logo

Security Management and Governance

   

Added on  2022-12-09

13 Pages3017 Words422 Views
Running head: SECURITY MANAGEMENT AND GOVERNANCE
Security management and governance
Institution
Student name
Date

Security management and governance
Executive summary
Information technology-based companies are at the high risk of faults associated with
information tampering effects. The information is either erroneous or intentionally tampered with
by individuals and at time viruses and malware. In this document, I will report on the strategy
and the mechanism of managing these risks in the PAI Company. PAI is a company based on
the knowledge of artificial intelligence in making systems handling the power usage storage and
generation. Error in this plant will result in immense faults, and hence the topic is worth
discussion.
2

Security management and governance
Table of Contents
Executive summary.................................................................................................... 1
Introduction................................................................................................................ 2
Benefits of having a security management plan........................................................3
Reasons for having the policy.................................................................................... 4
Security policy and security management plan..........................................................4
Task, roles, and responsibilities of the security managing team................................4
Model for the development of a security management plan......................................5
Legal and statutory requirements and the benefits...................................................6
Benefits of risk management and contingency plan on the mentioned CBA..............8
Patient information..................................................................................................... 9
Responsibility of the user or the vendor.....................................................................9
Conclusion.................................................................................................................. 9
References............................................................................................................... 10
3

Security management and governance
Introduction
PAI is an artificial intelligence based company owned by private individuals and located in
Preston having an average of 50 workers with the half of the number being involved in the
process of designing, developing testing, and the implementation of the products dealt. The
company has sales, development and support team, finance, information technology, and human
resource as the major departments in the organization. The items produced has a significant
similarity in the engine make up bearing on the fact that, they are all built in the foundation of
artificial intelligence.
The design and the entire production is under one roof, and therefore the company may face a
tremendous loss in case the information that is to be used is lost or declared illegal. Further, the
company may be subjected to heavy damage in case the data in use is provided by the rivals or
the competing firms with malice (Barton, Tejay, Lane, & Terrell, 2016).
Benefits of having a security management plan
The organization has embraced data and information security measures like the use of cloud
computing, use of the firewalls, antivirus, encryption and the use of passwords. Although these
measures are not foolproof, it has helped PAI company in a significant manner. The evidence to
this is the improvement in the integrity of the information possessed by the company. The
measure of integrity the company information department has is easily measured by the level of
accuracy and the completeness of the knowledge owned by the company. This implies that the
organization no more suffers from the problem of inaccurate and incomplete data which could
cost the organization heavily in terms of loss in case the information was used.
4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Case Study of Enterprise Resource Planning
|20
|3229
|21

Security Management and Governance
|16
|2950
|185

Security Management and Governance
|17
|3817
|35

Security Management and Governance
|15
|3064
|45

Risk Assessment and Information Security System
|12
|3257
|145

Security Management and Governance
|14
|3130
|34