Nobody downloaded yet

Information Assurance and Governance - Book Report/Review Example

Comments (0) Cite this document
The papers aims at the observation and analysis of the Burton Report presented to the MOD according to the ten principles of IT governance. The principles provide leaders with a succinct summary to use as a primer, refresher, or checklist as they refine their IT governance…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful
Information Assurance and Governance
Read TextPreview

Extract of sample
"Information Assurance and Governance"

Download file to see previous pages It has been argued that the IT governance system established in many organisations is incongruent as it has been designed in several different patches of problem solving mechanisms. The designing activity of the governance system reduces the synergy level and limits the opportunities for strategic impact from IT. In order to deal with the issue it is important for the management of the organisation to design the IT governance procedure according to the goals and objectives of the organisation. The notion requires the management of the organisation to actively play part in the procedure. Without the proper support of the management the successful designing and implementation process of IT governance cannot be undertaken. Although it is not possible to actively redesign the overall governance mechanism but it is important to undertake mechanism reviews on regular basis. The Burton report recommends undertaking assessment of IT governance system on regular basis in order to implement security improvement processes at MOD.
The report is full of recommendations for the change in the governance structure at MOD regarding the security of the IT infrastructure. It is also important to undertake change in the behaviour of the employees at the organisation according to the change in governance. The redesign in the governance system will although take some time but its effective implementation will lead to the final objective of making the security of data foul proof.
The report has recommended a change in the organisation perspective according to the direction in which the IT governance system is redesigned. Failure to do so will stultify the whole change process. The Burton report also suggests training and education all across the organisation. Burton suggested reviewing all the current training on Data Protection and Information Management, and identifying the uptake by the relevant post-holders, in order to determine future training needs.
3. Involve senior managers:
The involvement of the senior management of the organization is an important factor in the effective governance of IT in an organization. The report also contains recommendations on the aspect. It has been suggested that the MOD should properly define the responsibilities for the Departmental Chief Information Officer functions. It has been noted that although many managers want to contribute in the IT governance process but fail because they don't have the knowledge of the area where they have to play their part. The report goes further by recommending the formulation of a network of TLB CIOs and SIROs to eke the process of security and assurance of information as a critical business asset. The report also provided the solution of the absence of Defence Operating Board. It recommended the enforcement of the authority of MOD SIRO in order to address the information risk.
4. Make choices:
The successful governance practices require strategic choices. In the case of MOD security of data is an important task. With all the other IT governance issues, the security of data as suggested by Burton is a nonnegotiable issue. As mentioned ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Information Assurance and Governance Book Report/Review”, n.d.)
Information Assurance and Governance Book Report/Review. Retrieved from
(Information Assurance and Governance Book Report/Review)
Information Assurance and Governance Book Report/Review.
“Information Assurance and Governance Book Report/Review”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Information Security Audit And Assurance
...? Information Security Audit and Assurance Number: Lecturer: Information Security Audit and Assurance This is an audit carried out to determine the operation and effectiveness of the Human resource management system and its effectiveness in the management and control of activities including payroll computation and pension schemes. The collection, input, storage, processing and the dissemination of data and information in the organizations database. Increase in the use of information technology in the organization has made the operations and activities in the organization more effective. Data is stored in a database that makes access, retrieval and manipulation easy and more secure (Chrisopher, 2012). The Department of information... of...
13 Pages(3250 words)Essay
Protecting Intellectual Property Rights With Information Assurance
...?Information Assurance: Of Definitions and Particulars Introduction Information is becoming public through the invention and innovation of the Internet. Accessing the data from the Net is becoming easy. But the Net is also a site of private activities and transactions. At certain extent, eavesdroppers are able to access and avail the information in the Web that is supposed to be private or confidential. Laws concerning hacking and other “illegal” access of sensitive information are limited and lacking at the international scale. Thus, information assurance was given birth as a response to the threat of hacking and stealing vital information, especially data from particular high-profile government or institution. The definitions... and...
10 Pages(2500 words)Research Paper
Information Security and Assurance
... getting access to unencrypted customer files (Hudic et al., 2013; Kandukuri et al., 2009). Additionally, along with the likelihood that data will be misused by internal entities, in many cases there is the risk of external security attacks. In the past few years, a large number of cases of data theft have been exposed, comprising customer records, credit card numbers and other personal data, which clearly demonstrate that not even large firms are exception to security attacks. In addition, there are a large number of problems and issues that pretense critical and possible challenges for data and information security in cloud computing, comprising domain-specific restrictions, place limitations, technological or legal limitations... Security...
3 Pages(750 words)Essay
The Future of Information Assurance
...The Future of Information Assurance Introduction The outlook of information assurance has altered with the development of information process technology. The functions that information systems perform within an organization, and related transforms in vulnerability and threat models are significant. The increase in networking resulted in the enclave form of information assurance, with its powerful importance on firewalls and perimeter defense. In the future, the problem for information assurance managers will be to let large numbers of allies into the enterprise even as...
4 Pages(1000 words)Essay
Information Assurance and Governance
...Running head: INFORMATION ASSURANCE AND GOVERNANCE Information Assurance and Governance s The papers aimsat the observation and analysis of the Burton Report presented to the MOD according to the ten principles of IT governance. The principles provide leaders with a succinct summary to use as a primer, refresher, or checklist as they refine their IT governance. As Burton supported refreshing the IT governance system at MOD, many of the rules described have been followed by Burton while proposing recommendations. Only those have not been followed which are regarding the initial settlement...
8 Pages(2000 words)Essay
Information Systems Security Assurance Management
...Information Systems Security Assurance Management Summary: As the title suggests, the paper presents a case of study of disaster management and recovery by Municipal Solutions, a company that is engaged in providing information systems and solutions to municipalities in the United States. Based in Cleveland, Ohio, the company, through hard work and dedication managed to become a leader in providing software solutions exclusively to municipal corporation in the US as well as Canada. The firm was headed by its founder Paul Teitelbaum, an industrial engineer, previously employed with Pricewaterhouse Coopers. Teitelbaum is described as a visionary and a team man, who was congenial and loved to give credit to others where it was due... Systems...
2 Pages(500 words)Article
Information Technology Governance
...Information Technology Governance Introduction The success of organizational plans is depended on the effectiveness of the framework in which these plans are developed; the corporate governance rules established in all firms worldwide could ensure the achievement of organizational aims but only under the terms that all necessary measures have been taken for the alignment of these rules with the organizational environment. Another issue often appears during the enforcement of corporate governance rules within a specific organization is the fact that the various organizational needs are not equally supported; the management of information technology systems...
5 Pages(1250 words)Essay
Whither information governance
... Section/# Whither Information Governance? Introduction: Privacy and the way in which information is utilizedhas come to be an increasingly important aspect of the modern world. As society relies upon information technology in never expansive ways, the manner through which the information itself is safeguarded, who has access to it, for how long, and how they might use it all present prescient and concerning questions for users of information technology around the globe. As a means of seeking to address these issues, remedial steps have been taken throughout consumer markets, the private sector, and government (Ministry of Justice, 2014). Accordingly, in order to more deeply understand these dynamics and the means through... which...
16 Pages(4000 words)Essay
Information Systems Governance Structure
...Information Systems Governance al Affiliation) A Review of Information Systems Governance Structure at the Company According to Irani, and Love, (2008), information systems governance is an emerging trend in this information era that has encompassed our day to day livelihoods with none more than the business sector. One organization that has greatly contributed to this phenomenon is the IBM Company with many of the world’s largest corporations reliant on their Information Management system on a daily basis. Information systems governance refers to the regulation of...
2 Pages(500 words)Research Paper
Information Governance
...Briefing Paper: Information Governance Affiliation The content in this briefing paper is aimed at the Executive Board of this company with intentions of providing a feedback on a research carried out about Information Governance. As the board had previously considered Information Governance to be an area of potential investment, this paper will provide critically analyzed findings, possible pitfalls as well as the opportunities associated with it. In addition, it will give an insight as to what Information governance is as well as a solid reason for picking the specific field. With the...
12 Pages(3000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Book Report/Review on topic Information Assurance and Governance for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us