Individual Assignment: Research Essay Research the topic of Information Security Management from quality sources and write research essay on the topic of: The Need for Information Security Management...

1 answer below »
Assignment as attached


Individual Assignment: Research Essay Research the topic of Information Security Management from quality sources and write research essay on the topic of: The Need for Information Security Management for Small to Medium Size Enterprises (SMEs) The research essay is an individual assignment. It is not part of the group’s work for the unit. The essay should not exceed 3500 words, including references. The essay should not be below 2900 words or exceed 3500 words (5% penalty will apply). Your research essay should explore four (4) topics among the ones listed below, focusing on the major relevant issues of the chosen topics. The research essay should describe and discuss the challenges in the introduction and implementation of information security regimes in small to medium enterprises (SMEs) compared against implementation in much larger organizations. Student must discuss the following:-  Introduction, and  Justifying the need for sound Information Security Management in SMEs, include o Statistics of cyber-security threats targeting large originations vs o Statistics of cyber-security threats targeting SMEs originations Then, choose four (4) topics among the following:-  Implementation of Information Security Frameworks in management of information security  Implementation of Artificial Intelligence and Machine Learning in management of information security  Data Privacy issues in Information Security Management  Disaster Recovery Planning in Information Security Management  Regulatory Compliance in Information Security Management  Smartphone Security Management  Implementation of Business Continuity in the current COVID-19 crisis  Issues in the implementation of Security Education component of SETA NOTE: This is NOT an essay about what SMEs should do, but rather it’s a research based analysis of challenges they face in implementing ISM regimes in the security areas—topics— you will be discussing. You will therefore be marked as follows: For each topic, (i) describe the topic; (ii) discuss the major relevant issues relating to its implementation in SMEs with supporting evidence/references; (iii) against larger organization with supporting evidence/references. You must base your discussion on the work of credible and relevant authors – that means in-text citation and references must be provided. See next page, for acceptable references and a referencing guide. You must produce a research essay based on the work of credible and relevant authors (not your opinion or gut-feeling about information security management). The research essay should be fully referenced. The essay is marked purely on content, so essays that simply try to make up the word limit but provide limited information will receive poor marks. Please format your document in font size 12, double line spacing and single column. You must submit the essay in WORD format to the unit coordinator through the LMS assignment submission system. So that your work doesn't get mixed up with others', use a filename that follows the convention: Unit code, trimester, year, assignment name, your last name, e.g., ICT380_TSA_2020_Research_Essay_Lastname.docx. Acceptable references and appropriate referencing  Your paper should include a minimum of 15 references.  Only 4 of the references can be news articles, textbooks, websites such as CNET or government websites etc. otherwise all other references MUST be academic/scholarly.  Published no earlier than 2011, unless you are adding a historical perspective.  Wikipedia and references from essay or assignment websites are NOT valid references. ZERO marks will be awarded (to the entire topic discussion) for use of such references.  Use of CourseHero will lead to failure (ZERO) in the UNIT.  Use your own words, paraphrase your work.  Any part of your research essay that has been copied word-for-word (verbatim) from any source will NOT be marked, and may be reported as plagiarism.  NOTE: Plagiarism is not acceptable. Urkund will be used to report on potential plagiarism.
Answered Same DayOct 09, 2021

Answer To: Individual Assignment: Research Essay Research the topic of Information Security Management from...

Neha answered on Oct 13 2021
152 Votes
The Need for Information Security Management for Small to Medium Size Enterprises
ABSTRACT
The information Security management very crucial factor among the organizations as per the current scenario of business globalization. Different companies are trying different types of efforts to use the best out of technology for themselves which also includes the e-business. Most of the organizations have made available different types of information over the database and it has made it vulnerable for different types of attacks to be performed by the hackers in the form of spam or malwares. It is necessary for
the organizations to keep the databases protected with the best security measures to make sure that the data is confidential and private. Semi structured interviews were taken from different managers at different levels and most of them requested make sure that it is according to the views with relation with the availability, confidentiality and contiguity which are the major objectives of the information security. It is also found that most of the industrialists believe to have security of the information and it is very important for the organization but most of them are reacting in administrating information security. This results in reacting of the organisations in very unprepared manner which can lead to loss of reputation and business. The results also provide strong baseline for the organization to check their current operating system and improve it by applying new security measures as per the requirement.
INTRODUCTION
The history shows that human can endeavours with the aim to make a better place in the world for the living life. There are people who have already made efforts to bring the world closer and turn the dream of mankind reality to use the advent of information technology. The usage of Internet is going substantially. It has totally changed the way businesses are looking at their range and trying to attract the customers from all over the world. The organizations have already made considerable investments whether they are large or small sized enterprises to use maximum out of the Internet for reaching out and getting the attention of different customers over the global network. As the Internet has changed revolutionary fact over the business it has also increased the threats and risk to the information security of the organization. The organisations have already selected to utilise the Internet based platform attempt for interacting with the customers this has created a huge amount of information in our digital format. This digital format can travel across different areas of the world with the help of interconnected networks which are very prone for cyber-attacks like spam, viruses, malware etc. In the current day there's a lot of economic competitors in the business scenario and information is a very important asset for them and they can suffer from huge blows economically and also for their reputation if they are not able to save card their information. This disadvantage of the Internet has resulted in loss of information and it he has also shaken the confidence and trust the users over the technology (Abbas, J., Mahmood, H. K., & Hussain, F).
The businesses are changing regularly over the passage of time and the ink requirement for the security measures of the information is also changing regularly. The security policies need to adapt all the changes and it should align with the changing objectives of the business also. The businesses are driving forward to make sure that they have correct security policies security infrastructure transformation should always take place as for the strategic objectives of the business and enterprise. Security guards, locked houses, barb wired facilities, safes in banks and many other features are just an email to provide physical security to all the assets. But the information security is not possible with all the security measures and it is important to provide the digital domain for the information security. There are mainly for objectives of the security of information as follows.
i. Confidentiality – The business should always try to transfer the information to people as per their requirement which means Better information should not be transferred to the unauthorized people.
ii. Integrity – The information which is present in the computers should be kept secure from getting contaminated or corrupted.
iii. Availability – We should try to make sure that the data is available to the authorised people whenever they needed. The availability and confidentiality can be used to make sure data integrity.
iv. Non-repudiation – It is used to prove the integrity and authenticity of the data.
Literature Review
The organization may suffer from the substantial damage for the reputation when they become a prey for the attack of information security. Organization which have the incident response management can discover and identify if they are under some attack and if there is no such management then the organization is moving towards the attack which can harm it and cause a lot of loss. The disaster recovery strategies another method which can help the organization to eradicate any presence of attacker, contain the damage and recover in the secure environment. After finding out the importance of disaster recovery and incident response management The Institute of Internet security United States has placed both of them in the top 20 critical security controls for the organizations. National Institute of standards and technology united states has also proved its importance and they have also shared detailed guidance about the planning and implementation of these plans in their special publication (Ashenden, D).
If the organization does not have clear and effective disaster recovery plan and incident response management then they would compromise over the different phases like identification, preparation, containment, eradication, recovery and the lessons learned. They should always be prepared for handing different type of threats which...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here