Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Common Security Framework Overview, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
IT Security Framework
The IT Security framework is considered as the most wide-ranging framework model that guarantees entire security solutions of information by reducing business risks. In addition, information security does not only focus on technological aspects, but also pointing out other core elements in an organization. For instance people, procedures, business methodologies etc. this is also considered as mandatory for information security.
The complete information security framework should include the following main characteristics (HITRUST):
- Recommended sound security governance practices (e.g., organization, policies, etc.).
- Recommended sound security controls practices (e.g., people, process, technology).
- A guide to help reconcile the framework to common and different aspects of generally adopted standards (e.g., COBIT, HIPAA, etc.).
- An analysis of risk or implications for each component of the framework.
- A guide of acceptable options or alternatives and criteria, to aid in tailoring to an organizations operating environment.
- A guide for implementation and monitoring.
- Toolset for organizations to test compliance against the framework (HITRUST).
A complete security framework comes down to three well-known basic components: people, technology, and procedures. When these three elements are correctly assembles such as, the people, technology, and process fundamentals of information security program that works together in order to secure the environment and stay consistent with organization’s objectives.
The policies and the practices in any organization is established by the Information Security framework. This framework is utilized for assessing the organization’s current information security framework that offers a roadmap for the estimation and enhancement related to the information security policies and practices. Moreover, many information securities related frameworks are studied for this paper. However, the chosen information security framework is considered as the representative of the entire information security framework in the literature.
IT Security Policy
- An External Storage is assigned to the employee based on the role and nature of assigned work. This decision shall be made by Director and other Department Heads in accordance with the policy.
- Before assigning the External Storage, Department Head shall discuss the prescribed data security controls with the employees that are essential to keep the data safe. Department Head may involve Information Security Officer for reinforcement of the intent and purpose of the security controls.
- ISO shall develop the department wise IT controls list department wise that must be applied on each external storage device. Other than this, more controls can also be applied (if required).
- All websites will be restricted by default and only specific websites will be allowed as per the job description of the Employees. However, policy exception can be granted to specific websites by the approval of head of departments.
- IT team shall apply the controls and ISO shall verify the configuration. For exceptions, the employee shall email Policy Suspension and with the Department Head approval, IT will suspend the controls for specified time duration.
- The Department Head ensures that the IT team has applied the data security controls before handing over the laptop to the employee.
The challenges are alarming for management in providing IT security. In fact, information system assets are substantial even for small organizations including data bases and files related to personnel, company operation, financial matters and etc.
After the mapping of IT security framework, it is revealed that the selected framework maps well with the Company’s information security framework. The only dissimilarity among the two frameworks is that the roles and responsibilities of the drivers are different. Even though, the company has suitable information security framework in place but there are few suggestions as follows:
Training
In order to create invasive security environment, the significant information security to the organization must be widespread. To strengthen the behavioral changes, several approaches may be undertaken. Workforce should be trained in security awareness and suitable Security practices (Sipior & Ward, 2008). Also, consultants should be made responsive of all the policies and procedures.
Password Policy
The ABC Company has password policy in place but they have not implemented the Password policy. The password policy is significant security criteria.
Confidentiality agreement
No confidential agreements with the third party contractors are present in many cases. For instance, in few organizations the consultant has to sign the confidentiality agreement if he joins the client’s location.
Physical security
Physical security is not available for computer systems. The organization must have some kind of locking system that can help to control stealing PCs or hardware.
Information is considered as the core element or vital asset in any organization. A well-established IT security framework is needed in order to protect information in any organization. However, it is also making into consideration that in any organization, IT security framework is an ongoing process. In order to ensure the adequate protection of information resources, continuous enhancements in response to environmental incidences or interviews are required (Ezingeard & Bowen-Schrire, 2007). To assess the capability of current practices, measuring and reporting of risks, control issues, and vulnerabilities are compulsory (Purtell, 2007). In modern days, cyber-attacks and information security breaches are common and are increasing day by day. Therefore, it is important for all the organizations to focus on information security. To make sure information security, the organization must understand that information security is not solely a technological issue. The organization should also consider the non-technical aspect related to information security while developing the information security framework in organization.
References
HITRUST Common Security Framework Overview from http://www.hitrustalliance.org
Ezingeard, J., & Bowen-Schrire, M. (2007). Triggers of change in information security management practices. Journal of General Management, 32(4), 53-72.
Purtell, T. (2007). A new view on it risk. Risk Management (00355593), 54(10), 28-33.
Sipior, J. C., & Ward, B. T. (2008). A framework for information security management based on guiding standards: A united states perspective. Issues in Informing Science & Information Technology, 5, 51-60.
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee
