StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Discuss how security requirements can be linked to business requirements - Essay Example

Cite this document
Summary
Information Technology is an evolution within an evolution. Information technology has set new trends in the generation of computers. This Trend has imbibed various technologies that improvise the life style and business aspects of every individual in accordance with technology…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
Discuss how security requirements can be linked to business requirements
Read Text Preview

Extract of sample "Discuss how security requirements can be linked to business requirements"

Download file to see previous pages

The battle is on for finding out the efficient ways and design methodologies that can analyze the security risks and implement the appropriate mitigation solutions. As, every event or technique has a better impact and a worse impact, the technologies that speed up the business processes are also prone to increase risks of computer intrusion, fraud, disruption and many more. A successful organization not only relies on finding innovative solutions or products but also on the effective implementation of those solutions.

Here, technology plays a major role as these technological developments can make the implementations simpler, providing a wide range of choice. But the question arises so as to which is the right choice This can only be answered by thorough research on the cost, stability and reliability of the technology to be used (WALSHAM, 1993). The Information System of the firm should be able to process this task by taking the external (technology functionality) and internal (business environment) entities into account.

Thus, the understanding and integration of technological innovations plays a key role in the modeling of any Information System to support the business goals and strategies. . The organization has to analyze all the possibilities and provide the solution that is technological stable and cost-effective, to implement, maintain and modify in future.Security Management and ResponsibilitiesData OwnerEach Line Department of the company, with its own computing facilities will appoint a senior member of the staff as Data Owner.

The responsibilities of the Data Owner include:Data subject enquiry procedures.To ensure that all licenses to use systems and software is accurate, available and purchased according to financial regulations.Preparing details of who can access what information, how and when, according to the particular classification of staff and information.Ensuring that all systems are maintained in effective and controlled manner.Ensure appropriate training of staff in systems and applications use.Those systems which are operated throughout the company should also have a designated Data Owner.

Data Owners across the company will be advised by the Head of ead HeadInformation Compliance and Policy. With the existing systems, advice is available to help data owners meet their responsibility in complying with the Information Security Policy. Systems DevelopmentAll systems must comply with the main IT strategy developed for the company by the IT team. Mark Walker, a senior systems analyst, states that an IT strategy is the single most crucial factor for the success of an organization dependent on IT for its operations (Walker, 2000).

All system developments must include security issues in their consideration of new developments, seeking guidance from the Head of Information Technology.Management ResponsibilitiesThe management plays the most important part in building a successful

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Discuss how security requirements can be linked to business Essay”, n.d.)
Discuss how security requirements can be linked to business Essay. Retrieved from https://studentshare.org/miscellaneous/1502554-discuss-how-security-requirements-can-be-linked-to-business-requirements
(Discuss How Security Requirements Can Be Linked to Business Essay)
Discuss How Security Requirements Can Be Linked to Business Essay. https://studentshare.org/miscellaneous/1502554-discuss-how-security-requirements-can-be-linked-to-business-requirements.
“Discuss How Security Requirements Can Be Linked to Business Essay”, n.d. https://studentshare.org/miscellaneous/1502554-discuss-how-security-requirements-can-be-linked-to-business-requirements.
  • Cited: 0 times

CHECK THESE SAMPLES OF Discuss how security requirements can be linked to business requirements

Security as a management or technological issue

As information technology is now considered as the fundamental function, every organization acquires information systems for business automation.... In this scenario, any sort of security breach may inject an SQL injection or cross site scripting attack on the website can affect the business as well as customer confidence.... For this reason, organizations sell or trade customer information with business partners and even to third parties.... Organizations expand their business gradually....
12 Pages (3000 words) Essay

Security of Digital Signatures

hellip; Information security is an absolute essential for business and organizations.... The paper "security of Digital Signatures" deals with digital signatures, as they are considered to be addressing integrity, confidentiality, and non-repudiation of data exchanged digitally, the history of cryptography as the first concept that derived digital signatures and encryption algorithms.... Likewise, information security has three fundamental dimensions i....
14 Pages (3500 words) Literature review

Project Management and How it Relates to Purchasing and Supply Management

Major stages applied during the selection of the most qualified vendor in a proposal include review of all proposal submitted by the vendors, recording the vendor and business requirements, assigning important value for each requirement, assigning performance value to each requirement, computation of total performance value and lastly selection of the successful vendor.... Due to limited business operations by smaller business entities, they do not maintain a specific procurement department....
9 Pages (2250 words) Research Paper

Reducing Ambiguities in Customer Requirements Through Historical Knowledge

The theory is to demonstrate that ambiguities in customer requirements can be reduced with the use of a historical knowledge base of previously created Web-based forms.... According to the Software Engineering Body of Knowledge (SWEBOK), software requirements can be defined as “a property which must be exhibited in order to solve some problem in the real world” (Committee 2004).... The capstone project 'Reducing Ambiguities in Customer requirements Through Historical Knowledge' demonstrates that for successful requirements engineering, it is important for the stakeholders to have a good communication bridge....
49 Pages (12250 words) Capstone Project

Different Perception of IT Managers on Safety and Performance of a Software System

side from causing bottleneck in the software developmental process, unnecessary errors in the software requirements can be very costly on the part of the software developers.... Through proper management, systems engineering, and goal modelling, some of these problems can be easily prevented.... This paper discusses with regards to general information and the importance of safety, performance, and non-functional security requirements of software system and reasons why NFRs should be carefully observed during the early stage of software development....
24 Pages (6000 words) Research Paper

Project management and how it relates to purchasing and supply management

Major stages applied during the selection of the most qualified vendor in a proposal include review of all proposal submitted by the vendors, recording the vendor and business requirements, assigning important value for each requirement, assigning performance value to each requirement, computation of total performance value and lastly selection of the successful vendor....
9 Pages (2250 words) Research Paper

Requirements Analysis and Design in Software Development

This essay "requirements Analysis and Design in Software Development" presents a detailed analysis of the two most important stages of a traditional software development life cycle, these stages are: requirements analysis and software design.... requirements analysis and software design processes of different software development methods will be also be discussed in this paper.... Basically, the objective of software engineering is to provide software engineers with a wide variety of guidelines, processes, techniques, and principles through which they can develop dependable, affordable, and efficient systems at the same time as satisfying all the requirements specified by the customers for those systems....
20 Pages (5000 words) Essay

Security Quality Requirements

This paper 'Security Quality requirements" focuses on the fact that the authors of the complete textbook draw widely on the systematic method created for the Build Security In (BSI) Web site to represent two renowned resources in the security world: Cigital, Inc.... nbsp; The authors present a detailed explanation as to why software security entails more than simply getting rid of vulnerabilities and carrying out penetration tests, “ determining that such requirements have been satisfied will do nothing to ensure that the software will also behave securely even when it operates correctly” (31)....
20 Pages (5000 words) Annotated Bibliography
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us