Wednesday, June 12, 2019

Take Home Final for Information Assurance and Management Class Research Paper

Take Home Final for Information Assurance and Management Class - Research physical composition ExampleThis process en authoritatives evaluation of venerable curse to the bon ton, a placement is developed where the threats argon usually eliminated (Steven 3). A large company needs a system that provides assurances from the top down because the top management hold most of the crucial information and this makes them more venerable comp atomic number 18d to other workers. A system should be created that seek, to protect and minims available threat among top management this is because of, crucial information that the person holding these offices have. For example it would be of relevances to have a top-down system in World Bank, where IA practitioner usually makes sure that, the higher the offices the more threats are posed and should be evaluated most, compared to a junior employee who is a clerical officer and would not be having any crucial information that poses as any threat. The CEO of such a company should be fixed in a system that gives assurance protection of all his working with a third party, this is because he/she is the central nerve of the company (Cook 6). If a company was small in size of it, I would go for same level type of assurances, because it would be possible to have assurances in the same at all levels considering the size this would be facilitated by the fact that supervising small companies is easier compared to big companies. Take the example of the World bank, it has a lot of departments and its work forces is huge making it impractical to have the same assurances at all levels. A baseline set of IT assets They are two types of data IT that need to be incorporated into the shop this is original asset data and deployed asset data. Authorized asset data should be set up in the shop, to record all activities of purchasing, selling and storing goods. The shop does not have any system that records activities that take place in the shop . This makes the owner venerable from loss of information the only storage of activities that have taken place, is the owners brain and is possible to forget. This process authorized asset data, gathers all information and records it in a backed up storage for future references, its also used to make sure all transactions are accounted for and they can be tracked down easily (Roger 2). Deployed asset data are a process of collecting information, this process is actually in use in the shop but its not properly used, this is because the camera system placed in the shop doesnt have a recording backup capability, its only used for surveillances. Being a shop that is very unsafe to be attacked, strategic positioning and recording cameras should be placed inside and outside the shop to enable monitoring of movement around the shop 24/7 to ensure maximum warranter. The owner cannot be the security officer at the same type sell jewels he should employ a security person. The risks that a re coming out in this shop are breakage at night and organized gangs posing as customers during day time. On the threat of breakage at night, the owner should employ a security officer who should take care of the shop, because the jewels are leaving them at night are likely to be an easy target when they is no one to look over them. Placing a security guard at the entrances, should be of ability to make sure all of the people who are entering the shop dont carry any weapon of try to steal by pretending they are buying (Fowler 3). Tailored information assurance framework Question 2 Classification

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.