StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The impact of Compliance on an organisations existing information technology security - Research Paper Example

Cite this document
Summary
One such challenge is the protection and security of data and information crucial to business processes and its overall existence.
The research paper tries to explore the importance…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
The impact of Compliance on an organisations existing information technology security
Read Text Preview

Extract of sample "The impact of Compliance on an organisations existing information technology security"

Download file to see previous pages

Moving a bit more, a detailed discussion has been undertaken to throw light on how both employees and the organization fail to implement the compliance drive in the way it is planned. The shortcomings and the responses of the employees are supported by way of graphs. Lastly, the positive impacts of compliance and negatives of non-compliance to IT security has been presented with the help of survey results conducted on major international companies from all sectors. A briefing of a standard compliance program is also attached with the paper in order to let the readers know of what should actually be there to make compliance a competitive advantage for an organization.

Organizations are feeling the heat of non-complaint behavior and process and technology issues leading to mammoth losses, both financial and organizational. Executing leadership in agreement with IT security policy and compliance is emerging as a challenge. Compliance in an organization runs through the policy planning component and automation centers (Elliot 2008). Security is an essential feature in most of the organizations today and compliance gives visibility to the processes and controls within an organization.

Keeping the importance of Information Security and its relevance in today’s market place and market space, the present paper aims to explore “The Impact of Compliance on an organization’s existing Information Security policy.” 1. How compliance as an essential component of information security policy originated? What best practices are being followed and an overview of the major acts that are in place to adhere to the compliance rules. The research paper has tremendous scope of revealing the loopholes that exist in organizations and what remedial measures could be taken to put back things into original and desired manner.

Though standard framework can be followed by

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The impact of Compliance on an organisations existing information Research Paper”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1568402-the-impact-of-compliance-on-an-organisations-existing-information-technology-security
(The Impact of Compliance on an Organisations Existing Information Research Paper)
https://studentshare.org/miscellaneous/1568402-the-impact-of-compliance-on-an-organisations-existing-information-technology-security.
“The Impact of Compliance on an Organisations Existing Information Research Paper”, n.d. https://studentshare.org/miscellaneous/1568402-the-impact-of-compliance-on-an-organisations-existing-information-technology-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF The impact of Compliance on an organisations existing information technology security

Mobile Communication 1 and 2

Communication 2 What is the impact of consumerization of IT and the proliferation of mobile devices?... Some of the challenges that companies encounter in adopting m-concern include compliance concerns, perception that m-commerce is insecure, lack of security, inadequate connectivity speeds, confusion over business models related to money-flows, and immaturity of technology to integrate with present e-commerce and IT-back-end systems.... At the same time, companies find themselves under mounting pressure to avail access to business data anywhere, anytime while guaranteeing that they sustain corporate security, compliance, and integrity....
3 Pages (750 words) Essay

Information Security Policy for AMERCO Car Leasing Company

On the other hand, 'bottom-up' approach that will take inputs from the network administrator or information technology specialist will be too specific and according to the local practices that will not address issues in the current operational environment of a corporate organization.... The paper "Information security Policy for AMERCO Car Leasing Company" states Information security policy must be detailed to cover all aspects that may involve threats to the company....
6 Pages (1500 words) Term Paper

Successful Implementation of Network Security Policies

This paper "Successful Implementation of Network security Policies" focuses on the dividing of operation, development, and test systems to reduce the risk of illegal alteration or access.... security breaches possibly caused by human actions, which could be malicious, accidental, or improper installation, operation, or configuration.... his paper presents guidelines that should be adopted to ensure efficient management and security of any information and communication technology network....
6 Pages (1500 words) Assignment

Identity Theft and Networking Security

This assignment "Identity Theft and Networking security" discusses issues associated with identity theft-related information scandal in different NHS trusts, it is essential for the organization to build a strong set of information governance principles.... hellip; In relation to the proposed identity management and security awareness-training plan, it is essential for the NHS trusts to provide adequate knowledge to the employees to improve their skills to troubleshoot various types of network-related vulnerabilities....
11 Pages (2750 words) Assignment

Comparisons of Information Security Management Frameworks

In the event that incidences take place, the frameworks for information security management are able to measure the impact of the incidences and respond to them in order to minimize the resulting damage.... Information management security frameworks are developed founded on a structured set of independent recommendations, processes as well as practices predominantly from the Information security Management System Standard (ISO 27001).... Some of the benefits of possessing frameworks for information security management include the fact that they create a secure and well-arranged working environment while at the same time protecting information and information assets....
4 Pages (1000 words) Research Paper

Poor Security Policies of Welco Insurance PLC

The case study “Poor security Policies of Welco Insurance PLC” explores unpleasant findings of the internal audit and its further advice to prevent security breach attacks, Implement suitable measures, management and administrative, physical and technical control.... security Management is a huge challenge for many organizations as complexity and uncertainty have increased in today's world.... security Management can conflict within the organization and can pose to be a significant barrier to process and work effectively as the strategic goals are often in conflict with the security rules....
14 Pages (3500 words) Case Study

Cyrmru Capital Investments

hellip; The discussion will specifically rely upon the report outcomes projected by the auditors based upon which suggestive strategies will be provided with the prime intention of improvising the flexibility and security associated with the spreadsheet usage by CCI.... Rest apart, the discussion will specifically rely upon the report outcomes projected by the auditors based upon which suggestive strategies will be provided with the prime intention of improvising the flexibility and security associated with the spreadsheet usage by CCI....
24 Pages (6000 words) Coursework

Impact of Data Security on Enterprise Information Security Planning

It is, therefore, imperative to assess the impact of data security on enterprise information security planning.... the impact of data security on enterprise security planning requires each and every organization to have security program as explained in this paper.... Additionally, the incumbent reports to external information technology experts to attain, maintain, and sustain independence within the enterprise.... The organizational information technology remains in the process of iterating through the program's life cycle for all the defined areas....
13 Pages (3250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us