Verified Document

It Security Policies Dealing With Essay

Educating individuals to improve and develop their capabilities in the field of information systems control and audit is its primary purpose. ISACA encourages the exchange of information, and problem solving techniques amongst its members. Communication to information system professionals, management and system auditors the need to have necessary controls that ensure effective use of IS resources and organization. ISACA also promotes newsletters that ensure its members are kept informed of new trends in information security control and audit, which can be helpful to their employers and themselves. Why should companies use COBIT?

COBIT is a governance framework for it that was developed by ISACA. It provides tools that help in bridging the gaps in business risks, technical issues and control requirements. Nowadays many business processes are dependent on it, thus to manage the risks that are posed by it systems effectively use of COBIT becomes paramount in every company....

Parts of this document are hidden

View Full Document
svg-one

Companies should use COBIT throughout the company for it control to ensure that there are good practices and a clear policy development.
Been an international governance and controls framework COBIT has been widely accepted by businesses in governing, assessing and managing their it risks, and security. It also maps well with other major it risk frameworks thus making it easy to implement no matter what framework a business is running. If so needed, COBIT can be easily extended using other ISACA publications that are designed to extend its capabilities. In business COBIT improves the service provided by the employees to its customers, increase discipline of the employees, and add to the customer satisfaction levels. To bring the necessary it governance needed to align business goals, COBIT can be used.

References

Warren, M.J. (2001). A Risk Analysis Model to Reduce Computer Security Risks among Healthcare Organizations. Risk Management, 3(1), 27-37.

Sources used in this document:
References

Warren, M.J. (2001). A Risk Analysis Model to Reduce Computer Security Risks among Healthcare Organizations. Risk Management, 3(1), 27-37.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now