BIT361: Security Management and Governance Program for Power AI Report
VerifiedAdded on 2023/03/17
|20
|3229
|21
Report
AI Summary
This report analyzes the security management and governance program for Power AI (PAI), a company specializing in artificial intelligence systems, focusing on protecting their intellectual property. The report, developed by Secure Security Services (SSS), addresses vulnerabilities, risk assessments, and mitigation strategies within PAI's business processes. It details the development and implementation of a security management plan, including responsibilities, methods, and implications of legal requirements. The report identifies various threats, such as technical risks from competitors, human threats from employees and external sources, and technical issues within the system, and proposes corresponding security strategies. It also includes a risk assessment/management plan and contingency plan, along with a discussion of costs and benefits. The aim is to provide a framework for an ongoing security management program to oversee security concerns and ensure the protection of PAI's valuable designs and data.

Running Head: SECURITY MANAGEMENT AND GOVERNANCE PROGRAM
SECURITY MANAGEMENT AND GOVERNANCE PROGRAM
Name of the Student
Name of the University
Author Note
SECURITY MANAGEMENT AND GOVERNANCE PROGRAM
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1CASE STUDY OF ENTERPRISE RESOURCE PLANNING
Executive Summary
The main aim of this report is to explain the vulnerabilities and risk within PAI organization
which have implemented the security management in their business process to mitigate the
risk associated with it. The study also reflects the detailed structure of how this management
plan is developed and implemented within the organization. There are certain responsibility
of these risk management strategies that need to be performed for mitigating the risks. It also
provides a huge range of advantages to the organization.
Executive Summary
The main aim of this report is to explain the vulnerabilities and risk within PAI organization
which have implemented the security management in their business process to mitigate the
risk associated with it. The study also reflects the detailed structure of how this management
plan is developed and implemented within the organization. There are certain responsibility
of these risk management strategies that need to be performed for mitigating the risks. It also
provides a huge range of advantages to the organization.

2CASE STUDY OF ENTERPRISE RESOURCE PLANNING
Table of Contents
PART A......................................................................................................................................2
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
Benefits of security management implemented in the business process................................2
Reason for developing the policy...........................................................................................2
Development of security management plan...........................................................................3
Responsibilities of od Security management program in PAI...............................................3
Methods for development of security management...............................................................3
Implications of the legal requirements...................................................................................3
Conclusion..................................................................................................................................3
Table of Contents
PART A......................................................................................................................................2
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
Benefits of security management implemented in the business process................................2
Reason for developing the policy...........................................................................................2
Development of security management plan...........................................................................3
Responsibilities of od Security management program in PAI...............................................3
Methods for development of security management...............................................................3
Implications of the legal requirements...................................................................................3
Conclusion..................................................................................................................................3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3CASE STUDY OF ENTERPRISE RESOURCE PLANNING
PART A
Introduction
Information security management system is are the set of certain protocols or policies that is
used to manage the electronic data of an organization that are sensitive. The main aim of such
system is to reduce the risk of the cyber-attack and help in smooth flowing of the business
processes (Wencui et al. 2018). Power AI is an organization that mainly deals with the
artificial intelligence system development that help in reducing the use of power, storage
purpose and also in the development of certain environment. There is a need that these
designed are kept secured they implemented the help of the Secure Security Services (SSS).
The organization consists of 50 employees. Thus they need to develop proper policies that
will reduce or diminish the risk associated with it. The organization have Artificial
Intelligence engine that is used to configure the data that is avalaibel to the organization from
the purchaser. The organization have two units that includes the sales and the support sectors.
The other units of the organization includes Finance, Account , Information technology and
the Human Resource teams (Wan and Alagar 2016).
Discussion
Benefits of security management implemented in the business process
When security management is implemented in a process it offers advantage to the
data processing and business process. There are many organizational units within the PAI
organization and the data and design that are generated from each unit need to be stored in a
secure way. If there is a loss of the legal documents within the organization that contains the
source code this can become a heavy blow to the organization. The security management will
indulge some policies within the infrastructure of the organization that will help in
PART A
Introduction
Information security management system is are the set of certain protocols or policies that is
used to manage the electronic data of an organization that are sensitive. The main aim of such
system is to reduce the risk of the cyber-attack and help in smooth flowing of the business
processes (Wencui et al. 2018). Power AI is an organization that mainly deals with the
artificial intelligence system development that help in reducing the use of power, storage
purpose and also in the development of certain environment. There is a need that these
designed are kept secured they implemented the help of the Secure Security Services (SSS).
The organization consists of 50 employees. Thus they need to develop proper policies that
will reduce or diminish the risk associated with it. The organization have Artificial
Intelligence engine that is used to configure the data that is avalaibel to the organization from
the purchaser. The organization have two units that includes the sales and the support sectors.
The other units of the organization includes Finance, Account , Information technology and
the Human Resource teams (Wan and Alagar 2016).
Discussion
Benefits of security management implemented in the business process
When security management is implemented in a process it offers advantage to the
data processing and business process. There are many organizational units within the PAI
organization and the data and design that are generated from each unit need to be stored in a
secure way. If there is a loss of the legal documents within the organization that contains the
source code this can become a heavy blow to the organization. The security management will
indulge some policies within the infrastructure of the organization that will help in
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4CASE STUDY OF ENTERPRISE RESOURCE PLANNING
minimizing the risk associated with it Allen, G., & Chan, T. (2017). There is huge benefits
that can be provided to the organization by providing security to the designs in that are in the
form of the organizational data. The completed products that are ready to execute are
transferred to by the use of the cloud services that allow data backups in case of any
discrepancy (Tupa, Simota and Steiner 2017).
Reason for developing the policy
The development of the design is important to eliminate the loss of the legal
documents of the organization. The main aim of developing the policy is to protect the data
from going into the hands of the competitors. They can copy the designs that are lead by the
company and it can have huge loss to the organization. There is a need of strong security by
the organization to protect the confidential designs of the organization. The algorithm that are
developed by the organization are the intellectual property of the organization which need to
be kept with proper security. The intellectual property need to be secured first. The company
made a huge investment in the development of these algorithms. These trade secrets are very
much important and thus kept secured from the hand of the attackers. The end products are
protected using the copy laws that are lead down by the government. But before that the
organization need proper management team to protect the data of the organization (Madhok,
Gupta and Grover 2016).
Development of security management plan
The development of the security plans by PAI is undertaken by creating a closed network that
are handled by the Information technology employees who belong to the internal
environment of the organization. The cloud computing services are adapted by the
organization so that the data backup and data storage are available (Allen and Chan 2017).
The security management programs will identify the risk to the data or designs of the
organization that rae very essential for the organization. To protect these assets the
minimizing the risk associated with it Allen, G., & Chan, T. (2017). There is huge benefits
that can be provided to the organization by providing security to the designs in that are in the
form of the organizational data. The completed products that are ready to execute are
transferred to by the use of the cloud services that allow data backups in case of any
discrepancy (Tupa, Simota and Steiner 2017).
Reason for developing the policy
The development of the design is important to eliminate the loss of the legal
documents of the organization. The main aim of developing the policy is to protect the data
from going into the hands of the competitors. They can copy the designs that are lead by the
company and it can have huge loss to the organization. There is a need of strong security by
the organization to protect the confidential designs of the organization. The algorithm that are
developed by the organization are the intellectual property of the organization which need to
be kept with proper security. The intellectual property need to be secured first. The company
made a huge investment in the development of these algorithms. These trade secrets are very
much important and thus kept secured from the hand of the attackers. The end products are
protected using the copy laws that are lead down by the government. But before that the
organization need proper management team to protect the data of the organization (Madhok,
Gupta and Grover 2016).
Development of security management plan
The development of the security plans by PAI is undertaken by creating a closed network that
are handled by the Information technology employees who belong to the internal
environment of the organization. The cloud computing services are adapted by the
organization so that the data backup and data storage are available (Allen and Chan 2017).
The security management programs will identify the risk to the data or designs of the
organization that rae very essential for the organization. To protect these assets the

5CASE STUDY OF ENTERPRISE RESOURCE PLANNING
organization will develop proper policies and documents and will implement them. Theses
management process includes analysis and management of the risk and the threats to the
organization intellectual properties.
Responsibilities of Security management program in PAI
The responsibility of the Power AI is to provide security to the designs on Artificial
Intelligence that is developed from the malicious worms attacks. They also provide risk
management and risk mitigations steps to ensure that these data are not theft by the
competitors (Ongsakul and Dieu 2016). The responsibilities of the security management
teams includes detection of the alarm of risk, analyzing the risk, managing the fraud both
from the external and the internal environment of the organization. Managing or mitigating
the risk is also a part of the program. They also introduce many legal compliances replacing
the existing so that the risk can be removed and the exposure of the organization to the
vulnerabilities of cyber-attack can be minimized. These will increase the operational flow
within the organization and will also help in increasing the cash flow within the organization.
Methods for development of security management
The methods of developing an efficient security management is to advancing the
Information System technologies within the organization. Installation of the latest version of
the windows will also help to recover data. The availability of the backup devices and
installation of the antivirus software within the systems is done for risk mitigation (Scherer
2015). There are several methods of mitigating the threats from the organization that includes
identifying the risks, identifying the existing measures that are available in the organization
and analyzing their effectiveness. The method also includes determining the risks measures
and also listing their risks according to their priorities. The last step includes a good response
for the risk (Malhotra 2015).
organization will develop proper policies and documents and will implement them. Theses
management process includes analysis and management of the risk and the threats to the
organization intellectual properties.
Responsibilities of Security management program in PAI
The responsibility of the Power AI is to provide security to the designs on Artificial
Intelligence that is developed from the malicious worms attacks. They also provide risk
management and risk mitigations steps to ensure that these data are not theft by the
competitors (Ongsakul and Dieu 2016). The responsibilities of the security management
teams includes detection of the alarm of risk, analyzing the risk, managing the fraud both
from the external and the internal environment of the organization. Managing or mitigating
the risk is also a part of the program. They also introduce many legal compliances replacing
the existing so that the risk can be removed and the exposure of the organization to the
vulnerabilities of cyber-attack can be minimized. These will increase the operational flow
within the organization and will also help in increasing the cash flow within the organization.
Methods for development of security management
The methods of developing an efficient security management is to advancing the
Information System technologies within the organization. Installation of the latest version of
the windows will also help to recover data. The availability of the backup devices and
installation of the antivirus software within the systems is done for risk mitigation (Scherer
2015). There are several methods of mitigating the threats from the organization that includes
identifying the risks, identifying the existing measures that are available in the organization
and analyzing their effectiveness. The method also includes determining the risks measures
and also listing their risks according to their priorities. The last step includes a good response
for the risk (Malhotra 2015).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6CASE STUDY OF ENTERPRISE RESOURCE PLANNING
Implications of the legal requirements
All forms of the data including the intellectual property, digital , secret designs are
protected. These also reduce the risks of cyber-attack. It manages all the data from different
place within the organization by keeping it in a single place. The confidentiality and the data
integrity is also increased by the policies that are implemented by the security management
teams. The legal regulation will help the organization to mitigate the risk as the changes in
the systems, processes, chain of supply within the organization will reduce the exposure of
the organization from the risks (Biener, Eling and Wirfs 2015).
Part B
Threats
No. Name of Assets Vulnerabilities
associated with
it.
Issues Threats
Implications of the legal requirements
All forms of the data including the intellectual property, digital , secret designs are
protected. These also reduce the risks of cyber-attack. It manages all the data from different
place within the organization by keeping it in a single place. The confidentiality and the data
integrity is also increased by the policies that are implemented by the security management
teams. The legal regulation will help the organization to mitigate the risk as the changes in
the systems, processes, chain of supply within the organization will reduce the exposure of
the organization from the risks (Biener, Eling and Wirfs 2015).
Part B
Threats
No. Name of Assets Vulnerabilities
associated with
it.
Issues Threats
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7CASE STUDY OF ENTERPRISE RESOURCE PLANNING
1. Technical
resources of the
organization.
Risks from the
competitors or
the cyber
attackers within
the organization.
The competitors
can take the or
theft the data of
the organization
that are the
design
algorithms
which are the
intellectual
property of the
organization.
The risk that are
related to these
designs need to
be minimized to
protect the
organization
from severe
losses.
There can be a
huge threat to
the proper of
the
organization.
The data in the
hand of the
competitors can
be claimed as
their own and
the comp-any
will suffer
losses.
2 Human
resources of the
organization
Threat from the
external and the
internal
environment of
the organization.
The employees
who work for
the organization
as well as the
people outside
to the
The designs of
the organization
can be
published by
some other
organization
1. Technical
resources of the
organization.
Risks from the
competitors or
the cyber
attackers within
the organization.
The competitors
can take the or
theft the data of
the organization
that are the
design
algorithms
which are the
intellectual
property of the
organization.
The risk that are
related to these
designs need to
be minimized to
protect the
organization
from severe
losses.
There can be a
huge threat to
the proper of
the
organization.
The data in the
hand of the
competitors can
be claimed as
their own and
the comp-any
will suffer
losses.
2 Human
resources of the
organization
Threat from the
external and the
internal
environment of
the organization.
The employees
who work for
the organization
as well as the
people outside
to the
The designs of
the organization
can be
published by
some other
organization

8CASE STUDY OF ENTERPRISE RESOURCE PLANNING
organization can
undertake
attempts to steal
the data of the
organization
(Simatupang
2015). The data
of the
organization can
be exploited by
the employees if
the show
disloyalty to
their
organization in
which they are
working and
leaks the designs
of the
organization.
The peoples
outside the
organization can
also hack the
data if there is
and the
organization
which have
make a huge
investment on
developing that
will be ruined.
organization can
undertake
attempts to steal
the data of the
organization
(Simatupang
2015). The data
of the
organization can
be exploited by
the employees if
the show
disloyalty to
their
organization in
which they are
working and
leaks the designs
of the
organization.
The peoples
outside the
organization can
also hack the
data if there is
and the
organization
which have
make a huge
investment on
developing that
will be ruined.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9CASE STUDY OF ENTERPRISE RESOURCE PLANNING
no proper
security
available.
3. Technical
resources of the
organization.
Threat from the
presence of the
bugs or
malicious
worms within
the
organization
system.
If the
organization do
not have
develop proper
policies and
strong system
security the
system within
the
organization
will become
prone to bugs
or worm attack.
The data of the
organization
can be kept as
hostage which
can be a great
loss to the
organization.
There are many
attack in which
The data losses
can occur
within the
organization
and the
organization
can be dissolve
due to the
cyber attacks.
no proper
security
available.
3. Technical
resources of the
organization.
Threat from the
presence of the
bugs or
malicious
worms within
the
organization
system.
If the
organization do
not have
develop proper
policies and
strong system
security the
system within
the
organization
will become
prone to bugs
or worm attack.
The data of the
organization
can be kept as
hostage which
can be a great
loss to the
organization.
There are many
attack in which
The data losses
can occur
within the
organization
and the
organization
can be dissolve
due to the
cyber attacks.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10CASE STUDY OF ENTERPRISE RESOURCE PLANNING
the
organizational
data are kept as
hostage and the
attackers
demands huge
money to
release or
giving back
data access
(Kopp,
Kaffenberger
and Jenkinson
2017). There
are some cases
in which they
do not gave the
data a
accessing
authority back
to the
organization
after paying the
money.
4. Human Lack of the The existing The cyber
the
organizational
data are kept as
hostage and the
attackers
demands huge
money to
release or
giving back
data access
(Kopp,
Kaffenberger
and Jenkinson
2017). There
are some cases
in which they
do not gave the
data a
accessing
authority back
to the
organization
after paying the
money.
4. Human Lack of the The existing The cyber

11CASE STUDY OF ENTERPRISE RESOURCE PLANNING
resources of the
organization.
changes within
the legal
regularities of
the
organization.
policies for
cyber attack
crimes within
the
organization
may not be
sufficient
enough to
reduce the risk.
To replacer the
existing
policies of the
organization
with new
policies will
help the
organization to
secure its data.
So the legal
compliances
may not meet
the demand of
the security
KOVÁČ
2015).
attack can be
more prpone to
the
organization as
proper policies
are not there to
stop them.
resources of the
organization.
changes within
the legal
regularities of
the
organization.
policies for
cyber attack
crimes within
the
organization
may not be
sufficient
enough to
reduce the risk.
To replacer the
existing
policies of the
organization
with new
policies will
help the
organization to
secure its data.
So the legal
compliances
may not meet
the demand of
the security
KOVÁČ
2015).
attack can be
more prpone to
the
organization as
proper policies
are not there to
stop them.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 20
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.