This document provides an overview of information and security management in organizations. It discusses the importance of security management plans, risk assessment, security strategies, and actions. The document also includes a risk register and cost benefit analysis. Suitable for students studying information and security management.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INFORMATION AND SECURITY MANAGEMENT Information and Security Management Name of the Student Name of the University Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 INFORMATION AND SECURITY MANAGEMENT Table of Contents 1. Introduction............................................................................................................................2 2. Scope......................................................................................................................................2 3. Risk Assessment.....................................................................................................................3 3.1 User Authentication and Access Control.........................................................................3 3.2 Server Security.................................................................................................................3 3.3 Network Security.............................................................................................................4 3.4 Other Risks.......................................................................................................................4 3.5 Risk Register....................................................................................................................5 4. Security Strategies and Actions.............................................................................................9 4.1 User Authentication and Access Control.........................................................................9 4.2 Server Security.................................................................................................................9 4.3 Network Security.............................................................................................................9 4.4 Other Risks.....................................................................................................................10 4.5 Cost Benefit Analysis.....................................................................................................10 5. Residual Risks......................................................................................................................11 6. Resources.............................................................................................................................13 7. Maintenance and Training....................................................................................................15 References................................................................................................................................17
2 INFORMATION AND SECURITY MANAGEMENT 1. Introduction The main purpose of information and security management plan in any organization or business is to address every potential risk or threat to all the resources and assets of that particular organization (Peltier, 2016). The first step for successful establishment of this particularplanisproceedingfromeveryaspectofemergency,securityandsafety management. The most significant parts of a security management plan include program management, prevention, preparedness, response, recovery and training. Thiskindofplanisextremelyeffectiveforavoidingcrisismanagementand avoidance of creation of problems (Soomro, Shah & Ahmed, 2016). This type of plan is even helpful for fraud management and computer security. Special tools are being eventually included in this plan to ensure that better effectiveness and efficiency is being achieved. Remarkable University is deploying a new student grading system and it should be secured from any type of threat. The major components of this particular student grading system are a front end web and application server that is being utilized by the administrative staff, academics and students and a database that will be holding the grades of students (Siponen, Mahmood & Pahnila, 2014). Hence, it is needed to include information and security management plan for the system and ensure that system is free from any kind of risk or threat. The following report will be outlining a brief analysis of IT security planning for Remarkable University with relevant details. 2. Scope The organization of Remarkable University comprises of some of the major and the most significant assets of information technology. Since, they will be implementing a student grading system, it is extremely important and significant for them to ensure that the IT assets as well as resources are absolutely safe and secured. The IT assets are referred to as the
3 INFORMATION AND SECURITY MANAGEMENT company owned information, hardware and system, which is being utilized within the subsequent course of several business activities (Ifinedo, 2014). The confidential information thatarerelatedtobettermanagementincludecorporatedata,humanresourcedata, informationmanagement,contracts,maintenanceofdataandfinallyinformation management. The IT assets of this organization include computer systems, network infrastructure, system storing data and information of the students. Remarkable University has ensured that organizational risk profile is able to provide an evaluation of the willingness of the individual as well as the core capability of taking risks (Webb et al., 2014). The risk profile is extremely vital to determine a proper investment asset allocation for the university and hence it becomes quite easy to include high level of security amongst the systems and infrastructure. The scope of this information and security management plan is that it would eventually reduce the overall impact of the risks and vulnerabilities. 3. Risk Assessment 3.1 User Authentication and Access Control RisksConfidentialityIntegrityAvailability Computer systemsYesYesYes Network Infrastructures YesYesYes Datastorage Systems YesNoYes Student InformationYesYesNo Table 1: User Authentication and Access Control (Source: Created by the Author in MS Word)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 INFORMATION AND SECURITY MANAGEMENT 3.2 Server Security Digitalsecurityandphysicalsafetyarehighlyenhancedwithoutanytypeof complexity and it aims at creation of security management plan through several methods, standards, guidelines and processes, a permanent secured solution to all types of conditions that are helpful for prevention or reduction of the identified threats (Fenz et al., 2014). The server security is often being violated by incorporation of few distinctive risks and threats such as automated scanning and exploit tools, grade hacking or modification by students, targeted exploit attempts and malware. Remarkable University should consider this type of threat as vulnerable since, it could easily bring out few of the most distinctive and noteworthy issues and organizational server might be affected. 3.3 Network Security Security management is one of the most systematic and repetitive set of different types of interlinked activities that help in ensuring secured operation, hence reducing total likelihood of risks (Safa, Von Solms & Furnell, 2016). IT equipment of the organization are the other important and significant assets of this university and these are the integral components of organizational system and hence operational success is possible for the organization. Furthermore, better efficiency is also achieved without any type of complexity or issue. Network security risks are quite common in present days and they could out bring major issues in the organizational network. The most common network security risks include computer virus or worms, phishing, and many more threats. As the university will be focusing on student grading system, it would be extremely vital for them to consider their network security and ensure Internet fraud is not present in the networks. 3.4 Other Risks The security management plan helps in ensuring authenticated as well as authorized access to relevant assets. It is hence closely associated to management of authorization.
5 INFORMATION AND SECURITY MANAGEMENT Information security can be referred to the security and privacy of confidential or valuable information (Pathan, 2016). There are few of the most significant and important risks, which fall into the category of other risks, such as privacy concerns for internal and external users. These two types of risks could be treated after implementation of some of the most significant anti risk strategies or plans. 3.5 Risk Register The risk register of the identified risks is as follows: Risk DescriptionLikelihoodImpactSeverityRisk Owner Mitigating Actions Grade Modificationor Hacking,by whichstudents couldeasily modifythe gradesobtained by them. HighHighHighStudentsAsecuritysystem shouldbe implementedwithin thegradingsystem, whichcantrack every moment and IP address(Laudon& Laudon, 2016). This wouldthemost effectivemitigation actionforgrade modification. Privacy Concerns forInternal Users, by which employeesor HighLowMediumEmployees or staff Implementationof passwordsanduser accesscontrols withinthestudent
6 INFORMATION AND SECURITY MANAGEMENT staffcoulduse thedatafor bringingthreats andmalware activitiesinthe system. grading system is the most significant and noteworthy mitigationtechnique toresolveinsider threats. Privacy Concerns forExternal Users, by which hackersor studentscould easilyhackthe confidentialdata orinformation forcommitting Internetfraud (Tøndel, Line & Jaatun, 2014). LowMediumLowStudents or other hackers Implementinganti virussoftwareor firewallsecurity withinthestudent grading system is the mostsignificant mitigationtechnique for this issue. MaliciousCodes likeWorms, couldeasily bringoutmajor harmtothe computerized systemandcan HighMediumMediumHackers or attackers Themitigation actions for malicious codes mainly include reconstructingthe network maintenance forbeingoperative effectivelyand
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7 INFORMATION AND SECURITY MANAGEMENT evenbeinthe forms of Trojans and viruses. efficiently. Implementationof anti-virus software or firewallsecurityis the second important andsignificant mitigationtechnique formalicious purposes(Bartonet al., 2016). Automated Scanningand Exploit Tools, by whichthe organizational toolsand technologies couldbe automated scanned and then exploited majorly. HighMediumMediumStudents and hackers Themitigation actions for automated scanning and exploit tools mainly include drivingthe probabilityof network management inaneffective mannerandeven ensuringchecking the tools on a regular basis. TargetedExploit Attempts,by whichhackers HighHighHighAttackers, students and Employees Themitigation actionsfortargeted exploitattempts
8 INFORMATION AND SECURITY MANAGEMENT couldeasily undertake advantages of the vulnerabilities on thesystems, presentin Remarkable University (Ahmad& Maynard, 2014). mainlyinclude ensuringan applicationrunning within the user space andnotaccessing kernelmemoryand invalidatingthe cacheofevery address in the attack buffer. Phishing Attempts,by which any target isbeing contactedeither textmessage, telephoneor emailsby anybodyposing as the most legal institutionfor luringvictims intoproviding their confidential datalikePIIor MediumMediumMediumHackersThemitigation actionsforphishing attemptsmainly include identification as well as educating thepotentialspear phishing targetsand evaluationofthe onlineinteractions withrespective students.
9 INFORMATION AND SECURITY MANAGEMENT passwords. Table 2: Risk Register of Identified Risks (Source: Created by Author in MS Word) 4. Security Strategies and Actions 4.1 User Authentication and Access Control The security strategies and actions that are required for ensuring user authentication and access control as well as maintenance of confidentiality, integrity and availability of the fourdistinctiveITassetsofRemarkableUniversitymainlyinvolvecookiebased authentication, token based authentication and third party access (Rittinghouse & Ransome, 2017). Each of these three authentication strategies would be extremely vital for the organization to ensure that the security and privacy of the IT assets and resources are being maintainedandserviceisnotatallcompromisedunderanycircumstance.Such authentication strategieswould even ensure that the student grading system is highly authenticated. 4.2 Server Security The issues or risks highlighted in the above paragraphs for ensuring server security of Remarkable University are required to be reduced and diminished with incorporation of proper actions and strategies (Baskerville, Spagnoletti & Kim, 2014). The first and the most significant strategy of server security would be building as well as maintenance of a secured network and this is possible with installation and maintenance of a firewall configuration for protection. Another effective and efficient strategy for such risks is implementation of stronger access control measures and even regularly monitoring or testing the networks.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10 INFORMATION AND SECURITY MANAGEMENT 4.3 Network Security The major risks or vulnerabilities highlighted in the above paragraphs to ensure network security of the student grading system in Remarkable University could be reduced with major security measures such as identification of the network assets, analysis of the security risks, analysis of the security requirements or trade offs and development of a proper security plan (Safa et al., 2015). This security plan even reduces the overall impacts of the network security risks and developing processes to apply various security policies. According to the CBA provided below, 1713065 dollars are required to be undertaken for 5 years plan. Hence, this particular university would be able to achieve proper buy in from the technical staff, managers and users. 4.4 Other Risks The other risks of privacy concerns from internal and external users could be easily and promptly mitigated after incorporation of few of the major mitigation techniques, such as establishment of programs, protection of the IT assets, recognition and reporting and finally assessmentandprovidingresponses(Brown,Gommers&Serrano,2015).Thus,the organization would not face any issue in protection of the physical and cyber assets from any type of unintentional or intentional harm. 4.5 Cost Benefit Analysis The cost benefit analysis of the student’s grading system is as follows:
11 INFORMATION AND SECURITY MANAGEMENT Figure 1: CBA of Student Grading System (Created by the Author in MS Excel) 5. Residual Risks Residual risks can be defined as the subsequent amount of risks or danger that are solely associated with specific actions or events, remaining only after every inherent or natural risks are being decreased by various risk controls. The generalized formula for properly calculating this residual risk would be subtracting the total impacts of risk controls from the relevant inherent risks. The entire concept of risks would be multiplication of threats and vulnerabilities and also severity and probability (Kavanagh, Rochford & Bussa, 2015). This particular type of risk is the threat, which remains after every possible effort for identification as well as elimination of the risks that are being made. The four most basic methods to deal with such risks would be, reduction of it, avoidance of it, accepting it and finally transferring it completely. While addressing the respective residual risks, each and every organization must identify the relevant GRC or governance, risks and compliance requirements. Moreover, the respective strengths and weaknesses of the organizational control frameworks are also well
12 INFORMATION AND SECURITY MANAGEMENT determined with these residual risks and every existing risk is to be acknowledged properly. Risk appetite of the company is being defined and all available options to offset the unacceptable residual risks. During the investment as well as a business procedure, there could a lot of risks included and the entity undertakes into major consideration of every such risk. It even counters the factors within the business or even eliminate every possible risks in the entire procedure (Parsons et al., 2014). These risks, which eventually remain within the procedure, might be present due to the unknown factors could not be countered or hedged under any circumstances and these are termed as residual risks. For the case study of Remarkable University, the residual risks are required to be identified as well as treated on the first position, since they will be implementing a student’s grading system and these risks could eventually make the entire grading system extremely vulnerable and threatening and could even bring danger in the organization. The danger to the business, which remains only after every identified risk have been eradicated or mitigated by the efforts of the organization for controlling the risks. The residual risks in the case study of Remarkable University would include those risks, which could not be treated under any circumstances. The most significant examples of residual risks are targeted exploit attempts and grade hacking (Baek et al., 2014). The main reason for these two risks to be stated as the residual risks would be that there could be certain students, who could have the tendency of modifying or hacking the grades and also modifying the results of other students for personal means. This is extremely unethical in nature as the students, who are studying honestly, might be left behind and the organization might face major issues. The targeted exploit attempt is termed as a residual risk, since there could be several attempts of exploitation of data on the grading system in future as well and there is no permanent method to reduce the impact of this particular residual risk (Sommestad et al., 2014). The targeted exploit attempt
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13 INFORMATION AND SECURITY MANAGEMENT should be considered as the most significant and should be kept on top priority and the issue of grade modification should be rated as the second priority. The four distinctive methods of dealing with these types of residual risks are as follows: i)Risk Avoidance: This is the first and the foremost method to deal with the issues of risks. When an organization takes the decision of avoiding the risks for development of a brand new technology since a system or project might be having several risks, risk avoidance could be effective in place (Ahmad, Maynard & Park, 2014). This residual risk would be that the competitor would be developing the technology instead and the respective organization would become lesser competitive. The risk of targeted exploit attempt could be avoided effectively avoided only after incorporation of proper technology in the business. ii)Risk Reduction: The second important and significant method for dealing with each and every issue of risk would be risk reduction. The only method of applying this specific methodology would be improvement of the maintenance processes. These residual risks eventually remain within the procedure after inclusion of the chances of human errors like skipping steps within the process (Kanatov, Atymtayeva & Yagaliyeva, 2014). Since, the students might exploit or modify their marks in the system, there exist a high risk that the risk could not be mitigated easily and promptly. This particular risk is needed to be reduced on a priority basis, for the core purpose of obtaining better and error free results. iii)Risk Transfer: Another important and significant method to deal with the residual risks would be risk transfer. By this method, risks could be easily and promptly transferred without much complexity and issue (Knowles et al., 2015). Moreover, transferring of risks is also needed to analyse which risks should be taken into consideration and which are not. For this case study of Remarkable University, there is no such residual risk, which can be transferred.
14 INFORMATION AND SECURITY MANAGEMENT iv)Risk Acceptance: The fourth distinctive and vital method for dealing with all types of residual risks would be risk acceptance. As soon as any risk is being accepted, the entire risk would be becoming a residual risk and acceptance should not be always considered as an option. Potential rewards of investment are needed to be predicted for outweighing the risks (Hoffmann, Kiedrowicz & Stanik, 2016). For this case study of Remarkable University, there is no such residual risk, which can be accepted as both of the identified risks are vulnerable in nature. 6. Resources The most significant and important resources or components of the student grading system mainly constitute computer hardware, computer software, database, procedures, human resources, and telecommunications and data warehouses. The respective information system can be referred to as the integrated collection of components for the distinctive purposeofcollection,storageaswellasprocessingofdatatoprovideconfidential information, digital products and knowledge (Goo, Yim & Kim, 2014). The business firms as well as all other companies eventually are dependent on the information systems for carrying out as well as managing the operations, major interactions with suppliers and customers or even competition within the market place. The major resources of this particular student grading system include subsequent development as well as maintenance of the student’s grades and marks and even ensuring that there exists no threatening from the existing systems and data modifications. Innovation in the business is only possible after developing new and more rewarding relationships, altering of the kinds of products involved and many more. The major resources involved in the system are as follows: i)Computer Hardware: The first and the most significant resource of student grading system is computer hardware. The students own numerous computer systems within the form of tablets and smart phones as well as any other wearable device (B. Kim, 2014). Remarkable
15 INFORMATION AND SECURITY MANAGEMENT University will be employing distributed computer systems from the most powerful parallel processing servers for effectively dispersing the personal mobile devices getting integrated properly. ii)Computer Software: This is the second important and significant resource of student grading system. Relevant software is always required for ensuring that the grading system comprises of accurate and updated data or information. The operating system is the main software involved in this case and it helps in successful management of the data, program files and hardware for controlling the respective computer system. This is mainly done through a GUI or graphical interface. iii)Telecommunications: Another vital and noteworthy resource of student grading systemistelecommunication.Thisparticularnetworkisbeingutilizedforsuccessful connection or networking the computerized systems to properly transmit the confidential information (Flores, Antonsen & Ekstedt, 2014). Such connections are being established through wireless or wired media such as fibre optic, radio waves and coaxial cable. iv)Database and Data Warehouse: Most of the information system store the data or information within databases and this database is the subsequent collection inter linked data that is being organized so that the individual records and groups of records could be easily and promptly retrieved for satisfaction of several distinctive criteria. The most important and significant examplesof the databasesinvolve student grades and students as well as employee records in Remarkable University. v)Human Resources: The human resources or staff of the organization are the next distinctiveandimportantresourcesofthisRemarkableUniversity.Theyensurethat employees are satisfied with the work and data of the staff or employees are safe and secured under every circumstance (Cholez & Girard, 2014). It is recommended to involve better
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16 INFORMATION AND SECURITY MANAGEMENT security measures for the staff and employee so that they do not face any issue or complexity regarding their work and are able to provide better means of services to the respective organization. 7. Maintenance and Training Remarkable University should consider and undertake certain security measures for ensuring that better efficiency and effectiveness is being obtained in the business. The security system of student grading system eventually requires regular maintenance for ensuring that it is functionally optimally. It even includes inspection of the individual components,ITassetsandresourcestomakesurethateveryindividualpartis communicating perfectly with each other. The monitoring services are helpful in keeping a track of the system performances and monthly and weekly inspections are required to be conducted (Knowles et al., 2015). The respective control panel should be tested properly and the signal of the sensor within the system needs to be integrated for making the system activated. When a monitoring service is being utilized, it should be noted that the respective test mode is running efficiently unless and until the specific system does not need it. For ensuring better maintenance of the services and devices, it is needed to inspect every camera and also request for annual inspections. Moreover, malfunctions are also needed to be analysed on a priority basis as they will be dealing with students’ grades only after checking that every component, wiring and replacement is being completely effectively (Sommestad et al., 2014). Another important factor that is to be kept on mind and on top priority would be that each and every personnel or employee should be trained perfectly. Training of the employees eventually implies that the respective knowledge and skills of staff to perform specified work are being highly enhanced. Training even tries to
17 INFORMATION AND SECURITY MANAGEMENT improvise the total performances of the employees within their present work and even preparing them for the future work. The most crucial and important consequence of this training is learning and helps in preparation of the employees for fulfilling the challenging andvaryingrequirementsofthecompany(Parsonsetal.,2014).Theemployeesof Remarkable University do not need better control as well as supervision on work after getting proper training and the valuable time would be saved. Wastage of the resources would also be reduced to a high level with better training.
18 INFORMATION AND SECURITY MANAGEMENT References Ahmad, A., & Maynard, S. (2014). Teaching information security management: reflections and experiences.Information Management & Computer Security,22(5), 513-536. Ahmad, A., Maynard, S. B., & Park, S. (2014). Information security strategies: towards an organizational multi-strategy perspective.Journal of Intelligent Manufacturing,25(2), 357-370. B. Kim, E. (2014). Recommendations for information security awareness training for college students.Information Management & Computer Security,22(1), 115-126. Baek, J., Vu, Q. H., Liu, J. K., Huang, X., & Xiang, Y. (2014). A secure cloud computing basedframeworkforbigdatainformationmanagementofsmartgrid.IEEE transactions on cloud computing,3(2), 233-244. Barton, K. A., Tejay, G., Lane, M., & Terrell, S. (2016). Information system security commitment: A study of external influences on senior management.Computers & Security,59, 9-25. Baskerville, R., Spagnoletti, P., & Kim, J. (2014). Incident-centered information security: Managingastrategicbalancebetweenpreventionandresponse.Information& management,51(1), 138-151. Brown, S., Gommers, J., & Serrano, O. (2015, October). From cyber security information sharingtothreatmanagement.InProceedingsofthe2ndACMworkshopon information sharing and collaborative security(pp. 43-49). ACM. Cholez,H.,&Girard,F.(2014).Maturityassessmentandprocessimprovementfor informationsecuritymanagementinsmallandmediumenterprises.Journalof Software: Evolution and Process,26(5), 496-503.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19 INFORMATION AND SECURITY MANAGEMENT Fenz, S., Heurix, J., Neubauer, T., & Pechstein, F. (2014). Current challenges in information security risk management.Information Management & Computer Security,22(5), 410-430. Flores, W. R., Antonsen, E., & Ekstedt, M. (2014). Information security knowledge sharing inorganizations:Investigatingtheeffectofbehavioralinformationsecurity governance and national culture.Computers & Security,43, 90-110. Goo, J., Yim, M. S., & Kim, D. J. (2014). A path to successful management of employee securitycompliance:Anempiricalstudyofinformationsecurityclimate.IEEE Transactions on Professional Communication,57(4), 286-308. Hoffmann, R., Kiedrowicz, M., & Stanik, J. (2016). Risk management system as the basic paradigmoftheinformationsecuritymanagementsysteminanorganization. InMATEC Web of Conferences(Vol. 76, p. 04010). EDP Sciences. Ifinedo, P. (2014). Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition.Information & Management,51(1), 69-79. Kanatov, M., Atymtayeva, L., & Yagaliyeva, B. (2014, December). Expert systems for information security management and audit. Implementation phase issues. In2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS)(pp. 896- 900). IEEE. Kavanagh, K. M., Rochford, O., & Bussa, T. (2015). Magic quadrant for security information and event management.Gartner database, ID G,267505.
20 INFORMATION AND SECURITY MANAGEMENT Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems.International journal of critical infrastructure protection,9, 52-80. Laudon, K. C., & Laudon, J. P. (2016).Management information system. Pearson Education India. Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., & Jerram, C. (2014). Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q).Computers & security,42, 165-176. Pathan, A. S. K. (Ed.). (2016).Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press. Peltier, T. R. (2016).Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Auerbach Publications. Rittinghouse,J.W.,&Ransome,J.F.(2017).Cloudcomputing:implementation, management, and security. CRC press. Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., & Herawan, T. (2015). Information security conscious care behaviour formation in organizations.Computers & Security,53, 65-78. Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations.computers & security,56, 70-82. Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study.Information & management,51(2), 217- 224.
21 INFORMATION AND SECURITY MANAGEMENT Sommestad, T., Hallberg, J., Lundholm, K., & Bengtsson, J. (2014). Variables influencing informationsecuritypolicycompliance:asystematicreviewofquantitative studies.Information Management & Computer Security,22(1), 42-75. Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review.International Journal of Information Management,36(2), 215-225. Tøndel,I.A.,Line,M.B.,&Jaatun,M.G.(2014).Informationsecurityincident management: Current practice as reported in the literature.Computers & Security,45, 42-57. Webb, J., Ahmad, A., Maynard, S. B., & Shanks, G. (2014). A situation awareness model for information security risk management.Computers & security,44, 1-15.