Information Security Management: A Report for YMSC Secondary School
VerifiedAdded on 2021/04/24
|11
|2530
|95
Report
AI Summary
This report addresses information security challenges faced by Young Mind Social College (YMSC) secondary school. It proposes a new information security module to replace an outdated system, emphasizing the importance of securing sensitive data. The report explores the application of artificial intelligence (AI) and machine learning to strengthen security measures, including automated server and network protection. It details the development of a robust security policy, incorporating technologies like big data and cloud computing for threat management and risk mitigation. The report analyzes potential threats, such as software attacks and identity theft, and outlines benefits of the proposed system, including proactive threat prediction. A risk management plan, including cost-benefit analysis, is also presented to ensure effective implementation and long-term security for the school's data and operations. The conclusion stresses the need for advanced technologies to protect confidential information and prevent unauthorized access.

Running head: INFORMATION SECURITY MANAGEMENT
Information Security Management
Name of the Student
Name of the University
Author Note:
Information Security Management
Name of the Student
Name of the University
Author Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1INFORMATION SECURITY MANAGEMENT
Executive Summary:
The purpose of the report is to present the solutions to the Young Mind Social College (YMSC)
secondary school regarding the information security. A new information security module is to be
installed for the school replacing the previous old module, which is prone to the threat of attack.
The use of the new module will help the school from securing the important data and
information. The use of the various technologies under the information security such as the
artificial intelligence concept or the machine learning concept can help in the strengthening of
the security of the school.
Executive Summary:
The purpose of the report is to present the solutions to the Young Mind Social College (YMSC)
secondary school regarding the information security. A new information security module is to be
installed for the school replacing the previous old module, which is prone to the threat of attack.
The use of the new module will help the school from securing the important data and
information. The use of the various technologies under the information security such as the
artificial intelligence concept or the machine learning concept can help in the strengthening of
the security of the school.

2INFORMATION SECURITY MANAGEMENT
Table of Contents
Introduction:....................................................................................................................................1
Development of Security Policy:.................................................................................................1
Planning and Design of the Security Policy:...............................................................................3
Threats and attack that can be managed:.....................................................................................4
Benefits of the Process:...............................................................................................................5
Risk Management Plan:...............................................................................................................5
Cost Benefit Analysis:.................................................................................................................6
Conclusion:......................................................................................................................................6
References:......................................................................................................................................7
Table of Contents
Introduction:....................................................................................................................................1
Development of Security Policy:.................................................................................................1
Planning and Design of the Security Policy:...............................................................................3
Threats and attack that can be managed:.....................................................................................4
Benefits of the Process:...............................................................................................................5
Risk Management Plan:...............................................................................................................5
Cost Benefit Analysis:.................................................................................................................6
Conclusion:......................................................................................................................................6
References:......................................................................................................................................7
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3INFORMATION SECURITY MANAGEMENT
Introduction:
The report puts forward the scenario of a school, which is facing an issue related to the
information security. The report puts forward the concept of all the technologies that can be
implemented for the purpose of securing the data and the information of the school. With the
advancement in technology, the various organizations are looking forward to opting an
automated process for the purpose of security. The security is a sensitive issue that needs to be
addressed in a proper manner for the protection of the various sensitive data that are present. The
security of the data and the important files of the organization is the most important part and
more stress is given on this part in all the organizations. Following the old formal form of
security measures can pose a great amount of risk of the system being hacked. The technologies
have advanced and as a result of which the previous technologies that were used can be hacked.
The use of old technologies poses the threat that the hackers with the passage of time have found
solutions to the get into the systems of the organizations using the old technologies. The school
uses the system, which is said to be working in a proper manner (Holtfreter et al. 2016).
However, there are chances of the system being hacked. As a result, newer technology of
artificial intelligence can be chosen as a method to strengthen the security measure of the school.
The use of artificial intelligence would involve the automatic securing of the server of the school.
The use of artificial intelligence would also help in not only securing of the server of the school
but also the network through which the various data transfer and transactions are taking place.
Development of Security Policy:
The information security is the protection of the data and the other important files from
reaching the hands of the unauthorized users. Information security may involve the use of
Introduction:
The report puts forward the scenario of a school, which is facing an issue related to the
information security. The report puts forward the concept of all the technologies that can be
implemented for the purpose of securing the data and the information of the school. With the
advancement in technology, the various organizations are looking forward to opting an
automated process for the purpose of security. The security is a sensitive issue that needs to be
addressed in a proper manner for the protection of the various sensitive data that are present. The
security of the data and the important files of the organization is the most important part and
more stress is given on this part in all the organizations. Following the old formal form of
security measures can pose a great amount of risk of the system being hacked. The technologies
have advanced and as a result of which the previous technologies that were used can be hacked.
The use of old technologies poses the threat that the hackers with the passage of time have found
solutions to the get into the systems of the organizations using the old technologies. The school
uses the system, which is said to be working in a proper manner (Holtfreter et al. 2016).
However, there are chances of the system being hacked. As a result, newer technology of
artificial intelligence can be chosen as a method to strengthen the security measure of the school.
The use of artificial intelligence would involve the automatic securing of the server of the school.
The use of artificial intelligence would also help in not only securing of the server of the school
but also the network through which the various data transfer and transactions are taking place.
Development of Security Policy:
The information security is the protection of the data and the other important files from
reaching the hands of the unauthorized users. Information security may involve the use of
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4INFORMATION SECURITY MANAGEMENT
firewalls, keyloggers or some other form of technologies in order to protect the data from being
accessed by any outside user. The information security concept helps in the protection of the
various forms of data (Rittinghouse and Ransome 2016). The use of the information security will
help in the identification of the threat and then provide the solution form the removal of the
threat. The use of the information security concept involve the use of the various policies,
combining which a strong network of security system can be formed. The policy that can be
involved for securing the server and the network of the school is the use of artificial intelligence
technology. The use and implementation of the artificial intelligence technology would involve
the protection of the important information of the school in an automatic manner. The concept of
artificial intelligence implement the concept of machine learning, which responds to the cyber
security issues in an efficient manner.
The machine learning helps in identification of the risk in an easy manner and helps get
rid of the problem. The machine learning process can compare the various data and put forward
the various solutions for the solving of the issue that has arose in the organization. In this case,
there can be a number of solutions corresponding to the various problems, which can be stored in
the school system. If any problem or cyber security attack takes place then the machine learning
technology can compare the various data of the solutions that are present in the system. The help
of big data technology can store the data. As the number of and the number of solution is huge
the use of big data technology has to be made in order to store the information (John Walker
2014). Based on the data that are compared by the machine learning technology, the best solution
is put forward. The policy would help the school in safeguarding the various information about
the school and the protection of the database of the students of the school. The use of the old
interface and the old technologies would be open to attack from the outsiders. The use of the
firewalls, keyloggers or some other form of technologies in order to protect the data from being
accessed by any outside user. The information security concept helps in the protection of the
various forms of data (Rittinghouse and Ransome 2016). The use of the information security will
help in the identification of the threat and then provide the solution form the removal of the
threat. The use of the information security concept involve the use of the various policies,
combining which a strong network of security system can be formed. The policy that can be
involved for securing the server and the network of the school is the use of artificial intelligence
technology. The use and implementation of the artificial intelligence technology would involve
the protection of the important information of the school in an automatic manner. The concept of
artificial intelligence implement the concept of machine learning, which responds to the cyber
security issues in an efficient manner.
The machine learning helps in identification of the risk in an easy manner and helps get
rid of the problem. The machine learning process can compare the various data and put forward
the various solutions for the solving of the issue that has arose in the organization. In this case,
there can be a number of solutions corresponding to the various problems, which can be stored in
the school system. If any problem or cyber security attack takes place then the machine learning
technology can compare the various data of the solutions that are present in the system. The help
of big data technology can store the data. As the number of and the number of solution is huge
the use of big data technology has to be made in order to store the information (John Walker
2014). Based on the data that are compared by the machine learning technology, the best solution
is put forward. The policy would help the school in safeguarding the various information about
the school and the protection of the database of the students of the school. The use of the old
interface and the old technologies would be open to attack from the outsiders. The use of the

5INFORMATION SECURITY MANAGEMENT
most recent form of interface would help in the prevention of the hackers from attacking the
system of the school.
Planning and Design of the Security Policy:
The information security requires a proper planning and a proper design as to what
software has to be allotted to it based on the requirements. There are a number technologies
which can be used. Here the use of artificial intelligence has been made as the major technology
instrument. The other technologies that are involved are the use of the big data technology for
the storage of the large amount of data (Peltier 2016). The other technology may involve the use
of machine learning, which will compare these various data and give the best possible solution
for a particular problem. For the purpose of cyber security and the prevention of the hacker from
accessing the system of the school by the use of security credential the use of cloud computing
technology can also be made. The use of the various technologies should be decided at the time
of the design. The planning of how to implement the various technologies helps in the proper
implementation once the system has been hacked or the hacker is trying to hack. For instance,
the use of the artificial intelligence can be made in order to predict the type of error that will
occur and to put forward the solution for that (Rehman and Saba 2014). The use of the machine
learning can be made in case of any issue that is taking place, which has occurred earlier. The
machine learning technology will be helpful for the purpose of the removal of the issue by the
comparison with the previous solutions. All these are a part of the information security and can
be implemented under information security for the purpose of securing the confidential data and
the information.
most recent form of interface would help in the prevention of the hackers from attacking the
system of the school.
Planning and Design of the Security Policy:
The information security requires a proper planning and a proper design as to what
software has to be allotted to it based on the requirements. There are a number technologies
which can be used. Here the use of artificial intelligence has been made as the major technology
instrument. The other technologies that are involved are the use of the big data technology for
the storage of the large amount of data (Peltier 2016). The other technology may involve the use
of machine learning, which will compare these various data and give the best possible solution
for a particular problem. For the purpose of cyber security and the prevention of the hacker from
accessing the system of the school by the use of security credential the use of cloud computing
technology can also be made. The use of the various technologies should be decided at the time
of the design. The planning of how to implement the various technologies helps in the proper
implementation once the system has been hacked or the hacker is trying to hack. For instance,
the use of the artificial intelligence can be made in order to predict the type of error that will
occur and to put forward the solution for that (Rehman and Saba 2014). The use of the machine
learning can be made in case of any issue that is taking place, which has occurred earlier. The
machine learning technology will be helpful for the purpose of the removal of the issue by the
comparison with the previous solutions. All these are a part of the information security and can
be implemented under information security for the purpose of securing the confidential data and
the information.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6INFORMATION SECURITY MANAGEMENT
Threats and attack that can be managed:
The most common form of threat that may occur is the software threat. Many of the
organization face software threat and many banks have been facing the attacks. The school can
face the software attack, which can lead to the loss of information (Sharma, Khurana and Singh
2016). The school has emerged as one of the best school. The school has its own strategy for the
development and the growth. If the information about the plans and the strategies are leaked to
any of the person then the other schools or the organization may grow following these strategies.
The use of the information can also be made in other ways as identity theft. The identity theft
may be used by the person to carry out various malicious activities. For these reasons the
information security should be strong and secure enough. The other rival schools may look to
destroy the systems of the school or tamper with the information of the school present in the
website in order to shut down the school.
The use of the various techniques are made to get into the system of the school and may
get the various bank details or hamper the transactions that are taking place (Lafuente 2015). By
getting the database of the teachers and the students and the various personal details a number of
activities may be carried out by the process of the identity theft. Moreover, as the school is
looking to expand and increase the number of staff and also expand its project and make another
building there can be a number of useful of transactions that is going on between the school and
the other people who are involved in the project. If the hacker can get into the network of the
school then it is possible for the hacker not only to gather the information but also to hamper the
transaction and get hold of the these large transactions.
Threats and attack that can be managed:
The most common form of threat that may occur is the software threat. Many of the
organization face software threat and many banks have been facing the attacks. The school can
face the software attack, which can lead to the loss of information (Sharma, Khurana and Singh
2016). The school has emerged as one of the best school. The school has its own strategy for the
development and the growth. If the information about the plans and the strategies are leaked to
any of the person then the other schools or the organization may grow following these strategies.
The use of the information can also be made in other ways as identity theft. The identity theft
may be used by the person to carry out various malicious activities. For these reasons the
information security should be strong and secure enough. The other rival schools may look to
destroy the systems of the school or tamper with the information of the school present in the
website in order to shut down the school.
The use of the various techniques are made to get into the system of the school and may
get the various bank details or hamper the transactions that are taking place (Lafuente 2015). By
getting the database of the teachers and the students and the various personal details a number of
activities may be carried out by the process of the identity theft. Moreover, as the school is
looking to expand and increase the number of staff and also expand its project and make another
building there can be a number of useful of transactions that is going on between the school and
the other people who are involved in the project. If the hacker can get into the network of the
school then it is possible for the hacker not only to gather the information but also to hamper the
transaction and get hold of the these large transactions.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7INFORMATION SECURITY MANAGEMENT
Benefits of the Process:
Under the information security, the various policies may be applied for the various
purposes for the protection of the data of the school. The various policies such as the artificial
intelligence may help in the protection of the important information of the school. The artificial
intelligence will be help to predict the threat that is occurring (Reniers and Van Erp 2016). The
technology of artificial intelligence can tackle the issues and the threats that are about to occur by
the best possible way that is possible. The attack on the network can be handled by the use of the
cyber security part of the cloud computing. The use of the IAM role can be made in the cloud
computing for the protection of the attack on the network purpose. This will deny the access of
the internet to the unauthorized user.
Risk Management Plan:
The proper risk management plan requires the proper analyzing of the task and the
identification of the risk before any step is taken for the removal of the risk. The evaluation of
the risk is important that is to rank the level of difficulty of the risk. Based on the level of
difficulty the action has to be taken urgently or may be done later. The solution of the task has to
found. If the level of the risk is high then the solution to the risk has to be found and the risk has
to be eliminated (Chan et al. 2016). The use of information security concept can be used to
identify the level and the type of risk and to find the technology that may be used to eliminate the
risk. After monitoring of the risk then the risk is reviewed and checked if the task has been
properly eliminated. The risk analysis in this case would involve the identification of the risks
that may be involved with the school.
Benefits of the Process:
Under the information security, the various policies may be applied for the various
purposes for the protection of the data of the school. The various policies such as the artificial
intelligence may help in the protection of the important information of the school. The artificial
intelligence will be help to predict the threat that is occurring (Reniers and Van Erp 2016). The
technology of artificial intelligence can tackle the issues and the threats that are about to occur by
the best possible way that is possible. The attack on the network can be handled by the use of the
cyber security part of the cloud computing. The use of the IAM role can be made in the cloud
computing for the protection of the attack on the network purpose. This will deny the access of
the internet to the unauthorized user.
Risk Management Plan:
The proper risk management plan requires the proper analyzing of the task and the
identification of the risk before any step is taken for the removal of the risk. The evaluation of
the risk is important that is to rank the level of difficulty of the risk. Based on the level of
difficulty the action has to be taken urgently or may be done later. The solution of the task has to
found. If the level of the risk is high then the solution to the risk has to be found and the risk has
to be eliminated (Chan et al. 2016). The use of information security concept can be used to
identify the level and the type of risk and to find the technology that may be used to eliminate the
risk. After monitoring of the risk then the risk is reviewed and checked if the task has been
properly eliminated. The risk analysis in this case would involve the identification of the risks
that may be involved with the school.

8INFORMATION SECURITY MANAGEMENT
Cost Benefit Analysis:
The cost benefit analysis is another important tool, which is useful for the analysis of the
cost that is required for a particular project (Boardman et al. 2017). The analysis of the cost that
is required for the various parts of the project is presented. This will help in the analysis what can
be implemented in the future. The cost that will be required for the management of the risks that
may occur is also involved in the cost analysis. The profit calculation that is obtained after all the
expenditures behind the project is also calculated.
Conclusion:
It can be concluded from the above report that YMSC school should bring about the
advancement in the technologies that is required for the protection of the confidential
information from the access of the unauthorized users. The use of the various technologies under
the information security can be made to provide a strong security to the school. The network of
the school should be strong enough that no unauthorized user can use the network in order to
hamper the transactions of the school. The use of information security should be made in the
advanced form so that the hackers cannot hack the software. It is easy to hack an old interface.
The cost benefit analysis and a proper Risk Management Plan should be followed to implement
the project in a successful manner.
Cost Benefit Analysis:
The cost benefit analysis is another important tool, which is useful for the analysis of the
cost that is required for a particular project (Boardman et al. 2017). The analysis of the cost that
is required for the various parts of the project is presented. This will help in the analysis what can
be implemented in the future. The cost that will be required for the management of the risks that
may occur is also involved in the cost analysis. The profit calculation that is obtained after all the
expenditures behind the project is also calculated.
Conclusion:
It can be concluded from the above report that YMSC school should bring about the
advancement in the technologies that is required for the protection of the confidential
information from the access of the unauthorized users. The use of the various technologies under
the information security can be made to provide a strong security to the school. The network of
the school should be strong enough that no unauthorized user can use the network in order to
hamper the transactions of the school. The use of information security should be made in the
advanced form so that the hackers cannot hack the software. It is easy to hack an old interface.
The cost benefit analysis and a proper Risk Management Plan should be followed to implement
the project in a successful manner.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9INFORMATION SECURITY MANAGEMENT
References:
Boardman, A.E., Greenberg, D.H., Vining, A.R. and Weimer, D.L., 2017. Cost-benefit analysis:
concepts and practice. Cambridge University Press.
Reniers, G.L. and Van Erp, H.R., 2016. Cost‐Benefit Analysis. Operational Safety Economics: A
practical approach focused on the chemical and process industries, pp.149-218.
Chan, M.J., Huang, Y.B., Wen, Y.H., Chuang, H.Y., Tain, Y.L., Wang, Y.C.L. and Hsu, C.N.,
2016. Compliance with risk management plan recommendations on laboratory monitoring of
antitumor necrosis factor-α therapy in clinical practice. Journal of the Formosan Medical
Association, 115(2), pp.83-93.
Peltier, T.R., 2016. Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. CRC Press.
Rehman, A. and Saba, T., 2014. Evaluation of artificial intelligent techniques to secure
information in enterprises. Artificial Intelligence Review, 42(4), pp.1029-1044.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management,
and security. CRC press.
Lafuente, G., 2015. The big data security challenge. Network security, 2015(1), pp.12-14.
Holtfreter, K., Reisig, M.D., Pratt, T.C. and Holtfreter, R.E., 2015. Risky remote purchasing and
identity theft victimization among older Internet users. Psychology, Crime & Law, 21(7), pp.681-
698.
References:
Boardman, A.E., Greenberg, D.H., Vining, A.R. and Weimer, D.L., 2017. Cost-benefit analysis:
concepts and practice. Cambridge University Press.
Reniers, G.L. and Van Erp, H.R., 2016. Cost‐Benefit Analysis. Operational Safety Economics: A
practical approach focused on the chemical and process industries, pp.149-218.
Chan, M.J., Huang, Y.B., Wen, Y.H., Chuang, H.Y., Tain, Y.L., Wang, Y.C.L. and Hsu, C.N.,
2016. Compliance with risk management plan recommendations on laboratory monitoring of
antitumor necrosis factor-α therapy in clinical practice. Journal of the Formosan Medical
Association, 115(2), pp.83-93.
Peltier, T.R., 2016. Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. CRC Press.
Rehman, A. and Saba, T., 2014. Evaluation of artificial intelligent techniques to secure
information in enterprises. Artificial Intelligence Review, 42(4), pp.1029-1044.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management,
and security. CRC press.
Lafuente, G., 2015. The big data security challenge. Network security, 2015(1), pp.12-14.
Holtfreter, K., Reisig, M.D., Pratt, T.C. and Holtfreter, R.E., 2015. Risky remote purchasing and
identity theft victimization among older Internet users. Psychology, Crime & Law, 21(7), pp.681-
698.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10INFORMATION SECURITY MANAGEMENT
Sharma, A., Khurana, P. and Singh, S.N., 2016. Protection of software against various attacks:
issues and challenges. CSI transactions on ICT, 4(2-4), pp.271-278.
John Walker, S., 2014. Big data: A revolution that will transform how we live, work, and think.
Sharma, A., Khurana, P. and Singh, S.N., 2016. Protection of software against various attacks:
issues and challenges. CSI transactions on ICT, 4(2-4), pp.271-278.
John Walker, S., 2014. Big data: A revolution that will transform how we live, work, and think.
1 out of 11
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.



