A PROJECT MANAGEMENT
Added on 2022-09-11
6 Pages1340 Words23 Views
Leadership Management
|
|
|
Running Head: PROJECT MANAGEMENT
PROJECT MANAGEMENT
Name of the Student
Name of the University
Author Note
PROJECT MANAGEMENT
Name of the Student
Name of the University
Author Note
![A PROJECT MANAGEMENT_1](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fsn%2Fe98cf228c2e2435185c6b445d1ce5279.jpg&w=3840&q=10)
PROJECT MANAGEMENT1
Question 1:
Given your knowledge of existing IS strategies, what would be your recommendations for the
implementation of your classmates’ proposed revisions to IS Governance strategies, policies,
plans, projects and priorities to leverage existing resources?
Understanding the importance of safeguarding the organizational information and data, every
company now a days are adopting different strategies. Information System Governance provides
numerous facility to the organization for identifying and ranking the most crucial risks in the initial
stage that might affect the business (Mswaka and Aluko 2015). Apart from identification and analysis
of the risk, this process also provides higher facility of monitoring the access controls related to the
information and data of the organization. The strategic direction provided by this phenomenon mainly
focuses towards achieving the objective and goal of the firm, managing the ongoing as well as the
future company risks. In addition, it also ensures that the organizational will efficiently use its
resources. The success, failure and whole working procedure of the organizational security system can
also be measured by this technology.
The COBIT (Control Objectives for Information and Related Technology) is one framework
that mainly focuses on providing IT security to the organization. This model guaranties effective
maintenance of the integrity of the information system of an organization. In addition, it also perform
risk management activity for the organization by identifying and migrating the risks. Framework,
process description, control objective, maturity model and management guidelines are some important
components of COBIT (Kwon, Ulmer and Wang. 2013). I think that, this model is more costly and
not suitable for small businesses. Meanwhile, ITIL (information technology infrastructure library) is
another ISG strategy that ensures the organization’s IT service and security will be managed across
the lifecycle. Starting from monitoring IT landscapes to managing the configuration of the system,
this phenomenon is most efficient.
The COSO is another security framework explained in the classmate’s material that mainly
emphasizes on addressing the core panels and also managing the enterprise risks. However, in this
framework, some major technical flow available, which affects its performance level. The internal
Question 1:
Given your knowledge of existing IS strategies, what would be your recommendations for the
implementation of your classmates’ proposed revisions to IS Governance strategies, policies,
plans, projects and priorities to leverage existing resources?
Understanding the importance of safeguarding the organizational information and data, every
company now a days are adopting different strategies. Information System Governance provides
numerous facility to the organization for identifying and ranking the most crucial risks in the initial
stage that might affect the business (Mswaka and Aluko 2015). Apart from identification and analysis
of the risk, this process also provides higher facility of monitoring the access controls related to the
information and data of the organization. The strategic direction provided by this phenomenon mainly
focuses towards achieving the objective and goal of the firm, managing the ongoing as well as the
future company risks. In addition, it also ensures that the organizational will efficiently use its
resources. The success, failure and whole working procedure of the organizational security system can
also be measured by this technology.
The COBIT (Control Objectives for Information and Related Technology) is one framework
that mainly focuses on providing IT security to the organization. This model guaranties effective
maintenance of the integrity of the information system of an organization. In addition, it also perform
risk management activity for the organization by identifying and migrating the risks. Framework,
process description, control objective, maturity model and management guidelines are some important
components of COBIT (Kwon, Ulmer and Wang. 2013). I think that, this model is more costly and
not suitable for small businesses. Meanwhile, ITIL (information technology infrastructure library) is
another ISG strategy that ensures the organization’s IT service and security will be managed across
the lifecycle. Starting from monitoring IT landscapes to managing the configuration of the system,
this phenomenon is most efficient.
The COSO is another security framework explained in the classmate’s material that mainly
emphasizes on addressing the core panels and also managing the enterprise risks. However, in this
framework, some major technical flow available, which affects its performance level. The internal
![A PROJECT MANAGEMENT_2](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fyp%2F22d8475f7b4f4af3b84c4fe565e83ef0.jpg&w=3840&q=10)
PROJECT MANAGEMENT2
control framework requires to be updated in many times (Flores, Antonsen and Ekstedt 2014).
Another important strategy of addressing the IT security of an organization is by performing the factor
analysis of the information. Usually, it focuses on addressing the ongoing IT risks and make several
supplementary decisions for migrating or eliminating those risks. Discussing about the policies, the
procurement policies are selected here as suitable ones for managing and controlling the IT risks and
security threats. It was found that this policy has efficient for generating social values and sourcing
good services by approximately 25% of the community enterprises. What I think is, the purposed
systems and strategies are efficient enough for discarding the security threat of the organization and
will manage the risks efficiently, yet there exist some improvements to the system.
control framework requires to be updated in many times (Flores, Antonsen and Ekstedt 2014).
Another important strategy of addressing the IT security of an organization is by performing the factor
analysis of the information. Usually, it focuses on addressing the ongoing IT risks and make several
supplementary decisions for migrating or eliminating those risks. Discussing about the policies, the
procurement policies are selected here as suitable ones for managing and controlling the IT risks and
security threats. It was found that this policy has efficient for generating social values and sourcing
good services by approximately 25% of the community enterprises. What I think is, the purposed
systems and strategies are efficient enough for discarding the security threat of the organization and
will manage the risks efficiently, yet there exist some improvements to the system.
![A PROJECT MANAGEMENT_3](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fsu%2F5faf492bff244f459ba12c21edbc3859.jpg&w=3840&q=10)
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
The Information System Governancelg...
|11
|842
|25
IT Frameworks and Controlslg...
|13
|4880
|281
IT Governance & Change Management Proposal.lg...
|14
|496
|41
Business Launching And Expansion Reportlg...
|7
|831
|15
Security Frameworks and Reference Architectures Information 2022lg...
|5
|926
|118
IT Risk Assessment at City Medical Partners using COBIT 4.1 Frameworklg...
|9
|969
|404