Information security issues that organisations face

Assignment Help Software Engineering
Reference no: EM13968427

Q1: Information security and compliance

Due to the significant dependence on IT in modern organisations, the security of data, information and systems is of vital importance. Today, key institutions pertaining to health, education, banking and more are globally networked and, through the catalyst of the Internet, subject to frequent cyberattacks, information leaks and vulnerabilities. As you saw in your Lecture Notes this week, user information is a sought-after commodity, with hundredsofthousands, even millions, of pieces of sensitive information being compromised in recent years. As such, organisations must take great care in protecting information. Nonetheless, while governments have implemented regulations for information security, compliance is still a challenging undertaking for many organisations.

On an internal level, efforts organisations undergo to comply with information security regulations and standards increase both project costs and development times. However, there are several other issues to consider to remain secure. For example, just as organisations improve technology, cyberattackers do as well, meaning organisations must remain privy to the latest security measures. For this Discussion, you will summarise the major information security and compliance issues that organisations face. You will then evaluate the resources, methods and approaches that can help make organisations more secure.

To complete this Discussion

Post: Create an initial post in which you take a position on the resources, methods and approaches that can help make firms more secure. In your post, summarise the top 3-5 major information security and compliance issues that organisations face. Also, identify and summarise the resources, methods and approaches modern organisations use to improve information security. Based on the major information security and compliance issues that organisations face, evaluate these identified resources, methods and approaches.

Verified Expert

This paper has answered the discussion question provided by the student, identifying and summarizing information security and compliance issues, with resources, methods and approaches modern organisations use to improve information security. References have been provided in APA format as no information was provided for the referencing format.

Reference no: EM13968427

Questions Cloud

What do you see as the most successful terrorist tactic : Select one terrorist tactic and explain how it has evolved over time. What do you see as the most successful terrorist tactic in the next decade, and why?
How your particular ergogenic aid enhances performance : Your Forum post must be more than 500 words long. In your Forum post: list your selected ergogenic aid,  provide the reference for your selected article using the format shown below, describe how your particular ergogenic aid enhances performance
Here at nscs members matter most : Here at NSCS members matter most. If NSCS can help you accomplish one thing to be successful in your collegiate career, what would that be? (Please respond in 300-450 words)
Examining two national security strategy documents published : Examining the two National Security Strategy documents published by the Obama Administration, assess the realist and liberal principles reflected in these documents.
Information security issues that organisations face : Create an initial post in which you take a position on the resources, methods and approaches that can help make firms more secure. In your post, summarise the top 3-5 major information security and compliance issues that organisations face.
Proposes one or more solutions/hypotheses : Proposes one or more solutions/hypotheses that indicate a deep comprehension of the problem. Solution/hypotheses are sensitive to contextual factors as well as all of the following ethical, logical, and cultural dimensions of the problem.
Problem regarding the romantic relationship : Your answer can address such things as how long you think they've known each other; whether they are boss and subordinate, friends, or in a romantic relationship; whether they are getting along or annoyed at each other;
What can be done about maintaining a sense : What can be done about maintaining a sense of what is right and wrong in the conduct of secret operations? Consider the role of Congressional oversight and codes of ethics.
Which shaft has the greater angular twist : Consider two shafts in torsion, each of the same material, length, and crosssectional area. One shaft has a solid square cross section and the other shaft has a solid circular section. Which shaft has the greater maximum shear stress and by what ..

Reviews

Write a Review

Software Engineering Questions & Answers

  Assume that you are leading a team of designers for a new

imagine you are leading a team of designers for a new software product. during the kickoff meeting the team starts to

  Analyzing project management

This solution utilizes the example of a specific project to install a complex, one hundred computer network for a corporation

  Debugging the existing software to find causes of problems

The existing software has a number of bugs filed against it. How will you go about debugging the existing software to find the causes of these problems and testing your fixes to see if they really fix the problems

  Explain about software life-cycle model

Your customized software development company describe which software life-cycle model you would use. You can use the models as described in the book, or from another source, or, alternatively define your own process.

  Use ishikawa diagram to investigate causes of problem

A restaurant is not doing well. It is doing poorly as customer patronage is low. Use Ishikawa diagram to investigate the causes of the problem.

  Agile and waterfall models of managing a project

Compare and contrast agile and Waterfall models of managing a project in the context of building an e-Commerce Website. Include diagrams or tables through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as..

  Quality web design company

the Course Project (comprised of Phase I and II) - Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design Company.

  Draw aoa network diagram representing project

Draw a AOA network diagram representing the project. Put the node numbers in circles and draw arrows from node to node, labeling each arrow with the activity letter.

  Discuss the major strengths on developing computing chips

Discuss the major strengths, weaknesses, and ethical issues on developing computing chips based off the human brain. Give your opinion on whether a computer could ever hold the complexity of the human brain.

  Effects about workplace automation

A multinational company transfers a foreign employee to the U.S. on an L-1 visa. The foreign worker is a computer programmer, working alongside an American computer programmer doing the same work.

  Evaluation of the use of the security life cycle

Write a 3- to 5-page evaluation of the use of the security life cycle. Include the following, All six phases, Review of steps unique to the security life cycle, not in common with SDLC

  What are the two most important factors in determining the

answer the module review questions listed below. these questions were chosen to demonstrate your understanding and help

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd