, because it provides the comprehensive information of data as well...
8 Pages(2000 words)Case Study

Business Administration

2. Describe your career aspirations, the contribution you will make to the programme and, if you will be sponsored, the value you will add to your sponsoring organisation – 500 words

I researched all of the universities in the United Kingdom (UK) and the Warwick MBA called my attention since it is one of the best-reputed universities in Europe. This will give me an opportunity to introduce myself to business and understand Financial Markets and Management. This will expand my horizons both in the theoretical (course content) setting and the praxis (networking). This will also enable me to obtain my degree without having to resign to my current job, especially, during this current financial turmoil.

We s...
6 Pages(1500 words)Essay

Business Plan Real Estate Agency

re representing our company as their business consultants and our responsibilities are limited to the knowledge of the client’s business and information provided by the client.
The company Of-Fit has been operating as office supplies and equipment supplier since 1998. Their corporate office is in Aberdeen and it has excellent industry relations. The company is a sole proprietorship and its owner is Mr. Andrew Schwatz who has been working in the industry for more than 20 years. The company current staff is 8 and its revenues are £115,690 and £156,178 in 2008. The company aims to expand its operations in other business areas and regions of the UK.
The detailed business plan developed for this report incor...
12 Pages(3000 words)Business Plan

The Main Threat to Small Business

When it comes to reliability factor big businesses are able to sustain because of their track record. Big businesses are able to pacify their customers using their past successful track records.
Nowadays most of the business opportunities and orders are posted online. This means that business providers need to be well integrated with supplier systems through online facilities. The infrastructure of the business model needs to be updated. But this is not an easy task for small businesses. E-based procurement is possible only with a well-maintained network on the internet. This requires a lot of financial and technical necessities which could not be supported by small businesses. On the other hand, Big businesses are well equip...
8 Pages(2000 words)Assignment

Business Sustainability and Society: Coca-Cola Company

..., 2000). This theory discouraged the notion of self-interest while promoting every individual to act as a means of charity. Analysis from the point of view of Kant’s deontology (Furrow, pp. 79-88, 2005) indicates that Coca-Cola has been very unethical in its actions. All the practices discussed earlier in the paper were universally inappropriate and adverse for farmers and their families, as well unsustainable for the whole environment that became the victim of Coca Cola’s bottling plant in Kala Dera, and several other villages in India. Conclusion In conclusion, it is an observation that only one ethical theory showed ethical status of Coca Cola’s business practices in India, whereas, the other two regarded them as unethical. Personally...
10 Pages(2500 words)Case Study

International Business: World Economic Forum and Davos 2010

... resistant rice plants, which could ensure smooth production of food grains. The economically backward nations require more of technical collaboration. Private sector can enter these countries and start initiatives such as the one started in Senegal. Mobile technology has pervaded many societies but the scope is still immense. MNCs should think of ventures in such areas initially by just asking for a small fixed amount per month against mobile facility. Mobile telephony itself can ensure health, banking and other social benefits to the underserved areas. Another interesting area for the businesses is to cater to the needs of the ageing population. The retail sector, including the drug stores, could come with solutions to home-deliver...
7 Pages(1750 words)Coursework

Security Quality Requirements

The authors present a detailed explanation as to why software security entails more than simply getting rid of vulnerabilities and carrying out penetration tests, “ determining that such requirements have been satisfied will do nothing to ensure that the software will also behave securely even when it operates correctly” (31). The authors emphasize that IT infrastructure security practices and the techniques of network security do not adequately guard application software against security threats. They propose that software security programs should pursue a risk-management approach in order to set priorities and identify adequate measures. Security engineers and project managers must understand that software security r...
20 Pages(5000 words)Annotated Bibliography
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Discuss how security requirements can be linked to business requirements for FREE!

Contact Us