Student B. Class
Assignment 2: Requirements for the Corporate Computing Function
CIS 505 Communication Technologies
Tech Class, Ph.D.
April 28, 2013
From Table 3.1, speculate why the fifth point, “Meet information requirements of management”, is in the CIO’s list of nine (9) points:
Meeting information requirements of management is a key focus for many organizations. Companies are constantly looking for ways to improve how they manage information. Information is essential for any decision making process and day-to-day operation. Therefore, it is important that information is managed and disseminated properly throughout the organization. Management use information to establish policy and strategic planning.
…show more content…
Recommend one (1) additional point the CIO should include in order to ensure the topic of security is addressed in the mission statement. Explain your rationale for the inclusion:
Information security enabled by technology must include the means of lowering the impact of intentional and unintentional errors entering the system and to prevent unauthorized internally or externally accessing the system actions to reduce risk data validation, pre-numbered forms, and reviews for duplications. It is crucial that the mission plan include the provision of a disaster recovery and business continuity plan. On the other hand, there is much more intrusion activity today than ever before. Obviously, there is an increased concern for attacks through companies’ network in an effort to either commit malice or affect the integrity of an organization’s most valuable resource. Therefore, it is important that companies do not get complacent in their IT infrastructure security. The fact of the matter, there is no perfect system; however, it behooves organizations to protect their information by way of reducing threats and vulnerabilities. Moreover, Whitman and Mattord (2010) said it best, “because of businesses and technology have become more fluid, the concept of computer security has been replaced by the concept of information security. Companies
Information Management has to do with capturing information, efficient planning, organizing and evaluating the information to interpret for an organization to make well informed decisions. (Hinton, 2006) The main reason organizations depend on information is to improve its overall management in
Information management is a conscious process that needs to be planned. Having regular updates of the business is information gathered and this assists in any decision making. This is to be used by the business and is most useful at the starting point of the decision making process. The information gathered should be used at all levels of the business not just at senior management positions.
Organizations today use information in more than ways than one can count. Information is so important today because it is used by organizations and businesses to keep everyday business processes and day-to-day operations running smooth and without glitches. As I have looked at many business and organizational sources both in person and on the internet, I have found that a large majority of these have the information flow start at the top in the executive area. This is what I like to call the trickle-down effect. Information is set to flow among the business and organization and starts at the top and goes all the way to the bottom. During that time, information can be changed to allow only that
7. Outline the policies, procedures, systems and values of your organisation that are relevant to your role (1.7)
Reliable and valid information is essential to all businesses and organisations because they do not know where they are going and if they get to where they want to be it is more by luck than by good planning. Organisations use information for a variety of purposes and these are as
Information is the key to any organization in the world today; it is what makes an organization successful, accurate and proficient in an increasingly competitive market. Without information a company is powerless, it does not know its customer or understand them,
Organizations of all sizes face numerous compliance challenges around data privacy and IT security management. Many future computer systems will be faced with the possibility of external threats. Unless a system is entirely self-contained, any external digital interface represents an opportunity for an adversary to attack the system. Risk mitigation centers on proactively building controls, such as authentication and intrusion prevention systems, to prevent or minimize potential threats and impact.
Information Management is the collection and management of information from one or more sources and the distribution of that information to one or more audiences.
While all of these technologies have enabled exciting changes and opportunities for businesses, they have also created a unique set of challenges for business managers. Chief among all concerns about technology is the issue of information security. It seems to be almost a weekly occurrence to see a news article about yet another breach of security and loss of sensitive data. Many people will remember high profile data breaches from companies such as T.J Maxx, Boston Market, Sports Authority, and OfficeMax. In the case of T.J. Maxx, a data breach resulted in the loss of more than 45 million credit and debit card numbers. In many of these incidents, the root cause is a lack of adequate security practices within the company. The same technologies that enable managers can also be used against them. Because of this, businesses must take appropriate steps to ensure their data remains secure and their communications remain
The use of information technology in business presents major security challenges, poses serious ethical question, and affects society in significant ways. Especially, the computer crime is a growing threat to society and is caused by the criminal or irresponsible actions of individuals who are taking advantage of the widespread use and vulnerability of computers and the Internet and other networks. It presents a major challenge to the integrity, safety, and survival of most business systems.
Confidentiality, Integrity and Availability are the three hardest aspects to preserve in information Security. Confidentiality, being the most important aspect, is the prevention of unauthorized disclosure of information. Integrity protects the information within the document by making certain that only authorized users and parties can modify the information. Lastly availability insures that information and services are available when needed. These three aspects form a bond between companies and consumers insuring the information is in safe hands. However, IT systems and networks are prone to more malicious attacks then ever before and the number of computer crimes is increasing every day. Examples include Hacking, Viruses and vulnerabilities,
16. what is the relationship between the MULTICS project in the early development of computer security?
Information management (IM) is the collection and management of information from one or more sources and the distribution of that information to one or more audiences; is also particularly critical to businesses that work in conjunction with other businesses, so the two must share information with, or transfer information to, each other. In addition, businesses with more than one department or unit can use the MIS to compile information in one central location, thereby preventing information loss.
Designing a working plan for securing the organization s information assets begins by creating or validating an existing security blueprint for the implementation of needed security controls to protect the information assets. A framework is the outline from which a more detailed blueprint evolves. The blueprint is the basis for the design, selection, and implementation of all subsequent security policies, education and training programs, and technologies. The blueprint provides scaleable, upgradeable, and comprehensive security for the coming years. The blueprint is used to plan the tasks to be accomplished and the order in which
Information is very important to a business organization. Information helps in identifying opportunities, understanding the customers in