Analysis of a Research Article on Information Security Management

Verified

Added on  2022/10/02

|4
|824
|16
Report
AI Summary
This report provides an analysis of a research article focused on information security management. The article emphasizes the importance of controlling and maintaining the security and integrity of company assets, protecting them from threats and vulnerabilities. It discusses the role of the information security officer in assessing and mitigating risks, including the loss of files and system vulnerabilities. The report highlights the significance of information security in modern IT, outlining both advantages (e.g., improved managerial overview) and disadvantages (e.g., high costs). It also touches upon the need for organizations to analyze their specific needs before adopting such systems. The report analyzes the research article's structure for the role of security of information and the management framework which is suitable for small and large scale enterprises. The article also describes the various facts and information of the recently published information security management and also security control domain usage and also some analysis of the existing internet security management framework is also done in this article. The conclusion underscores the importance of ongoing research and analysis in this field to improve information security management.
Document Page
Running head: SECURITY OF INFORMATION AND ITS MANAGEMENT
RESEARCH ARTICLE ON INFORMATION SECURITY MANAGEMENT
[Enter Name of the Student:]
[Enter Name of the University:]
[Author Note:]
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1SECURITY OF INFORMATION AND ITS MANAGEMENT
Research article on information security –
Information security is the main topic that has been discussed in the selected article from
the CTU library and a detailed emphasis has been mentioned in this analysis. The research article
also describes the recent related works on the field of management of information security. It can
be described as the process of controlling and maintaining the security and integrity of the assets
or credentials of a company and also to protect them from any threats or vulnerabilities (Laima,
Simona & Antanas, 2019). The process also involves the assessment of many issues that are
related with the information in the organizations. It is one of the most important aspects of the
company and analysis of the following issues is done by mainly the information security officer
of the company. The threats such as unwanted or deliberate loss of files and folders of a
company and also the vulnerability of the system towards any attacks and the controls associated
along with it. Once such a threat or vulnerability is detected in a system the type of information
security model is identified and necessary actions are to be taken by the information security
officer. A strong mitigation plan is also required which depends on the models of the information
domain. The system is needed by any organization that deals with the clients through the internet
and various credentials of the customers are stored in their system which must be protected and
secured using the management of information security (Peltier, 2013). The decision of the
security manager or officer plays a role in the decision making in the security area of the security
of information.
The security of information is important in the modern information technology field but
there are certain advantages and disadvantages associated with the system. The system provides
the supervisors and the managers with a brief overview of the organization and from these
statistics the officials can compete in the market. The communication within the company as
Document Page
2SECURITY OF INFORMATION AND ITS MANAGEMENT
well as the managerial actions increases with the implementation of these system. However, such
systems are very much expensive to set up and also constant up gradation and monitoring is
required. If the data obtained from such systems remain used in the company, then it is a wastage
of both money and time (Soomro et al., 2016). Thus such systems should be adopted by any
organization by analysing their actual needs and also the mode and type of their business.
However the article lacks the research on the different types of the internet security
management and the roles of the information security officer in maintaining the security and
integrity of the security structures. The requirement of the security system is very much
important in the terms of the data integrity and data security of the customers. The article
proposes a structure for the role of the security of information and the management framework
which is suitable for the use in either small or large scale enterprises. The internet security
management framework has certain guidelines, community and tools in order to implement it in
any organization (Peltier, 2016). Thus the research article describes the various facts and
information of the recently published information security management and also security control
domain usage and also some analysis of the existing internet security management framework is
also done in this article. Thus the security of information and its management is one of the most
important aspect in the world of internet usage by almost every company and further research
and analysis must be done in this field for the better up gradation of the process of management
of information security.
Document Page
3SECURITY OF INFORMATION AND ITS MANAGEMENT
References
Laima, K., Simona, R. & Antanas, Č. (2019). Information security management framework
suitability estimation for small and medium enterprise. Technological and Economic
Development of Economy. https://doi.org/10.3846/tede.2019.10298.
Peltier, T. R. (2013). Information security fundamentals. CRC press.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. Auerbach Publications.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more
holistic approach: A literature review. International Journal of Information Management,
36(2), 215-225.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]