Which risk management practices would you absolutely have

Assignment Help Business Management
Reference no: EM133652356

Assignment: Information Security Means Better Business

In the progressively competitive business world, information is a valuable resource that needs utmost protection. Information security is integral in managing your business and ensuring that vital information is not compromised in any way.

Securing information is paramount for the survival of your enterprise. Hence, it must be proactively secured against malicious attacks especially when business information is transmitted over networks.

A secure information system is built on the foundation of five essential building blocks. Setting these pillars properly into place is central to developing any kind of information security mechanism in your business. Read on.

Five Pillars Of Information Assurance Framework

Information Assurance (IA) is the practice of protecting against and managing risks related to the use, processing, storage, and transmission of data and information systems. The U.S. Department of Defense has promulgated the Five Pillars of Information Assurance model that includes the protection of confidentiality, integrity, availability, authenticity, and non-repudiation of user data.

Here are the five pillars of the IA framework that you need to manage in your office cyberspace:

I. Confidentiality

This is the assurance that information is not disclosed to unauthorized individuals, groups, processes, or devices. Highly confidential data must be encrypted so third parties cannot easily decrypt it. Only those who are authorized to view the information are allowed access.

II. Integrity

The accuracy and completeness of vital information must be safeguarded. Data should not be altered or destroyed during transmission and storage. This involves making sure that an information system is not tampered by any unauthorized entities. Policies should be in place so that users know how to properly utilize their system.

III. Availability

This means that authorized users have timely and easy access to information services. IT resources and infrastructure should remain robust and fully-functional at all times even during adverse conditions, such as database conundrum or fall-overs. It involves protecting against malicious codes, hackers, and other threats that could block access to the information system.

IV. Authenticity

This security measure is designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific information. Authentication prevents impersonation and requires users to confirm their identities before being allowed access to systems and resources. This includes user names, passwords, emails, biometrics, and others.

V. Non-Repudiation

This attribute assures the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither party can deny sending, receiving, or accessing the data. Security principles should be used to prove identities and to validate the communication process.

In the article, it states that all five areas are needed to develop any kind of information security mechanism in your business. Do you agree or disagree with this assessment? Which of these risk management practices would you absolutely have to implement and which might you be able to do without? Provide rationale for each area. Then, choose one area and identify literature in the field or a case study describing how it is being addressed.

Reference no: EM133652356

Questions Cloud

Outline how proposed solution addresses the challenges : Solution development: Outline how proposed solution addresses the challenges or provides opportunities for the selected industry.
Identify capability that tesla has competitive disadvantage : Identify one capability that Tesla has a competitive disadvantage in and explain why it's a competitive disadvantage.
What is your opinion on the plan : In training for a marathon, Maria plans to secretly take a performance-enhancing drug because she believes it will help her. What is your opinion on this plan?
Why is this an example of a strategic alliance : Coke and Pepsi have decided to work together in order to produce entirely new drink. Why is this an example of a strategic alliance rather than a joint venture?
Which risk management practices would you absolutely have : Which of these risk management practices would you absolutely have to implement and which might you be able to do without?
What are teslas sales by country in its recent fiscal year : What are Tesla's Sales by country in its most recent fiscal year? Does your company publish a Corporate Social Responsibility or Sustainability report?
Relate each solution to the objectives of the company listed : Relate each solution to the objectives of the company listed and state the impact of each on the company's revenue and profitability.
Which not remedy for refused permanent residence application : Maitland believes that the visa officer, in processing the application, made an error. Which is not a remedy for a refused permanent residence application?
Evaluate how to locate an expert witness : Evaluate how to locate an expert witness, the required personal and professional qualities of the expert witness, and the specific qualities he or she needs.

Reviews

Write a Review

Business Management Questions & Answers

  Caselet on michael porter’s value chain management

The assignment in management is a two part assignment dealing 1.Theory of function of management. 2. Operations and Controlling.

  Mountain man brewing company

Mountain Man Brewing, a family owned business where Chris Prangel, the son of the president joins. Due to increase in the preference for light beer drinkers, Chris Prangel wants to introduce light beer version in Mountain Man. An analysis into the la..

  Mountain man brewing company

Mountain Man Brewing, a family owned business where Chris Prangel, the son of the president joins. An analysis into the launch of Mountain Man Light over the present Mountain Man Lager.

  Analysis of the case using the doing ethics technique

Analysis of the case using the Doing Ethics Technique (DET). Analysis of the ethical issue(s) from the perspective of an ICT professional, using the ACS Code of  Conduct and properly relating clauses from the ACS Code of Conduct to the ethical issue.

  Affiliations and partnerships

Affiliations and partnerships are frequently used to reach a larger local audience? Which options stand to avail for the Hotel manager and what problems do these pose.

  Innovation-friendly regulations

What influence (if any) can organizations exercise to encourage ‘innovation-friendly' regulations?

  Effect of regional and corporate cultural issues

Present your findings as a group powerpoint with an audio file. In addition individually write up your own conclusions as to the effects of regional cultural issues on the corporate organisational culture of this multinational company as it conducts ..

  Structure of business plan

This assignment shows a structure of business plan. The task is to write a business plane about a Diet Shop.

  Identify the purposes of different types of organisations

Identify the purposes of different types of organisations.

  Entrepreneur case study for analysis

Entrepreneur Case Study for Analysis. Analyze Robin Wolaner's suitability to be an entrepreneur

  Forecasting and business analysis

This problem requires you to apply your cross-sectional analysis skills to a real cross-sectional data set with the goal of answering a specific research question.

  Educational instructional leadership

Prepare a major handout on the key principles of instructional leadership

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd