Ask a question from expert

Ask now

Strategic Information Security | Report

17 Pages3887 Words87 Views
   

Added on  2020-04-01

Strategic Information Security | Report

   Added on 2020-04-01

BookmarkShareRelated Documents
Running head: STRATEGIC INFORMATION SECURITYStrategic Information SecurityName of the StudentName of the UniversityAuthor’s note
Strategic Information Security | Report_1
1STRATEGIC INFORMATION SECURITYExecutive SummaryThe main objective of this report is to assist in the development of a well designed securityprogram for Norwood Systems. In the process of developing a security program, this report hasdiscusses about various roles as well as titles of security personnel of Norwood Systems. Thisreport also focuses on improving the present security structure of the organization for itsbetterment. This report gives an overview of the several threats like DoS and spoofing that canaffect the information security of the organization. It points out the training requirements that areneeded for the proper implementation of the security program. This report also gives suggestionregarding the security models that can be implemented by Norwood Systems to implementinformation security in an effective manner.
Strategic Information Security | Report_2
2STRATEGIC INFORMATION SECURITYTable of Contents1. Introduction......................................................................................................................32. Literature on Information Security..................................................................................33. Current Security Situation and Titles of the Security Personnel.....................................43.1 Risk Assessment and Threat Identification...............................................................53.2 Security Models.........................................................................................................64. Development of Security Program..................................................................................75. Roles and Responsibilities...............................................................................................96. Improvement Plan..........................................................................................................107. Training Requirements..................................................................................................118. ISO Standards and Models............................................................................................119. Conclusion.....................................................................................................................1210. Recommendations........................................................................................................1311. References....................................................................................................................14
Strategic Information Security | Report_3
3STRATEGIC INFORMATION SECURITY1. IntroductionInformation is the most important asset of an organization. In this era of information andcommunication technology, security threats and risks are becoming a major concern for theorganizations (Andress 2014). Information security deals with the protection of the integrity,availability as well as confidentiality of the sensitive and valuable information of a company.Norwood Systems is known for providing telecommunication services to enterprises, consumersand carriers across the world (Norwoodsystems.com 2017). This report discusses the security programs that can be adopted by Norwood Systems forimproving its current security structure. This report discusses about the concept of informationsecurity and provides suggestion regarding the types of security models that can be implementedfor the betterment of the organization. It identifies the security threats and risk assessment plansand programs that can be adopted. This report also provides the requirement for training plansand the suitable ISO standards as well as models for Norwood Systems. 2. Literature on Information SecurityInformation security deals with protecting systems as well as information from any typeof unauthorized or illegal access, modification, destruction as well as disclosure. The mainobjective of information security is to maintain integrity, availability and confidentiality ofinformation (Peltier 2016). Confidentiality deals with protecting or securing the valuableinformation from any type of unethical or unauthorized access. Confidentiality makes sure thatonly authorized users can access the right information as per their needs. Integrity deals withprotecting valuable information from any type of unauthorized destruction and modification.
Strategic Information Security | Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Report | Concept of Information Security
|20
|4544
|57

Strategic Information Security: ANSTO
|17
|4389
|122

Professional Skills In Information Communication Technology: Cyber Security
|20
|6717
|27

Information Security: Holiday Inn Australia
|11
|3103
|1

Cybersecurity Assignment 2022
|12
|3058
|22

Developing a security program in Banks of America
|14
|3858
|413