logo

Information Security Management in the YMSC Secondary School

   

Added on  2021-04-24

11 Pages2530 Words95 Views
Running head: INFORMATION SECURITY MANAGEMENTInformation Security ManagementName of the StudentName of the UniversityAuthor Note:

1INFORMATION SECURITY MANAGEMENTExecutive Summary:The purpose of the report is to present the solutions to the Young Mind Social College (YMSC)secondary school regarding the information security. A new information security module is to beinstalled for the school replacing the previous old module, which is prone to the threat of attack.The use of the new module will help the school from securing the important data andinformation. The use of the various technologies under the information security such as theartificial intelligence concept or the machine learning concept can help in the strengthening ofthe security of the school.

2INFORMATION SECURITY MANAGEMENTTable of ContentsIntroduction:....................................................................................................................................1Development of Security Policy:.................................................................................................1Planning and Design of the Security Policy:...............................................................................3Threats and attack that can be managed:.....................................................................................4Benefits of the Process:...............................................................................................................5Risk Management Plan:...............................................................................................................5Cost Benefit Analysis:.................................................................................................................6Conclusion:......................................................................................................................................6References:......................................................................................................................................7

3INFORMATION SECURITY MANAGEMENTIntroduction:The report puts forward the scenario of a school, which is facing an issue related to theinformation security. The report puts forward the concept of all the technologies that can beimplemented for the purpose of securing the data and the information of the school. With theadvancement in technology, the various organizations are looking forward to opting anautomated process for the purpose of security. The security is a sensitive issue that needs to beaddressed in a proper manner for the protection of the various sensitive data that are present. Thesecurity of the data and the important files of the organization is the most important part andmore stress is given on this part in all the organizations. Following the old formal form ofsecurity measures can pose a great amount of risk of the system being hacked. The technologieshave advanced and as a result of which the previous technologies that were used can be hacked.The use of old technologies poses the threat that the hackers with the passage of time have foundsolutions to the get into the systems of the organizations using the old technologies. The schooluses the system, which is said to be working in a proper manner (Holtfreter et al. 2016).However, there are chances of the system being hacked. As a result, newer technology ofartificial intelligence can be chosen as a method to strengthen the security measure of the school.The use of artificial intelligence would involve the automatic securing of the server of the school.The use of artificial intelligence would also help in not only securing of the server of the schoolbut also the network through which the various data transfer and transactions are taking place. Development of Security Policy:The information security is the protection of the data and the other important files fromreaching the hands of the unauthorized users. Information security may involve the use of

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Artificial Intelligence in Accounting | Report
|21
|5051
|34

IT Risk Management : Assignment
|7
|1669
|112

Computer Security Report 2022
|14
|3515
|48

Audit Policy and Security Guidelines for Rouge Company
|5
|973
|230

IS Security and Risk Management: Telstra Corporation Ltd
|17
|3798
|88

Ransomware & Malware
|5
|581
|276