Role of Time in Information Assurance
The society at large is on the verge of a new era. This new era is the information age which is marked with a major paradigm shift in the area of information assurance. Information assurance has three main attributes: confidentiality, integrity, and availability. All the three tenants of information assurance must be well guarded and maintained in order to bring a marked improvement of both the current and future information systems. Some of the steps necessary to ensure the best information assurance practices must be addressed by the use of appropriate legislation. The best techniques of ensuring acceptable information assurance standards will take long time to formulate and implement. Time will therefore play a very integral role in the perfection of information assurance techniques.
Numerous scholars in a variety of disciplines have been concerned with the special roles that time apparently plays in the field of…...
mlaBibliography
Barlow.A Declaration of the Independence of Cyberspace
Libicki (1995)What is Information Warfare?. Strategic Forum, No. 28. [Online] Available: Luiijfhttp://www.ndu.edu/inss/actpubs/act003/actpub.htm
Lunt, T.F. Information assurance: securing the naval command and information infrastructure.
Network-Centric Naval Forces (2000.):A Transition Strategy for Enhancing Operational Capabilities by the Naval Studies Board. National Research Council;
S. Department of Defense (DOD) uses over two million computers and more than ten thousand local area networks, most of which are linked to, and vulnerable to attack from, users of the larger Internet. (2008, p. 276)
These increasing threats correspond to the growing reliance on information systems to manage the entire spectrum of modern commerce and energy resources, making the disruption of a single element in the integrated system a potential threat to the remaining components that can result in a massive disruption to a nation's economy (Jurich, 2008). Certainly, these types of trends were witnessed in a similar fashion when terrorists flew jet airliners into the World Trade Center and Pentagon in 2001, and the national economy of the United States suffered to the extent that it is still recovering. As Jurich points out, "The push towards greater reliance on information technologies in fields including energy, communications, industry, finance,…...
mlaReferences
Allen, P.D. & Demchak, C.C. (2003). The Palestinian-Israeli cyberwar. Military Review, 83(2),
52-54.
Cetron, M.J. & Davies, O. (2009, September-October). World War 3.0: Ten critical trends for cybersecurity. The Futurist, 43(5), 40-41.
Cimbala, S.J. (2002). Military persuasion in war and policy: The power of soft. Westport, CT:
The various e-businesses therefore depend upon various ISP's as well as the internet infrastructure in order to achieve an improved level of convenience as well as unparalleled availability. The merits associated with e-commerce has therefore resulted to rapid adoption of the concept with a heavy reliance on various encryption techniques such as SLL as well as username and password based authentication techniques that rely on authentication files contained within the file named .htaccess.
The simplicity of adopting and implementing both methods is therefore a merit as both can be achieved through the use of various components that are readily available to be used on the various web browsers. Their availability is however marked with cases of attacks fuelled majorly by the very nature of the common protocol used (TCP/IP). The availability of numerous points of attacks in terms of ports presents an excellent opportunity for would-be attackers to plan as…...
mlaReferences
COMPANIES INTEGRATE ENCRYPTION/DATA LOSS PREVENTION. (2008, July).
Computer Security Update, Retrieved August 2, 2008, from Academic Search Premier database.
Gefen, D. & Straub, D. (2003). Managing user trust in B2C e-services. e-Service Journal, 2(2),7-25.
Kim, D.J., Ferrin, D.L., & Rao, H.R. (2003). A Study of the Effect of Consumer Trust on Consumer Expectations and Satisfaction: thenKorean Experience. Proceedings of the 5th
Information Security
The discussion below provides answers to questions raised with regard to a case at Greenwood Company
A forensic plan of readiness comes with several advantages. If there arises a situation that forces a company to be engaged in litigation, and there is need for digital evidence, e-discovery is of central importance. The laws and rules that govern the e-discovery, such as the Federal ules of Civil Procedure or the Practice 31B Direction of the UK call for the presentation of electronic evidence fast; and that such evidence must be in sound state, forensically (Sule). The Electronic Discovery eference Model is reputed as the standard model for processing e-discovery, and is compliant with FCP.10 Information management procedures require that electronic evidence should be collected and stored appropriately. Such evidence should be readily available when it is needed. E-discovery information management procedures include incident response, data retention, and discovery of disaster and…...
mlaReferences
Johnson. (n.d.). HR information resources | Federal and state employment law | XpertHR.com. Does an employer have a right to search an employee's locker or desk? | FAQs | Tools | XpertHR.com. Retrieved January 24, 2017, from http://www.xperthr.com/faq/does-an-employer-have-a-right-to-search-an-employees-locker-or-desk/6902/
Mendell. (2001). Symantec - Global Leader in Next-Generation Cyber Security. Incident Management with Law Enforcement | Symantec Connect. Retrieved January 24, 2017, from http://www.symantec.com/connect/articles/incident-management-law-enforcement
(n.d.). New York Employment Lawyer. The Limits to an Employer's Search. Retrieved January 24, 2017, from http://theemployeeslawyer.com/blog/2013/09/the-limits-to-an-employers-search/
(n.d.). Study Guides, Lesson Plans, Homework Help, Answers & More - eNotes.com. What are some explanations of the chain of custody: how is it used in court, and what is its purpose? | eNotes. Retrieved January 24, 2017, from http://www.enotes.com/homework-help/what-soem-examples-chain-custody-how-used-court-201099
Assurance Program
Why/How to create an Information Assurance
Just as paramount as the availability and access to information is significant in every company or business outfit, certain concerns always come to the fore: the kind of information is to be made. How the information is going to be organized? How will it be possible to ensure that the information released represents the judgment of the management of the company and gives assurance that the very information required is available?
This document contains the solutions to the concerns mentioned above; an Information Assurance Program is necessary in every organization. This project explains why information assurance program is needed in every viable company and also explores ways it can be affected, integrated into the organization and organized. The program encompasses different models which span through finding the reason why such program is needed to analyzing whether the finding is practicable. This takes the next…...
mlaReference:
Harwood, I.A. (2006). Confidentiality constraints within mergers and acquisitions: gaining insights through a 'bubble' metaphor, British Journal of Management, Vol. 17, Issue 4., 347 -- 359.
Parker, Donn B.] (2002). "Toward a New Framework for Information Security." New York, NY: John Wiley & Sons. ISBN 0471412589.
Elsayed, E. (1996) Reliability Engineering, Addison Wesley, Reading, California: USA.
SACA (2006). CISA Review Manual 2006. Information Systems Audit and Control Association. pp. 85. ISBN 1-933284-15-3.
IT Governance lays special emphasis on the system of information technology, along with the performance and risk management of the IT infrastructure in an organizational context. The primitive focus of IT Governance is the assurance of the fact that investment in the Information technology infrastructure is contributing to generate business value and at the same time lessen the potential risks pertaining to the Information Technology. This objective is attained by adequate maintenance and implementation of an organizational configuration with properly allocated role of information technology governance. IT Governance is scrutinized in relation to how the IT model generates value that goes hands on with the overall corporate governance strategies in an organization.
IT Governance
Importance of IT Governance
IT Governance refers to a framework to enhance the efficiency of the managerial processes in an organization. It is generally regarded that the efficiency of the Information Technology in an organization is yielded by the…...
mlaWork cited
Currie, Wendy, and Bob Galliers, eds. Rethinking Management Information Systems: An Interdisciplinary Perspective. Oxford: Oxford University Press, 1999. Questia. Web. 10 Mar. 2012.
Luftman, Jerry N., ed. Competing in the Information Age: Align in the Sand. 2nd ed. New York: Oxford University Press, 2003. Questia. Web. 10 Mar. 2012.
Rathmell, Andrew, Stephanie Daman, Kevin O'brien, and Aarti Anhal. Engaging the Board: Corporate Governance and Information Assurance / . Santa Monica, CA: Rand, 2003. Questia. Web. 10 Mar. 2012.
Williams, Steve, and Nancy Williams. GUI Bloopers 2.0: Common User Interface Design Don'Ts and Dos. Updated ed. Boston: Elsevier/Morgan Kaufmann, 2008. Questia. Web. 10 Mar. 2012.
Migrate off of any individualized content management systems and processes not integrated to a single portal platform for greater cost and time savings in administration. Olson (32) provides an excellent case study on how universities are making use of open source portal applications to alleviate redundant and often conflicting data in multiple portals on an IBM WebSphere platform
Define and build out a portal development plan that encompasses all shared processes across the project areas.
As Murphy and Columbus state, re-organize content by the context of each dominant workflow, and this could include larger, more complex projects as defined by Aquarius Marketing first, then align to the customer-facing processes to ensure the highest levels of efficiency and responsiveness.
Development of a portal roadmap that allows for eventual move to Web Services based on a Service Oriented Architecture, giving Aquarius Marketing greater scalability than if a single, stand-alone application was chosen.
Stakeholders involved
Figure 1 highlights…...
mlaReferences
Paucar-Caceres, R Rodriguez-Ulloa. 2007. An application of Soft Systems Dynamics Methodology (SSDM). The Journal of the Operational Research Society 58, no. 6 (June 1): 701-713. Accessed January 20, 2008).http://www.proquest.com .
Checkland, M Winter. 2006. Process and content: two ways of using SSM. The Journal of the Operational Research Society 57, no. 12 (December 1): 1435-1441.
4. Control Phase: This phase is the one in which maintaining the project within the "scope, cost, and schedule" as well as "within acceptable quality" is addressed due to the possible variables. "Unknown or unproven technologies....make these projects difficult for the project manager to baseline the scope, schedules, and costs during the Planning Phase." (Systems Lifecycle Development, 2001) Key deliverables in this phase are the development, testing, implementation and documentation of the scope control, schedule control, cost and quality control as well as the contract administration and configuration management in the project.
5. Closeout Phase: the final phase is characterized by the project being brought to an end with the manager of the project holding responsibility for making sure that the processes in closeout are accomplished while the systems are transitioned to maintenance perspective. The main activities in this phase are administration of closure of the project as well as financial…...
mlaBibliography
Concept: Life Cycle Model (nd) available {Online] at http://www.chambers.com/au.Sample_p/c_pmodel.htm
Overview of Life Cycle Management (2004) United States Patent and Trademark Office Life Cycle Management Manual
Systems Development Lifecycle (2000) Executive Branch Dept. State of Michigan 2000 Dec 11 [Online] available at -- 00.htmlhttp://www.michigan.gov/dmb/0,1607,7-150-9131_9347-28112
Information Technology Project Lifecycle
The potential of the Internet has been acknowledged by UPS and the company has made a commitment to enable global commerce via the Internet. This challenge and the changing needs in terms of customer due to the e-business evolution has UPS looking a variety of business solutions.
Analysis
Present systems and services are as follows:
1. UPS e-Ventures: A "corporate incubator for UPS that "explores ideas and takes the great ones and makes them reality. UPS e-Ventures does the research and development, tests and launches ideas and places products as well as services into place. Finally UPS e-Ventures manages the supply chain from the warehouse to transit. The stated objectives of UPS e-Ventures are:
Helps companies put the "E" in their businesses
Identify and rapidly develop entirely new businesses related to supply chain management and e-commerce.
Provides complete, end-to-end business solutions for the rapid, low-cost launch of e-commerce startups.
Create UPS's electronic commerce strategy for providing…...
mlaReferences
Algahalith, Nabil (2005) led "Competing with it: The UPS Case" Journal of American Academy of Business, Cambridge in September 2005 Volume 7 Number 2,.
Technology and Management of United Parcel Service
The Act also demanded that agency heads to ensure that the process of implementation of information security plan in the various life cycles of each and every federal system.
The significant differences between FISMA and GISA are the fact that its provisions are stronger and more permanent. It also includes the minimum mandatory standards for information security (OIG, 2003).
The suitability of the eight FISMA requirements model for business information security programs
The suitability of FISMA requirements model and compliance is the fact that it helps in the identification of people, processes and systems that the agencies need in order to achieve the various business objectives as well as coming up with appropriate protective mechanisms. The next incentive is tied to the fact that compliance to the requirements leads to the bolstering of an agency's reputation both within the House Government eform as well as the improvement of citizen's perception of the…...
mlaReferences
E-Governent Act. (2002). Management and promotion of electronic Government Services
http://csrc.nist.gov/drivers/documents/HR2458-final.pdf
Best, R. (2007). Open Source Intelligence (OSINT): Issues for Congress
information systems and its effects on business processes. Moreover, I have explained the several business components and their effectiveness as information systems. In addition, I have provided information regarding the effects of information systems on various business careers.
Information systems have brought revolutions and innovations in today's business' setups and also have developed a close relationship with globalization. The responsibility of these information systems in an organization is not to support the tasks of the individuals but to support business functions as a whole. Nowadays, business operations are conducted by using e-mail, online conferences (video/audio) and cell phones which have turned out to be the most fundamental tools in business execution. Information systems, if truth be told, are the basis of accelerating supply chains. The businesses today have the advantage of using internet for purchasing, selling, advertising and imploring the feedbacks from consumers/customers online. It is now the purpose of…...
mlaReferences
Alter, S. (2002). Information Systems: Foundation of E-Business, 4/e (4th ed.). New Delhi, India: Dorling Kindersley (India) Pvt. Ltd. Retrieved February 15, 2013, from http://books.google.com.pk/books?id=ElXnQdPTEQ4C&printsec=frontcover&dq=Information+Systems:+Foundation+of+E-Business&hl=en&sa=X&ei=8OkdUZaKN6XJ0AXE7oCADQ&ved=0CC0Q6AEwAA#v=onepage&q=Information%20Systems%3A%20Foundation%20of%20E-Business&f=false
Chatterjee, I. (2010). Management Information Systems. Delhi, India: PHI Learning Private Limited. Retrieved February 15, 2013, from http://books.google.com.pk/books?id=DOi2meoOKWsC&printsec=frontcover&dq=Management+Information+Systems&hl=en&sa=X&ei=998dUej2DIqL0AWQp4CgCA&ved=0CFsQ6AEwBw#v=onepage&q=Management%20Information%20Systems&f=false
Laudon, K., Laudon, J., & Dass, R. (2010). Management Information Systems: Managing the Digital Firm (11th ed.). Chennai: Dorling Kindersley (India) Pvt. Ltd. Retrieved February 15, 2013, from http://books.google.com.pk/books?id=gx-LOQmKou8C&printsec=frontcover&dq=Management+Information+Systems:+Managing+The+Digital+Firm,+11/E&hl=en&sa=X&ei=KM0dUcjxNOW00QXAtIH4Bg&ved=0CC0Q6AEwAA
Lucey, T. (2005). Management Information System (9th ed.). Croatia: Thomson Learning. Retrieved February 15, 2013, from http://books.google.com.pk/books?id=A0bu30rNgJsC&printsec=frontcover&dq=Management+Information+System&hl=en&sa=X&ei=svMdUcLkNoi10QXfmoHYBw&ved=0CDkQ6AEwAg#v=onepage&q=Management%20Information%20System&f=false
According to Derek later, a further reason for a basic unwillingness to place a large amount of emphasis upon disaster recovery planning is because disastrous events are regarded as large unlikely. Business owners therefore tend to view such planning as less important than other business functions, such as new product promotion and investment. later however further emphasizes the importance of recognizing that businesses are not only affected by large-scale disasters, but also by smaller-scale problems such as malfunctioning computers or viruses. An adequate business continuity and disaster plan is therefore indeed important in order to ensure that the business can continue functioning regardless of whatever mishaps may occur.
Computer security issues as well as risk analysis and business continuity and disaster planning are integrated business issues in today's workplace environment. Most businesses today function on the basis of computers and programming. These machines and programs form the lifeblood of the business.…...
mlaSources
1. Basic Principles of Information Protection http://cap-lore.com/CapTheory/ProtInf/Basic.html
2. The Business Continuity Planning & Disaster Recovery Planning Directory. Retrieved from the World Wide Web: http://www.disasterrecoveryworld.com/
3. Miller, M. Computer Security: Fact Forum Framework." Retrieved 08/03/08, from the World Wide Web: http://www.caplet.com/security/taxonomy/index.html
4. Schneier, Bruce. http://schneier.com/index.html
PINCE2 vs. DSDM compares and contrasts the two methodologies used in the development of projects. This paper explicitly defines each methodology and outlines its general characteristics and important features. It also explains all the phases involved within each methodology. In the end, the writer's perspective and viewpoint about each approach is given and a conclusion is reached which specifies whether PINCE2 or DSDM is a suitable solution for the development of projects.
PINCE2 Vs. DSDM
Today's business world requires that products along with their provided services be marketed in the shortest possible time span. Nowadays, projects are often inaugurated on a collective basis and institute without having an enumerated understanding of the requirements. There is no doubt that in this fast paced environment, Dynamic System Development Method or DSDM is considered to be the best available publicly practiced method of the apid Application Development or AD model and is exhibiting consequential…...
mlaReferences
DSDM In A Nutshell. Available on the address Accessed on 21 Mar. 2004.http://www.surgeworks.com/dsdm ..
DSDM And Prince2: The Perfect Marriage Or Strange Bedfellows? Dynamic Systems
Development Method Ltd. 2004. Available on the address Accessed on 22 Mar. 2004.http://www.dsdm.org/timebox/issue15/prince2.asp.
Griffiths, M. & Harrison, D. & Hartell, M. & Hay, G. & Kent, A. & Messenger, S. Using
protect the privacy of the individual via EU Directive for Protection of Personal Data
The internet revolutionized the human life as we know it. It established a culture of liberty aided by not just ingenuousness but also standardized protocols. This was achieved by transmitting the essential products for business-related growth, adopting a model of governance with no formal existence of regulations along with free availability of abundant software packages. This internet revolution can't be underestimated as it has its pros and cons, which also comes under discussion in this paper. With the surging popularity of internet, there happen to be a plethora of new dilemmas knocking at the door. There are tons of merits of Internet for that matter while its demerits have been ignored and hidden along the sidelines. These issues have materialized in the preceding decade and the demand is urgent to solidify a legislation which is tasked…...
mlaReferences
Andrew, S. (2011). The Federal Trade Commission and Privacy: Defining Enforcement and Encouraging the Adoption of Best Practices, 48 SAN DIEGO L. REV. 809, 854 -- 56.
Aquilina, K. (2010). Public security vs. privacy in technology law: A balancing act? Computer Law & Security Review. Volume 26, Issue 2, March 2010, Pages 130 -- 143
Asinari, M and Poullet, Y. (2004). Public security vs. data privacy -- Airline passengers' data: adoption of an adequacy decision by the European commission. How will the story end?' Computer Law & Security Report, vol. 20, no. 5, pp. 370 -- 376.
Bambauer, D.E. (2013). Privacy vs. Security. The Journal of Criminal Law & Criminology. Vol. 103, No. 3.
IT Fraud
Evaluate the factors that add to corporate fraud
The business fraud can be credited to conditions emerging from deceptive monetary reporting and misappropriation of possessions. These conditions are 3 and all 3 features of the fraud triangle have to exist for fraud to take place. Management or staff members have to have the reward or pressure to dedicate fraud, see the opportunity emerge and have the ability to justify the occasion.
Incentive/Pressure
Management or perhaps others in the workforce will have benefits or conditions of pressure to carry out fraud. If the choice is made by management to publish illegal monetary statements, the most typical reason for this will be threat by financial, market or entity operating conditions to the monetary security and productivity of the business. Extreme pressure is put on management to satisfy the projection made by industry experts, internal company projections or to pay back loans (Fox School of…...
mlaReferences
ISACA, 2011. COBIT Framework for IT Governance and Control. Retrieved from http://www.isaca.org/Knowledge-Center/COBIT/Pages/Overview.aspx
Louwers, T., Ramsay, R., Sinason, D., & Strawser, J. (2007). Auditing & Assurance Services: A Look Beneath the Surface. (2nd ed.). New York, New York: McGraw-Hill/Irwin.
Temple University. "Auditing ACCT 3596." Fox School of Business. 13th Ed. United States of America: Pearson, 2009. Print.
Wells, Joseph T. Corporate Fraud Handbook: Prevention and Detection. Hoboken, NJ: John Wiley & Sons, 2007. Print.
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now