logo

Report on IT Governance | Study

   

Added on  2022-08-31

5 Pages780 Words25 Views
 | 
 | 
 | 
Running head: REPORT ON IT GOVERNANCE
REPORT
ON
IT GOVERNANCE
Name of the Student
Name of the university
Author Note:
Report on IT Governance | Study_1

1
IT GOVERNANCE
Introduction:
The purpose of this report is to discuss and implement security governance policy of into
the Information Technology infrastructure of the organization consists of several computer
system as well as consists of vulnerable network server since, currently the organization does not
have security compliance to protect their operational assets.
High Priority areas:
While analyzing the IT infrastructure of the organization it is identified that there are
three significant areas which requires security governance otherwise it will become very difficult
for the organization to protect their data and operational activities. The identified high priority
areas are listed below-
Information security- into the IT infrastructure of the organization it is very essential to
implement three levels of security compliance which includes the official level, secret
level and top secret level. It also requires to protect the organizational network as well
(Watson et al., 2018).
Physical Security- in order to enhance the security of the organization it is also very
essential to protect the systems of the organization.
Personnel security- this area has been selected with the purpose to protect the user
identity. Thus, it is very essential to implement effective security compliance to protect
the nominated areas.
Required Control:
Followed by the above identification the IT infrastructure of the organization requires to
implement effective controls that will help to define an effective policy, spread security
Report on IT Governance | Study_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Advance Security Techniques : Echrs Ltd
|15
|3951
|16

Cloud Privacy and Privacy Policy
|25
|7029
|142

Internet Security Report | Cyber Security
|12
|2590
|11

Security Risk Analysis
|7
|1068
|24

The securing the enterprise infrastructure
|7
|1468
|10

Report on Risk and Threat to Caduceus
|25
|5698
|242