StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Security Strategy for Jashoppers Core Business - Case Study Example

Cite this document
Summary
The paper "Information Security Strategy for Jashopper’s Core Business" identifies strategy objectives for information security that will meet the needs of Jashopper and relevant constraints in developing and implementing information security strategy for Jashopper…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Information Security Strategy for Jashoppers Core Business
Read Text Preview

Extract of sample "Information Security Strategy for Jashoppers Core Business"

Confidentiality
can be achieved through the following strategies
 Use of firewall service- This is software that screens packets that enters or leaves a given network so as to authenticate only those which are safe.
 Use of Intrusion Detection Service- This service analyzes data packets to detect potential or real security breaches.
 Identification and Access Control- This refers to the process of authorization and authentication of individuals as they attempt to access the premises and the systems (Krag, 2009).

iii. Integrity
This refers to the reliability, accuracy, and consistency of information. To achieve this, Joshopper should take the following measures.
 Digital Certification Service. This service provides a way of encryption of information on transit so as to protect it from unintended recipients. Should a hacker have access to encrypted information, they will not be able to read or manipulate the data in any way (Warren 2008).
 Use of anti-virus software. Anti-virus acts to prevent and detect any malicious software.
 System Audit. This involves both physical and logical audits.

iv. Availability
This refers to the accessibility of information to authorized users. Ways of ensuring availability that may be applied by Jashopper include
 Back-Up. This is a key factor in ensuring availability. It can be either on-site or away depending on how much the organization intends to spend (Steve, 2008).

Question2
Develop information security strategy critical to Jashopper’s core business
Information security strategy is a plan that is supposed to follow a given program in order to mitigate risks while at the same time complying with contractual, statutory, legal, and internal organization requirements (Krag, 2009). Jashopper will need to undertake the following steps in order to come up with a good information strategy.

 Definition of control objectives- This must be in line with the organizational goals and constraints.
 Identification and assessment of available approaches to meet the objectives.
 Selection of controls- Involves comparison between cost and risk mitigation. An analysis of Secom’s proposal and other available alternatives would give a good starting point (Krag, 2009).
 Establishment of benchmarks and metrics.
 Implementation of the strategy and testing.

Question 3
Will you recommend Jashopper to manage information security internally or transfer it to other external partners?
I would recommend that they outsource (use external partners). This would have the following benefits.
i. Lower costs. Comparing the services provided by an external party and the amounts paid indicates that an external partner is by far cheaper.
ii. Skilled expertise. Using an external partner would free Joshopper from the task of providing, training, and managing skilled manpower (Warren, 2008).
iii. Increased productivity. Using an external partner will allow the organization to focus on its core business leading to increased productivity and efficiency (Krag, 2009).
iv. Distribution of risk. Using an external partner will help distribute or do away with the risks associated with running that particular function.

Question 4
Identify relevant constraints in developing and implementing information security strategy for Jashopper.
Constraints in developing and implementing information security may be external to the organization and beyond the control of the organization or internal and controllable (Warren, 2008). They include the following.

i. Change in customer requirements. This may cause an increase in vulnerability and increased complexity in organizational systems.
ii. Change in-laws (such in this particular case). This may cause an increase in the potential costs arising from exposure of sensitive information and may create new obligations for providing controlled access to information (Steve, 2008).
iii. Change in technology. Though this brings about business opportunities it also brings new vulnerabilities and risks.

Question 5
Which Secom proposal alternative will you recommend to Mamoru Sekine, CEO of Jashopper? Why? What additional security services or products will you recommend that are not included in the proposal?

I would recommend Alternative 3
This alternative though expensive is comprehensive and most likely to meet Sekine’s needs. Also, it would help him attain greater expertise, a wider range of services while cost is reduced. In addition, he would be able to retain the same responsibilities for security as if those services were performed in-house.
I would recommend that they do away with the alarm systems supported by security guards.

In conclusion, information security is a complex undertaking that requires a well-coordinated ability to identify in advance, integrate and allow people to adapt, the process and technology components that together drive the set of security initiatives. The approach allows for transparency into how resources are being allocated and which trade-offs arise when unexpected issues surface that compel executives to reconsider the security strategy priorities (Krag, 2009). Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Kindly read the assigned case Secom: Managing Information Security in Study”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1616864-kindly-read-the-assigned-case-secom-managing-information-security-in-a-risky-world-and-answer-the-questions
(Kindly Read the Assigned Case Secom: Managing Information Security in Study)
https://studentshare.org/miscellaneous/1616864-kindly-read-the-assigned-case-secom-managing-information-security-in-a-risky-world-and-answer-the-questions.
“Kindly Read the Assigned Case Secom: Managing Information Security in Study”, n.d. https://studentshare.org/miscellaneous/1616864-kindly-read-the-assigned-case-secom-managing-information-security-in-a-risky-world-and-answer-the-questions.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security Strategy for Jashoppers Core Business

E-Business. Classification, Development And Implications Of E-Business On Modern Organizations

The global information infrastructure served as the foundation for new methods of personal interaction, communication, transaction and this has tremendously changed the way people did business.... Within just few years after the mid 1990s, the internet-based business has become a larger part of the total economy.... Electronic business, generally termed as E-business, is one of the most important aspects to emerge from the internet....
16 Pages (4000 words) Essay

The Challenges of Successfully Implementing a Knowledge Management Initiative

The challenges include; power & conflict, cross-culture, leadership &organisational culture and security of information (Hislop, 2009).... Companies are also communicating and disseminating information concerning their products online.... The nature of the knowledge management facilitates access to expert information....
16 Pages (4000 words) Essay

Strategic Management System of Tesco

The essay "Strategic Management System of Tesco" focuses on the critical analysis of the major issues concerning the system of strategic management of Tesco, the market leader in the UK grocery and supermarket business sectors, as a world-class retailer on the international stage.... Superior supply chain management has always been Tesco's core strength....
17 Pages (4250 words) Essay

E-Commerce: Software Supplies and Support

In this essay, the writer tries to figure out the main principles of how e-commerce (electronic commerce) interacts with Software supply business and Customer Support sector.... In the essay "E-commerce: Software Supply and Support", the author describes a new, but now the common trend in business, called E-commerce in the case of Software Supply companies, who are trading products, which are dedicated to the internet.... Good ideas that are piloted by small software companies can be taken over by the big competitors and the originators are left out in the cold – that is unfair but then that is a business....
9 Pages (2250 words) Essay

Strategic Review of eBay Inc

is an e-commerce company that provides business to consumer and consumer to consumer sales service through the Internet.... The forces present in the external environment tend to affect business operations in the nearby future.... The business of eBay Inc.... The paper "Strategic Review of eBay Inc" discusses that amongst a range of strategic options identified in TOWS matrix the most appropriate strategies for the company are global expansion, product diversification, acquisition of other firms and usage of online security protocols....
11 Pages (2750 words) Case Study

Business Environment and Strategic Management of Primark

Its success is largely attributed to a highly organised business structures that provides its customers with what they need at within a reasonable prices.... This essay declares that Primark's product categories include the ladies wear, children's wear, men's wear, lingerie, cosmetics, fashion accessories, and the home products....
16 Pages (4000 words) Essay

E-logistics and Supply Chain Management: Tesco

Proper alignment is critical for success within any traditional business as well as with a newer electronic format (Delaney-Klinger, Boyer & Frohlich, 2003).... Tesco did not try to attempt to build a new model of business but used existing assets to grow.... Theory suggests that facilities can be reduced in online business.... Understanding the competitive strategy is essential to keep ahead of the competition.... Gaining competitive advantage requires building on the proven principles of effective strategy (quoted by Porter, cited by Delaney-Klinger et al....
6 Pages (1500 words) Assignment

The Difference Between E-commerce and E-business

An e-business strategy for a company does not imply to rebuild the entire IT infrastructure.... This paper highlights the difference between e-commerce and e-business and then discuss the importance of e-business framework.... With the help of an organization, this paper establishes that a well-integrated framework is essential for the success of e-business.... E-business is a major trend in managing a business like other important trends like supply chain management or mail order business....
10 Pages (2500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us