Information Assurance and Risk Management Assignment 2022
Verified
Added on 2022/10/11
|10
|2147
|19
Assignment
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head:INFORMATION ASSURANCE AND RISK MANAGEMENT INFORMATION ASSURANCE AND RISK MANAGEMENT Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1INFORMATION ASSURANCE AND RISK MANAGEMENT Table of Contents Introduction................................................................................................................................2 Objective of Operational Metrics...............................................................................................5 Conclusion..................................................................................................................................7 Reference....................................................................................................................................8
2INFORMATION ASSURANCE AND RISK MANAGEMENT Introduction This paper focuses on security compliance and organisation metrics for evaluating the efficacy of organisational information assurance program. This paper helps to develop the organisational policy and operational metrics that ensures that the comprehensive information assurance program is functional and aligns strategically in the organisation for achieving compliance goals (Brotby 2016). The assurance means ensuring trust for the development of the system, which conveys confidence for the clients. The organisation faces some problems with security engineering by measures and metrics that can assure a secured hardware and software system. This purpose of this paper is to ensure information assurance metrics that may help the organisation to meet the objective for security mechanism. It focuses on the organisational scenario where the security of HR department is unsafe and needs more security provisions for implementing efficacy of the information assurance program. The conceptofsecuritymetricsconsistsofproductevaluationcriteriaidentification,risk assessment methodology development, and information assurance strength qualification. The operational metrics are the end- to- end measures for operational support in the organisation. The operational metrics or the purpose of organisation’s security program is to monitor the work environment of the organisation. It checks for the security program and evaluates operational readiness of the organisation. It provides with the effectiveness in providing the organisation with information assurance. The need of security in the HR department can be established by the help of operational readiness metrics (Cho 2016). The operational readiness metrics is divided into three categories. Below are the operational metrics for Information Assurance Measures- Operational readiness metrics Operational practice metrics
3INFORMATION ASSURANCE AND RISK MANAGEMENT Operational environment metrics 1.Operational readiness metrics- the operational readiness metrics is derived from the traditionalmilitaryreadinessmeasuresofcombatreadiness.Theinformation assurance of an organisation is measured by measuring the units and individual performance for assigned job such as in HR department, it checks and evaluates each manger’s performance for scrutinizing effectiveness in security aspect. This is to ensure the system of HR department is operating in a proper manner or not (DiMase 2015). The readiness measures are the internal self- assessed or it has external assessed by third parties. It evaluates the issues in HR department internally or by any third party assigned by the organisation to perform the correctness in various HR functions. With the adequate architecture for securing the systems and ensuring the correctness of network in place means that the operational readiness metrics is classified as management readiness related and technical readiness related. 1.A.ManagementReadinessMetrics-Itisusedtomeasurethesupportof managementforinformationsecurityprocessintheorganisation.Itensures commitment, personnel, risk management and resource management from the HR personnel for assessing the intellectual property (Houngbo 2015). These metrics are static metrics which are mainly questionnaire- based assessments. These are mainly generated by the organisational policy reviews and procedures with respect towards the operations by interviewing management personnel. For example- the frequency of training and development or performance appraisals for employees help to evaluate the correctness of functioning in the department. It is also known as the operational procedure exercise.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4INFORMATION ASSURANCE AND RISK MANAGEMENT 1.B.Technical Readiness metrics-It is used to measure the readiness of technical support which affects the ability of the organisation to provide with information assurance while performing the operations. This includes the operations of HR department in evaluating the pay slip or evaluating the performance of the employees are accurately functioned or not. These may be static or dynamic, this includes the riskassessmentandvulnerabilityanalysisunderthestatictechnicalreadiness measurements (Jacobs 2015). The HR department have accurate records of measuring the performance of employees or not. This may result in impacting the employee who may face low pay or late appraisal. This may impact in productivity and employee may lose value for the organisation if the efficient employee is not appraised at the right time (Yuan 2016). The Information Assurance Vulnerability Alerts (IAVA) needstheinformationassurancemetricsfordeterminingandtrackingthe vulnerabilities faced in the technical resources. This helps to have an effective system and updates the status. The dynamic technical readiness assessments are physical exercise that promotes for adversarial situations (Kotenko 2014). The red team threat basedeffortsintroducesataskforcethatidentifiestheinformationassurance vulnerabilities. For example- the information design assurance red team (IDART) methodology helps to detect the probability of success and identifies the assumed time, cost used for the analysis. 2.Operational practice metrics-it is used to measure the security practices of the people who are directly or indirectly affected by the organisation’s information assurance system. If the HR department lags in security and the information of employee appraisal or any other confidential information is leaked outside the department may create huge conflicts (Kott 2015). This may engage the employees with hacking the security system for departmental information. This may lead to
5INFORMATION ASSURANCE AND RISK MANAGEMENT unfair acts if the information is not secured at right time. This metrics helps the organisation with assessing the culture, and climate that impacts the productivity of the organisation. It helps to aware the management and employees on policy of the organisation and socio- ethical awareness. For example- the issues may be with the number of users having the password operating the portal have compliance with the local password management security policy. 3.Operational environment Metrics-it is used for measuring the security relevancy aspect for the operational environment. This includes some threat from the external environment that can affect the organisation directly or indirectly. This may arise when the labour union force the management for recruiting a particular candidate who is not efficient enough for that job (Kotenko 2014). This scenario may arise when the security system is weak. This can result in conflict between management and labour union for demanding for unfair practice by the management. For example- the issues may be in the number of systems suitable for the specific penetration technique. Objective of Operational Metrics The main objective of operational metrics is to provide efficiency, consistency and high- quality services and have continuous improvement in customer experience. It provides with reports that states that the organisation is succeeding in identifying the area of improvement. To improve the services, promotes value and eases the IT sector with accurate report for analysis. To determine acceptable baselines for the operational security metrics – RiskAssessment-securityriskmanagementinvolvesidentification,analysis, treatment and monitoring the risk. The main part of the business is risk assessment
6INFORMATION ASSURANCE AND RISK MANAGEMENT process. The management information can be at risk which needs to be monitored regularly. The risk –to- Mission assessment process helps the HR department for analysing the risk and risk assessment methodology is designed for HR operation. The self- documenting methodology needs understanding in a better manner for the management regarding the relevance of technical risk (Le 2017). The technical risk enables immense effects on business process. If the information regarding promotion of information is known to the employees, this may create severe problem when the employee feels the decision is not correct. The employee may mislead by breaking some company rules or bullying about the employee who will be promoted. This may lead to negative impression among other employees who will not obey the orders from the management and will not value the management decision. Security Metrics-A security metric is the key for an organisation to achieve the responsibilityformanagingandsecuringtheinformationsystem.Themetric measures the relevant data which can satisfy the need of decision makers (Whitman 2014). The security metrics can be developed to better align with the level of implementationandscopeoforganisation’ssecuritywhichimposedthe implementation of policies that are not addressed and fulfilled. These metrics are efficacious to the terms involved in the operation of security controls by- The objective of performing regular assessments is to determine the efficacy of securityprograms.Itisimportanttounderstandthereliabilityofprograms, complianceissues, securitygaps and checksfor securitytechnology resultsas shelfware. This metrics helps to gain regular support for the program. It provides funding and help the organisation with information security teams for regular evaluation and
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7INFORMATION ASSURANCE AND RISK MANAGEMENT support the business. The evaluation is based on the performance of the existing security system and the impact of security controls. The firm always invests on new technology which is further monitored for effective performance as per the expectation of the firm. But by providing security metrics, it is not always so easy to calculate (Lu 2013). This promotes several measures that help to provide the effectiveness of security controls. These metrics are the sources for the organisation that can protect the organisation’s assets from risk. Conclusion This paper concludes that identity management is the only one area for information assurance that helped the organisation to improve in the functioning of security programs. This ensured that the security and information assurance of the organisation is highly managed and maintained to its highest priority. It helped to understand the importance of metrics for security management and information assurance.
8INFORMATION ASSURANCE AND RISK MANAGEMENT Reference Brotby, W. K., & Hinson, G. (2016).Pragmatic security metrics: applying metametrics to information security. Auerbach Publications. Cho, J. H., Hurley, P. M., & Xu, S. (2016, November). Metrics and measurement of trustworthysystems.InMILCOM2016-2016IEEEMilitaryCommunications Conference(pp. 1237-1242). IEEE. DiMase, D., Collier, Z. A., Heffner, K., & Linkov, I. (2015). Systems engineering framework for cyber physical security and resilience.Environment Systems and Decisions,35(2), 291-300. Houngbo, P. J., & Hounsou, J. T. (2015). Measuring information security: understanding and selectingappropriatemetrics.InternationalJournalofComputerScienceand Security (IJCSS),9(2), 108. Jacobs, S. (2015).Engineering information security: The application of systems engineering concepts to achieve information assurance. John Wiley & Sons. Kotenko, I. V., & Doynikova, E. (2014). Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing.JoWUA,5(3), 14-29. Kotenko, I., & Doynikova, E. (2014, April). Security assessment of computer networks based on attack graphs and security events. InInformation and Communication Technology- EurAsia Conference(pp. 462-471). Springer, Berlin, Heidelberg. Kott, A., Wang, C., & Erbacher, R. F. (Eds.). (2015).Cyber defense and situational awareness(Vol. 62). Springer. Le, N. T., & Hoang, D. B. (2017). Capability maturity model and metrics framework for cyber cloud security.Scalable Computing.
9INFORMATION ASSURANCE AND RISK MANAGEMENT Lu, T., Guo, X., Xu, B., Zhao, L., Peng, Y., & Yang, H. (2013, September). Next big thing in big data: the security of the ICT supply chain. In2013 International Conference on Social Computing(pp. 1066-1073). IEEE. Whitman, M., & Mattord, H. J. (2014). Information security governance for the non-security business executive. Yuan, X., Yang, L., Jones, B., Yu, H., & Chu, B. T. (2016). Secure software engineering education:Knowledgearea, curriculumand resources.Journal of Cybersecurity Education, Research and Practice,2016(1), 3.