Wednesday, May 6, 2020

Implementation Of An Effective Management †Myassignmenthelp.Com

Question: Discuss About The Implementation Of An Effective Management? Answer: Introduction There is always a need for the implementation of an effective risk management process in every organization irrespective of any industry. The aim of the risk management process is to protect the organization and help it to achieve its objectives (Reason, 2016). IT risk management deals with the proper application of the principles of risk management in IT industry (McNeil, Frey Embrechts, 2015). The security in IT has a relation with the access controls of the different subjects. The IT security model is the specification and enforcement of the different security policies. The report takes into account the threats of security in IT and the ways to assess the risks, the security models, access controls and the technology scenario. IT Security and Technology Landscape The security of information and data is very significant for any type of organization since devices contain many personal and official data that cannot be shared by everyone (Witten et al., 2016). It will be a huge loss to an individual or any organization if any data is stolen or lost. This has enabled the companies to think about the various IT security policies and technologies. This security can be restored by not giving unwanted access to any users. The security of information and computing system covers a wide area within an organization. Lack of proper understanding of the areas and the security levels of the different devices, protocols, applications, hardware and operating systems may cause security vulnerabilities that are having chances of affecting the organization. Two significant factors in the security of the information are the security model and the security policy (Siponen, Mahmood Pahnila, 2014). The security model defines an outline as to how the security measures will be implemented. It provides a blueprint and architecture of the computer system that has the chance of getting affected by malware or hackers. A security policy on the other hand, provides an outline as to how the data are accessed, what type of security is needed and what are the actions that need to be taken to protect the data from getting affected or lost. The security policy gives an outline of a computing device. The security model gives an outline of the actions that need to be taken when the necessary requirements are not met. A security model helps in outlining the required logic as well as the rules that can be implemented to make it sure that no lower-level subject can access the higher-level objects in any unauthorized way (Petritsch, 2014). It provides necess ary explanation about the development of the computing system to support the security policies. IT Security Models and Access Controls An IT security model is a type of template that provides a description as to how the security of information is carried out and governed in an organization (Islam et al., 2015). A security model helps in mapping the abstract goals of the policies of information system terms through proper specification of the techniques and data structures that are significant for the enforcement of the security policies (Peltier, 2016). Access control of the subjects in a computer system is very significant. The subjects can be any processes, user or computer and the access control deals with whether the subjects are able to perform certain operations like read, write, search, execute and delete properly on any objects like a tuple in a database, any files, resources, tables or any service. The main aim of the access control is to preserve the integrity as well as confidentiality of information (Albrechtsen, 2015). The policies of access control define the permissions of the subjects in the computing system. These policies are framed on the basis of access control models. These models define the relationships among the operations, subjects, objects and permissions. Figure 1: Sample access control matrix (Source: Sayah et al., 2016) The read and write operations are denoted by R and W in the above access control matrix. For example, Alice has the permission of read and write of the medical records but only read permission for administrative record and prescriptions. IT Security Threat and Risk Assessment There are various types of security threats that the IT industry has to deal with. These include hackers, intellectual property threats, and corporate espionage, the increasingly compromised web, cyber warfare and so one (Bodenheimer Griffin, 2014). Other noticeable threats include spyware threat, phishing threats and computer virus threats. Spyware is a program that keeps on monitoring the online activities of a user for the purpose of capturing personal information. Phishers on the other hand, tries to steal financial or any personal data through instant messages and fraudulent chats. People again as hackers, are able to create threats for the IT industry. They are programmers who break in to other systems to change, destroy and steal information which is better known as cyber-terrorism. There is a need for the assessment of risks associated with the IT. This process of risk assessment is the identification, analyzing and evaluation of the risks to ensure the security of information (Webb et al., 2014). The need for the assessment is to reduce the wastage of efforts, resources and time. The results of the risk assessment help in formulating strategies in determining appropriate actions and priorities to manage the security risks. An integrated assessment of the security risk and the audit approach create a balance between the risks of IT and the businesses and keep a control of the infrastructures like business processes, databases, network and platform and applications. Conclusion The report has inferred about the different risks that are associated with the information technology industry. The companies as well as the individuals of the IT industry are facing lot of problems regarding the security of the information of the various systems of IT. Two important factors for the security of information in IT have been taken into account in the report. The various risks have been described in details that will give the companies an insight into how the data can be stolen. This has prompted the companies to make necessary risks assessments to take precautionary measures in saving the relevant data. References Albrechtsen, E. (2015). Major accident prevention and management of information systems security in technology-based work processes. Journal of Loss Prevention in the Process Industries, 36, 84-91. Bodenheimer, D. Z., Griffin, G. (2014). Pillaging the Digital Treasure Troves: The Technology, Economics, and Law of Cyber Espionage. Scitech Lawyer, 10(2), 16. Islam, S., Ouedraogo, M., Kalloniatis, C., Mouratidis, H., Gritzalis, S. (2015). Assurance of Security and Privacy Requirements for Cloud Deployment Model. IEEE Transactions on Cloud Computing. McNeil, A. J., Frey, R., Embrechts, P. (2015). Quantitative risk management: Concepts, techniques and tools. Princeton university press. Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Petritsch, H. (2014).Break-Glass: Handling Exceptional Situations in Access Control. Springer. Reason, J. (2016). Managing the risks of organizational accidents. Routledge. Sayah, T., Coquery, E., Thion, R., Hacid, M. S. (2016). Access Control Enforcement for Selective Disclosure of Linked Data. In International Workshop on Security and Trust Management (pp. 47-63). Springer International Publishing. Siponen, M., Mahmood, M. A., Pahnila, S. (2014). Employees adherence to information security policies: An exploratory field study.Information management,51(2), 217-224. Webb, J., Ahmad, A., Maynard, S. B., Shanks, G. (2014). A situation awareness model for information security risk management. Computers security, 44, 1-15. Witten, I. H., Frank, E., Hall, M. A., Pal, C. J. (2016).Data Mining: Practical machine learning tools and techniques. Morgan Kaufman

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.