logo

Security Management and Governance

   

Added on  2023-03-17

17 Pages3817 Words35 Views
Running head: SECURITY AND GOVERNANCE
Security Management and Governance
Name of the Student
Name of the University
Author’s Note:

1
SECURITY AND GOVERNANCE
Executive Summary
The main aim of this report is knowing about case study of Power AI. PAI has total of 50
employee and amongst them 25 are directly included within the designing, development,
testing as well as implementation of products. All of the employee positions are stable and
the turnover of employees is quite high for the huge demand of IT staff with proper
knowledge of AI system. The senior management comprises of 3 employees, who are Sales
Manager, Finance Manager and IT Manager and business owner. The security management
and governance program would be extremely important for Power AI. This type of program
is responsible for providing several significant advantages and major security to the
respective organization. The information and systems that are present within the organization
are involved within this specific security management and governance program. This report
has clearly outlined a security program for PAI and the details regarding risks and mitigation
strategies for assets and data.

2
SECURITY AND GOVERNANCE
Table of Contents
Part A: Report............................................................................................................................3
1. Brief Description on Advantages derived from Security Management as an ongoing
Process and Reasons for having a Security Program Policy..................................................3
2. Development of a Detailed Security Policy and Security Management Plan....................4
3. Identification of main Functions, Tasks, Responsibilities and Roles for Security
Management Program for PAI and Roles of Several Individuals and Groups in Governance
................................................................................................................................................6
4. Identification of Main Methods and Models to Develop Security Management Program 7
5. Detailed Discussion on Implications of Statutory and Legal Requirements and Main
Advantages for Formal Approach..........................................................................................8
Part B: Appendix........................................................................................................................9
1. Risk Management Plan......................................................................................................9
2. Threats, Vulnerabilities and Attacks of the Formal Plan.................................................10
3. Plan for Managing Risks and Threats..............................................................................11
4. Responsibility for Users and Vendors..............................................................................12
Summary..................................................................................................................................13
References................................................................................................................................14

3
SECURITY AND GOVERNANCE
Part A: Report
1. Brief Description on Advantages derived from Security Management as an ongoing
Process and Reasons for having a Security Program Policy
Few important and noteworthy benefits, which can be easily derived from an ongoing
process of a security management program in PAI are provided below:
a) Helping in Protection of Every Technological Information Form: Since PAI has
to deal with both artificial intelligence and hardware, it is extremely important to secure each
and every form of information such as current state of their business, which would need AI,
appropriate reasons to implement these systems of artificial intelligence as well as advantages
gained from the AI systems (Peltier 2016).
b) Increment of Resilience to all types of Cyber Attacks: An information and
communication technology security program would be quite efficient for PAI to increment
the respective resilience towards every type of cyber-attack. This particular program could
easily and promptly detect the attacks on sensitive information without even involving issues
(Sennewald and Baillie 2015).
c) Providing Proper Framework for keeping Services and Products of PAI
Protected: The third advantage of this program would be that it can provide a correct and
suitable framework to keep all assets, services and products much more upgraded and
protected.
d) Reducing Expenses: Another important and significant that PAI would be enjoying
from this program is that this type of program ensures that the organization is not incurring
huge expenses during management of security of software data (Disterer 2013).

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Management and Governance
|14
|3130
|34

Security Management and Governance
|10
|2029
|100

Information Security and Governance: Part A Report
|10
|2346
|40

Case Study of Enterprise Resource Planning
|20
|3229
|21

Information Security Management and Governance
|10
|1280
|151

Security Management and Governance (Power AI /PAI)
|16
|3124
|227