Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Contemporary Information Security Requirements, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
1.BCP Plan
A complete BCP consists of five characteristics mentioned below:
- BCP Governance
- Business Impact Analysis (BIA)
- Procedures, strategy and provisions for business continuity
- Instant procedures
- Quality assurance techniques (exercises, maintenance and auditing)
1.1 Organizing a Governance Structure
A governance structure that is in the form of a committee is embedded within a BCP. In fact, the BCP allows senior management assurance, as well as delineates the responsibilities of senior management. The role of BCP senior management committee provides oversight, initiation, planning, approval, testing and audit. (Sandhu & NIIT, 2002) However, the implementation of the BCP is responsible for the coordination of activities, BIA surveys approval, creating continuity plans and evaluation of the quality assurance activities. Following are the some responsibilities that are performed by the senior leadership of the BCP Committee
- Governance structure approval.
- Specify the responsibilities of the persons involved in the program.
- Administration of the procedures and planning committee, developing teams and working groups.
- Necessary messages and strategies must be communicated.
- BIA results must be approved.
- Assessment of identified significant services and products.
- Continuity procedures and plans approvals.
- Quality of the services must be observed.
- Determining problems and demonstrating its solutions.
The members that are involved in the BCP are the executive sponsor that controls all the responsibilities related to the BCP. Moreover, they also ensure the availability of sufficient funding as well as the procedures regarding senior management support and directions. In fact, the senior managements support is responsible for BCP Coordinator security, evaluation of necessary funds, policy making of BCP, observing the BIA procedures, effective consumer participation, observing development plans related to business continuity, forming working groups and teams, organizing proper trainings and offers routine testing, auditing and analysis of the BCP (Fulmer & Rothstein, 2004). In order to ensure all the security requirements of the BCP in any organization the security officer must work with the coordinator. In addition, the Chief Information Officer (CIO), IT specialist and the BCP coordinator works together for the development of effective business continuity. The performance is further analyzed through the input provided by the business unit representatives. However, the BCP committee is generally co-chaired by the coordinator and the executive sponsor.
2. DR Plan
Our organization is bound to provide IT based services without interruption and it is dependent on its current IT infrastructure that includes IT assets, applications and networks. In case of a major disruption in one of these components impacting the critical IT services, our organization will not be able to provide quality services and may breach the conditions of the Service Level Agreements from the clients. As we have already discussed, risk assessment and risk management along with cost benefit analysis, the expenses should not exceed the value of an asset or service. Likewise, our organization may take a decision after evaluating the business benefits along with associated cost. There are many different DR sites available to date; we will discuss three different DR sites for this case study. They are (Sandhu & NIIT, 2002):
- Hot Site that is fully replicated similar to the primary site or IT infrastructure of the organization and they can switch to in just a matter of time. However, this option can be the most expensive one.
- Warm Site is considered as a secondary source where all the electronic and computing functions are available. Likewise, the site can be operational within several hours and still expensive compare to the cold site.
- Cold site is considered to be an alternate source that is not ready nor have equipment for operation. However, the premises can be used for installing the required electronic and computing equipment that may take a substantial amount of time and effort to make it operational. Cold sites are the most cost effective option but still it depends on the nature of business and customer requirements.
The selection of any one from these three depends on the business requirements. If the organization is dependent on IT services and willing to deliver quality services and gaining competitive advantage in the market, hot site will be the most suitable option for our organization. The site will minimize downtime for the internal staff and service outage for the customers.
3. Information system Policies and Procedures
Information security policy must be enforced to secure information resources from threats, as it will build confidence in stakeholder confidence. Moreover, by securing information resources, competitive advantage can be achieved in the market, that will result in maximizing profitability along with trust in data. Security of the organization should not focus on Information technology only. Some of the sources of threats includes vandalism, sabotage, espionage, natural disasters, online frauds, phishing etc. however, cyber criminals can also compromise networks while data in transit. Some of the threats are non-ethical hacking, viruses, Trojan, malicious codes, and denial of service attacks. An information security policy generally contains Scope, Policy, Ownership, Acceptable Use Requirements, Configuration Requirements, Compliance with Legal Requirements, Associated and Applicable Legislation, All employees Intellectual Property Rights, Intellectual Property Standards and Training, Using Software from Outside Sources, Enforcement and Revision History.
4. Security Controls on Personal Privacy
The requirement for securing personal data and privacy online is due to many reasons. The first reason incorporates not a single law of how to handle customer data. For instance, if an online company sells products and maintains databases including customer information, they can do whatever they want. Most probably, they can sell data in terms of cash. Every website has a link stated as ‘Website Privacy Policy’, but no one knows exactly, to what extent they are authentic. The practical approach to that privacy policy is a different story. The second most prominent reasons are hacking, viruses, Trojans, spywares, phishing and many more. All these threats are designed to gain administrative access to user systems and to steal confidential and personal information Due to these threats; organizations are bound to incorporate strict security procedures and compliance for databases that are incorporated with customer data.
5. Ethical Obligations
Local regulations must be addressed that are applicable where data is handled, stored or protected. Likewise, legal officer of an organization will examine applicable laws and regulations of policies at different regions. The legal officer will consult chief information security officer for establishing required exceptions to policies and specific policies to different regions.
6. Enacted Privacy Laws
Federal Trade Commission (FTC) is examining issues related to online privacy since 1995. The commission believes on the stability factors, as it will not only benefit web users but also businesses. This will be achieved by increasing confidence in the web users who are the core players of the online marketplace. Every website supporting electronic commerce must state a comprehensive privacy policy, in order to achieve customer confidence. A study demonstrated that websites for 33 out of 100 largest cities do not have a privacy policy statement (Gellman & Dixon, 2011). Likewise, they were violating laws and regulations because they were collecting personal data. However, in 2001, most popular commercial website, collecting data from the customers, have clearly mentioned privacy policy statements on their websites (Gellman & Dixon, 2011).
7. Violation of Property Rights
All employees of an organization will conform to the legal requirements of intellectual property protection along with license agreements related to copyright software. The objectives of this policy is to make the employees aware and to make them comply with copyrights, trademarks etc. Employees are accountable if they not use organization’s intellectual property with guidelines and standard procedures. In case of non-compliance, employee will face a disciplinary action, termination of employment and criminal or civil charges. Moreover, the Chief information security officer or any role acting in this category along with system owners will develop educational and training session.
References
Fulmer, K. L., & Rothstein, P. J. (2004). Business continuity planning: A step-by-step guide with planning forms, 3rd edition Rothstein.
Gellman, R., & Dixon, P. (2011). Online privacy: A reference handbook ABC-CLIO.
Sandhu, R. J., & NIIT, (. (2002). Disaster recovery planning Premier Press.
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee