Academia.eduAcademia.edu

Outline

Implementing IT Governance: An IT security Perspective

Abstract

Abstract Considering today’s increased threats to the IT infrastructure that come from both within and outside the network, network and security administrators with support from top management are tasked with an uphill role of keeping secure the information and data as well as the entire IT infrastructure on which they are housed. An attack that would lead to a security breach can cause the organization very devastating circumstances that could include but not limited to disruptions in business operations that can lead to poor productivity and reduced profitability, but also most important is that it can lead to loss of customer satisfaction, poor image as well as loos of reputation all of which can be very costly to the organization. This paper therefore, gives a brief background of information security, navigates through the current security trends and looks at the steps that organizations, both regulatory and non-regulatory mid-size firms, can take to ensure that their information systems and the data they store are safe and secure from malicious attacks. The paper looks at the various steps of risk and security assessment, walks through the risk management processes, current challenges and limitations before tackling the solutions and future direction of IT information security.

References (11)

  1. BBC News report (August 2014). FBI probes JP Morgan 'cyber-attack. JP Morgan said it was subject to cyber-attacks 'nearly every day. Retrieved from http://www.bbc.com/news/technology-28965878
  2. Cerullo, V., & Cerullo, M. J. (2004). BUSINESS CONTINUITY PLANNING: A COMPREHENSIVE APPROACH. Information Systems Management, 21(3), 70-78. Retrieved from http://ezproxy.library.capella.edu/login?url=http://search.ebscohost.com/login.aspx?direct =true&db=bth&AN=13353281&site=ehost-live&scope=site
  3. Chandrasekhar, R. (2008). SECURITY BREACH AT TJX. Ivey Management Services, School of Business; the University of Western Ontario, London, Ontario, Canada, N6A 3K7. Retrieved from https://cb.hbsp.harvard.edu/cb/web/pl/product.seam?c=12928025&i=12928030&cs=e669 9370e2d6fb3b912ff35603077005
  4. Fernandes, D., Soares, L., Gomes, J., Freire, M., & Inácio, P. (2014). Security issues in cloud environments: a survey. International Journal of Information Security, 13(2), 113-170. doi:10.1007/s10207-013-0208-7. Retrieved from http://ezproxy.library.capella.edu/login?url=http://search.ebscohost.com/login.aspx?direct =true&db=bth&AN=95064452&site=ehost-live&scope=site
  5. Osborne, T., (2001). Building an Incident Response Program To Suit Your Business. Retrieved Running head: BMGT8214: Implementing IT Governance Maurice Kabeireho 21
  6. Redhat, (2002). Creating an Incident Response Plan. Retrieved from http://www.redhat.com/docs/manuals/linux/RHL-9-Manual/security-guide/s1-response- plan.html
  7. Sipior, J. C., Ward, B. T., & Roselli, G. R. (2005). THE ETHICAL AND LEGAL CONCERNS OF SPYWARE. Information Systems Management, 22(2), 39-49. Retrieved from http://ezproxy.library.capella.edu/login?url=http://search.ebscohost.com/login.aspx?direct =true&db=bth&AN=16195752&site=ehost-live&scope=site
  8. Spremic, M., Bajgoric, N., & Turulja, L. (2013). IMPLEMENTATION OF IT GOVERNANCE STANDARDS AND BUSINESS CONTINUITY MANAGEMENT IN TRANSITION ECONOMIES: THE CASE OF BANKING SECTOR IN CROATIA AND BOSNIA- HERZEGOVINA. Ekonomska Istrazivanja, 26(1), 183-201. Retrieved from http://search.proquest.com.library.capella.edu/docview/1466380903?accountid=27965
  9. Srividya, S. S., Vijayaraghavan, V. V., & Banu, W. (2007). Effective Key Management Protocol for Extremely Self-Motivated Environment. Information Systems Management, 24(4), 311-318. doi:10.1080/10580530701586037. Retrieved from http://ezproxy.library.capella.edu/login?url=http://search.ebscohost.com/login.aspx?direct =true&db=bth&AN=26952119&site=ehost-live&scope=site
  10. Tarn, J., Raymond, H., Razi, M., & Han, B. T. (2009). Exploring information security compliance in corporate IT governance. Human Systems Management, 28(3), 131-140. doi:10.3233/HSM-2009-0698. Retrieved from http://web.a.ebscohost.com.library.capella.edu/ehost/detail/detail?sid=83616035-7c47- 4691-844f- 372e16a86beb%40sessionmgr4001&vid=0&hid=4207&bdata=JnNpdGU9ZWhvc3QtbGl 2ZSZzY29wZT1zaXRl#db=bth&AN=43925868
  11. Whitman, M. and Mattord, H. (2010). Management of Information Security. Course Technology, Boston, MA 02210.