Wednesday, May 1, 2019

Managing Information 2 Assignment Example | Topics and Well Written Essays - 1500 words

Managing Information 2 - Assignment ExampleIf considering the enterprise government, focus on executing management actions is required to support the strategic goals of the government activity (JOHNSTON et al. 2009). It has been calculated approximately half of the breaches to the pledge of the development systems are made by the internal cater or employee of the organization (Spears et al. 2010). Security contingency management facilitates the development of aegis happening handling and planning including preparation for detection and reply to selective information protective covering issues. The standard of the incident management primarily relates to ensure the existence of processes rather than the contents of these maps. The security incident of different computing systems will have dissimilar effects and escort to different consequences, bureau, departments the organization need to tailor the security incident handling plan according to specific operational requiremen ts. Organizations arrange enormous money to buy and install computing equipments for securing their engagements. Information systems security is a challenge for executives and the information technology professionals (Dhillon et al. 2006).Organizations focus on performance and efficiency of the security equipments. This is not enough, as human treatment and a proper plan need to be defined. The information technology professionals are not just responsible for securing the information systems, all the employees of the organization are responsible (Rotvold 2008). One needs to know what an incident is, before making a plan for dealing with the computer incidents. A simple definition is unattached in network dictionary which says An incident as an adverse network event in an information system or network or the threat of the occurrence of such an event. For organizations to be competitive with network incidents, they must lay a foundation within the organization for incident handli ng. The incident handling procedure refers to an action plan associated with security breaches, thefts, distributed denial of service, fire, floods etc. Incident handling consists of six-step process research, classification, restraint, purge, revival, and lessons learned. The information security should be handled internally and externally by the employees of the organization. They will be supported by the security teams with high-powered information security officers. The employees who do not have insufficient skills in dealing with information security, they throw out perform well in reducing risk factors (Bulgurcu et al. 2010). In each major business unit, an employee with a skill set of solid risk management and project management can be a good choice to be an information security officer. Likewise, the primary objective is to enforce policies and train the break off users for following the procedures made for each policy. Moreover, acceptable use for networks and data on in formation systems must be communication, as end users can download suspicious codes or emails from the Internet etc. furthermore, if the company decides to outsource its security operations to another company, this will save cost but at the same metre increase risks to critical information if no care has been taken for choosing a reliable business partner. Non divine revelation agreement must be signed by the service organization and skill evaluation of the staff should also be considered. Furthermore, service level agreements

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.