University IT Security: Information Assurance and Management Report
VerifiedAdded on 2022/11/15
|9
|1977
|193
Report
AI Summary
This report delves into Information Assurance and Security Management, emphasizing the importance of securing data within IT systems. It outlines ten key steps for IT security, including password protection, secure system design, and virus protection. The report identifies key teams involved in security, such as IT management, network administration, information backup, and risk management teams, detailing their roles and responsibilities. It highlights the importance of the IT team manager's decision-making skills and the collaborative efforts of the other teams. The report also discusses the shortcomings of the overall process, such as timely tracking and efficient password management. It concludes by reiterating the significance of network security for organizations and emphasizes the need for continuous monitoring and proactive measures to protect data from external threats.

Running head: INFORMATION ASSURANCE AND SECURITY MANAGEMENT
INFORMATION ASSURANCE AND SECURITY MANAGEMENT
Name of the student:
Name of the university:
Author Note:
INFORMATION ASSURANCE AND SECURITY MANAGEMENT
Name of the student:
Name of the university:
Author Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1INFORMATION ASSURANCE AND SECURITY MANAGEMENT
Table of Contents
1.0 Introduction..........................................................................................................................3
2.0 Steps to secure the IT system...............................................................................................3
3.0 Identification of teams involved in security.........................................................................4
3.0 Steps performed by each team.............................................................................................6
4.0 Shortcomings of the overall process....................................................................................6
5.0 Conclusion............................................................................................................................7
6.0 References............................................................................................................................8
Table of Contents
1.0 Introduction..........................................................................................................................3
2.0 Steps to secure the IT system...............................................................................................3
3.0 Identification of teams involved in security.........................................................................4
3.0 Steps performed by each team.............................................................................................6
4.0 Shortcomings of the overall process....................................................................................6
5.0 Conclusion............................................................................................................................7
6.0 References............................................................................................................................8

2INFORMATION ASSURANCE AND SECURITY MANAGEMENT
1.0 Introduction
The information assurance system is depicted as a significant practice that tends to
assure the information as well as the management of the risks that are related to the usage,
storage, processing the over data. This system also further tends to transmit the data into the
overall systems as well as the processes that are used in regards to carry out these processes.
As this system is associated with the overall transmission and the flow of the data it is to be
assured that the significant security as well as privacy of the overall data is to be maintained.
In order to maintain the overall security there has to be some access management tools, which
are to be taken into consideration by the security professionals for the proper management of
the data (Soomro, Shah & Ahmed, 2016). This report will be dealing with the concept of the
overall security maintenance of the data that are flowing within the information assurance
system by developing a systematic plan as well as the teams that are involved for the
management of the security. Moreover, this report will also put a clear reflection of the
probable shortcomings within this system for efficiently carrying out the overall security of
the information.
2.0 Steps to secure the IT system
There are significant 10 steps that might be considered while managing as well as
maintain the overall security and privacy of the data or the information that is flowing in the
overall network servers as well as the network channels (Ahmad, Maynard & Shanks, 2015).
These steps are briefly stated as follows:
Protection with the help of passwords is a preliminary step taken into consideration
for the protection of data stored within the server environment.
1.0 Introduction
The information assurance system is depicted as a significant practice that tends to
assure the information as well as the management of the risks that are related to the usage,
storage, processing the over data. This system also further tends to transmit the data into the
overall systems as well as the processes that are used in regards to carry out these processes.
As this system is associated with the overall transmission and the flow of the data it is to be
assured that the significant security as well as privacy of the overall data is to be maintained.
In order to maintain the overall security there has to be some access management tools, which
are to be taken into consideration by the security professionals for the proper management of
the data (Soomro, Shah & Ahmed, 2016). This report will be dealing with the concept of the
overall security maintenance of the data that are flowing within the information assurance
system by developing a systematic plan as well as the teams that are involved for the
management of the security. Moreover, this report will also put a clear reflection of the
probable shortcomings within this system for efficiently carrying out the overall security of
the information.
2.0 Steps to secure the IT system
There are significant 10 steps that might be considered while managing as well as
maintain the overall security and privacy of the data or the information that is flowing in the
overall network servers as well as the network channels (Ahmad, Maynard & Shanks, 2015).
These steps are briefly stated as follows:
Protection with the help of passwords is a preliminary step taken into consideration
for the protection of data stored within the server environment.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3INFORMATION ASSURANCE AND SECURITY MANAGEMENT
Designing the overall system with safe methodologies so that the stored data can be
effectively reduce their exposure to the vulnerabilities as well as to the hackers within
the network industry (Sen, 2015).
The continuous screening of the overall network nodes as well as the server helps to
significantly lower down the possibilities of the unauthorized access within the
network premises.
The individuals that are trying to access the overall data or information present within
the network premises must be provide with basic knowledge as well as skills so that
they can restrict the unauthorized intervention at a preliminary stage (Lin & Liao,
2017).
The proper information is to be provided to the end users to avoid the usage of the
unknown email attachments as they can be a source of access for the hackers within
an individual’s system.
Usage of efficient antivirus methodology within the nodes of the network for
restricting the spread of the virus.
Proper knowledge of the overall constraints in regards to the cloud servers before
significantly using them.
3.0 Identification of teams involved in security
The management of the information security within an organization or within the
overall bounds of a significant network server involves a great number of individuals or
groups to sustain the potential identification as well as mitigation of the threats (Safa, Von
Solms & Furnell, 2016). These teams are also involved in the prior identification as well as
post security measures of the overall information system security management as well as its
assurance. The significant teams that are involved in regards to the management for the
Designing the overall system with safe methodologies so that the stored data can be
effectively reduce their exposure to the vulnerabilities as well as to the hackers within
the network industry (Sen, 2015).
The continuous screening of the overall network nodes as well as the server helps to
significantly lower down the possibilities of the unauthorized access within the
network premises.
The individuals that are trying to access the overall data or information present within
the network premises must be provide with basic knowledge as well as skills so that
they can restrict the unauthorized intervention at a preliminary stage (Lin & Liao,
2017).
The proper information is to be provided to the end users to avoid the usage of the
unknown email attachments as they can be a source of access for the hackers within
an individual’s system.
Usage of efficient antivirus methodology within the nodes of the network for
restricting the spread of the virus.
Proper knowledge of the overall constraints in regards to the cloud servers before
significantly using them.
3.0 Identification of teams involved in security
The management of the information security within an organization or within the
overall bounds of a significant network server involves a great number of individuals or
groups to sustain the potential identification as well as mitigation of the threats (Safa, Von
Solms & Furnell, 2016). These teams are also involved in the prior identification as well as
post security measures of the overall information system security management as well as its
assurance. The significant teams that are involved in regards to the management for the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4INFORMATION ASSURANCE AND SECURITY MANAGEMENT
overall security as well as post measures for mitigation of those threats is clearly assessed in
this area.
Firstly the team involved in the security management considers an effective IT team
manager that possess enhanced skills as well as knowledge for maintaining the appropriate
security as well as management of the information flow within the overall network servers
and within the bounds of the organization. Moreover, this includes a network administration
team that deals with skilled personals in the field of networking (Yüksel, Küpçü & Özkasap,
2017). This team will be responsible for the maintenance of the network, overall
infrastructure as well as the other constraints within the network bounds. This team also
effectively maintains the overall data or information flow within the network servers as well
as tends to back up the important information so that they are not lost whenever a cyber-
attack has hit the server of the organization. Another team is depicted to be present within
this overall IT security management is the information back up team. This team involves the
overall backup of the important information or the data that is significantly important to the
organization or the individual after the information system has faced any kind of cyber-attack
or data hindrance methodology within the overall servers. The significant team that is
associated with the IT security management is the risk management team. The primary steps
that is adhered by this team is depicted as the identification of the probable risk that might
affect the overall data present within the server system as well as the nodes through which the
data is being communicated to other network channels (Utomo, Wills & Walters, 2018). The
key responsibility of this team is to identify the attack prior to its occurrence as well as to
take significant steps in order to mitigate these risks as soon as possible. In accordance to
mitigate the risks the effective as well as enhanced methodologies are to be adhered so that
the risk can be easily mitigated whereas the overall flow of the information within the
overall security as well as post measures for mitigation of those threats is clearly assessed in
this area.
Firstly the team involved in the security management considers an effective IT team
manager that possess enhanced skills as well as knowledge for maintaining the appropriate
security as well as management of the information flow within the overall network servers
and within the bounds of the organization. Moreover, this includes a network administration
team that deals with skilled personals in the field of networking (Yüksel, Küpçü & Özkasap,
2017). This team will be responsible for the maintenance of the network, overall
infrastructure as well as the other constraints within the network bounds. This team also
effectively maintains the overall data or information flow within the network servers as well
as tends to back up the important information so that they are not lost whenever a cyber-
attack has hit the server of the organization. Another team is depicted to be present within
this overall IT security management is the information back up team. This team involves the
overall backup of the important information or the data that is significantly important to the
organization or the individual after the information system has faced any kind of cyber-attack
or data hindrance methodology within the overall servers. The significant team that is
associated with the IT security management is the risk management team. The primary steps
that is adhered by this team is depicted as the identification of the probable risk that might
affect the overall data present within the server system as well as the nodes through which the
data is being communicated to other network channels (Utomo, Wills & Walters, 2018). The
key responsibility of this team is to identify the attack prior to its occurrence as well as to
take significant steps in order to mitigate these risks as soon as possible. In accordance to
mitigate the risks the effective as well as enhanced methodologies are to be adhered so that
the risk can be easily mitigated whereas the overall flow of the information within the

5INFORMATION ASSURANCE AND SECURITY MANAGEMENT
network channels and server is restored within real time, thus causing no disruption to the
individuals associated with this procedure.
The teams that are stated above are depicted to work in accordance to the overall
concern of the IT team manager as the individual holding this position possess the significant
skills as well as decision-making capability (Shameli-Sendi, Aghababaei-Barzegar & Cheriet,
2016). These skills enhances the execution of the overall processes within the IT data or
information security thus effectively carrying out the flow of the data as well as information
within the network channels.
3.0 Steps performed by each team
The overall steps mentioned in the previous stages of the report is to be adhered by
the different teams associated with the security of the information systems. The IT team
manager is the significant individual that effectively carries out the overall decision that are
needed for the security protection of the data or information as stored within the network
server systems (Mengke et al., 2016). The risk management team is associated with the
identification as well as providing the effective solution whenever there is a security breach
within the server systems of the organization. Moreover, the network team and the
information back up team combined tends to adhere the security measures as well as the
significant implications needed to secure the data as well as information (Domingues,
Sampaio & Arezes, 2015). In addition to this the constant surveillance of the overall server
systems is performed by the network management team so that the prior identification of any
risks can be identified thus providing effective solutions to the same for restricting them.
4.0 Shortcomings of the overall process
The processes as stated in the previous parts of the assignment are depicted to be
significantly followed by the organization. Moreover, the identified shortcomings may be
network channels and server is restored within real time, thus causing no disruption to the
individuals associated with this procedure.
The teams that are stated above are depicted to work in accordance to the overall
concern of the IT team manager as the individual holding this position possess the significant
skills as well as decision-making capability (Shameli-Sendi, Aghababaei-Barzegar & Cheriet,
2016). These skills enhances the execution of the overall processes within the IT data or
information security thus effectively carrying out the flow of the data as well as information
within the network channels.
3.0 Steps performed by each team
The overall steps mentioned in the previous stages of the report is to be adhered by
the different teams associated with the security of the information systems. The IT team
manager is the significant individual that effectively carries out the overall decision that are
needed for the security protection of the data or information as stored within the network
server systems (Mengke et al., 2016). The risk management team is associated with the
identification as well as providing the effective solution whenever there is a security breach
within the server systems of the organization. Moreover, the network team and the
information back up team combined tends to adhere the security measures as well as the
significant implications needed to secure the data as well as information (Domingues,
Sampaio & Arezes, 2015). In addition to this the constant surveillance of the overall server
systems is performed by the network management team so that the prior identification of any
risks can be identified thus providing effective solutions to the same for restricting them.
4.0 Shortcomings of the overall process
The processes as stated in the previous parts of the assignment are depicted to be
significantly followed by the organization. Moreover, the identified shortcomings may be
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6INFORMATION ASSURANCE AND SECURITY MANAGEMENT
firstly considered as timely tracking of the overall networking systems associated with the
server systems. If this constraint is not adhered by the responsible IT team managers then the
server may be exposed to the attackers thus hampering the overall data present in this
network fields. Moreover, the efficient passwords are to be provided which not taken into
consideration may lead the data to be very easily accessible to the hackers as well as cyber
attackers. This two processes are significantly depicted to be important in regards to the fact
that this are important for the overall execution of the prominent and effective flow of the
data within the server as well as information systems.
5.0 Conclusion
Thus, the overall report states the significant areas that are to be focused by an
organization in order to keep the data secure from the external approaches as identified in the
report. Moreover, the overall teams that are associated with the network security is depicted
to be significantly provided in this report. Thus, it can be concluded that the overall network
security is an important constraint that is to be adhered by the organizations for the
maintenance of the information and its security.
firstly considered as timely tracking of the overall networking systems associated with the
server systems. If this constraint is not adhered by the responsible IT team managers then the
server may be exposed to the attackers thus hampering the overall data present in this
network fields. Moreover, the efficient passwords are to be provided which not taken into
consideration may lead the data to be very easily accessible to the hackers as well as cyber
attackers. This two processes are significantly depicted to be important in regards to the fact
that this are important for the overall execution of the prominent and effective flow of the
data within the server as well as information systems.
5.0 Conclusion
Thus, the overall report states the significant areas that are to be focused by an
organization in order to keep the data secure from the external approaches as identified in the
report. Moreover, the overall teams that are associated with the network security is depicted
to be significantly provided in this report. Thus, it can be concluded that the overall network
security is an important constraint that is to be adhered by the organizations for the
maintenance of the information and its security.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7INFORMATION ASSURANCE AND SECURITY MANAGEMENT
6.0 References
Ahmad, A., Maynard, S. B., & Shanks, G. (2015). A case analysis of information systems
and security incident responses. International Journal of Information Management,
35(6), 717-723.
Domingues, J. P. T., Sampaio, P., & Arezes, P. M. (2015). Analysis of integrated
management systems from various perspectives. Total Quality Management &
Business Excellence, 26(11-12), 1311-1334.
Lin, I. C., & Liao, T. C. (2017). A Survey of Blockchain Security Issues and Challenges. IJ
Network Security, 19(5), 653-659.
Mengke, Y., Xiaoguang, Z., Jianqiu, Z., & Jianjian, X. (2016). Challenges and solutions of
information security issues in the age of big data. China Communications, 13(3), 193-
202.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance
model in organizations. computers & security, 56, 70-82.
Sen, J. (2015). Security and privacy issues in cloud computing. In Cloud Technology:
Concepts, Methodologies, Tools, and Applications (pp. 1585-1630). IGI Global.
Shameli-Sendi, A., Aghababaei-Barzegar, R., & Cheriet, M. (2016). Taxonomy of
information security risk assessment (ISRA). Computers & Security, 57, 14-30.
Shameli-Sendi, A., Aghababaei-Barzegar, R., & Cheriet, M. (2016). Taxonomy of
information security risk assessment (ISRA). Computers & Security, 57, 14-30.
Utomo, R. G., Wills, G. B., & Walters, R. J. (2018, October). Investigating Factors in
Information Assurance Implementation: Towards Developing an Information
6.0 References
Ahmad, A., Maynard, S. B., & Shanks, G. (2015). A case analysis of information systems
and security incident responses. International Journal of Information Management,
35(6), 717-723.
Domingues, J. P. T., Sampaio, P., & Arezes, P. M. (2015). Analysis of integrated
management systems from various perspectives. Total Quality Management &
Business Excellence, 26(11-12), 1311-1334.
Lin, I. C., & Liao, T. C. (2017). A Survey of Blockchain Security Issues and Challenges. IJ
Network Security, 19(5), 653-659.
Mengke, Y., Xiaoguang, Z., Jianqiu, Z., & Jianjian, X. (2016). Challenges and solutions of
information security issues in the age of big data. China Communications, 13(3), 193-
202.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance
model in organizations. computers & security, 56, 70-82.
Sen, J. (2015). Security and privacy issues in cloud computing. In Cloud Technology:
Concepts, Methodologies, Tools, and Applications (pp. 1585-1630). IGI Global.
Shameli-Sendi, A., Aghababaei-Barzegar, R., & Cheriet, M. (2016). Taxonomy of
information security risk assessment (ISRA). Computers & Security, 57, 14-30.
Shameli-Sendi, A., Aghababaei-Barzegar, R., & Cheriet, M. (2016). Taxonomy of
information security risk assessment (ISRA). Computers & Security, 57, 14-30.
Utomo, R. G., Wills, G. B., & Walters, R. J. (2018, October). Investigating Factors in
Information Assurance Implementation: Towards Developing an Information

8INFORMATION ASSURANCE AND SECURITY MANAGEMENT
Assurance Framework for eGovernment in Indonesia. In 2018 International
Conference on Information Technology Systems and Innovation (ICITSI) (pp. 10-15).
IEEE.
Yüksel, B., Küpçü, A., & Özkasap, Ö. (2017). Research issues for privacy and security of
electronic health services. Future Generation Computer Systems, 68, 1-13.
Assurance Framework for eGovernment in Indonesia. In 2018 International
Conference on Information Technology Systems and Innovation (ICITSI) (pp. 10-15).
IEEE.
Yüksel, B., Küpçü, A., & Özkasap, Ö. (2017). Research issues for privacy and security of
electronic health services. Future Generation Computer Systems, 68, 1-13.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





