Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Information Security Policy Compliance, Term Paper Example
Hire a Writer for Custom Term Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Some of the questions from Chapter 3 were relatively simple, while others were more difficult to answer because a number of possible answers were likely. This led to some degree of confusion, particularly because some of the terms may have similar meetings and/or applications under specific circumstances. This contributed to a high level of analysis regarding these questions and the potential responses that might be selected for consideration. I missed question #4 because I could not remember the meanings of the acronyms, I missed question #10 because I was unsure of the exact requirements regarding quality assurance, and I also missed question #15 because I was unsure of the terms least privilege and separation of duties. The questions were not necessarily surprising, but they offered an opportunity to address possible situations that could occur in real life in order to make effective decisions that could impact my future career. This was a positive learning exercise because it enabled me to identify terminology that I am not familiar with so that I am able to learn these terms and apply them in the future.
Principles of Security
Modern organizations require a high level of knowledge and experience in information security needs in order to provide key users with the level of access that will enable them to successfully perform their roles. This requires a behind-the-scenes approach that will positively impact organizational efficiency and improvement by establishing access-based rules to ensure that roles are properly assigned within a given information systems framework (Kuhn et.al, 2010). This process is critical to ensure that user permissions are appropriate and that the system design for this process is efficient (Kuhn et.al, 2010). Role-based access control (RBAC) is one alternative that supports a viable approach to addressing user roles and access, while also remaining flexible in the event that these roles change in the future (Kuhn et.al, 2010).
Information security roles and access are essential in managing a system properly and efficiently; therefore, user permissions must be regulated and monitored to ensure that access is appropriate and timely at all times (Kuhn et.al, 2010). System designs may vary; however, the primary directives must be similar in scope and method to enable users to only have access to systems that are required and essential to their roles (Kuhn et.al, 2010). This article provides important information regarding user access, which is a directive that is not often considered by standard users because it is performed by knowledge experts behind the scenes. However, this capacity is essential to promote organizational performance and effectiveness for all employees at all times.
Security Management Planning
Organizations must be able to identify the core principles of information security that are critical in achieving the desired level of performance. Users must be involved in this process and must be able to participate in decision-making to ensure that security measures are followed at all times (Spears & Barki, 2010). Information breaches may be minimized with employee support and compliance with all security requirements, along with a higher level of monitoring that will enable an organization to be effective in managing its security risks (Spears & Barki, 2010). Therefore, user involvement in mitigating security risks is critical for organizations in order to support a higher level of success and achievement in this area (Spears & Barki, 2010). Priorities in information security management must also be considered so that an organization is prepared to identify the areas where risks could impact long-term objectives and influence how information and confidentiality are protected (Spears & Barki, 2010). This article is relevant because it addresses the significance of holding employees accountable and active in promoting security in all activities involving user systems and information. All employees must be active participants in this process to protect the information system as best as possible.
Terms and Definitions
The chosen information system strategy must be acceptable and appropriate for an organization and its specific needs. This process requires a high level of knowledge of strategy to ensure that the security plan in place encompasses the desired framework. The chosen strategy must be able to recognize the importance of critical issues of vulnerability so that the system is strong and protective of confidential information (Bulgurcu et.al, 2010). In this context, an organization requires full compliance from its employees in an effort to produce the desired outcomes, while also considering other factors that will improve operations and enable employees to accept responsibility for their actions related to information system development (Bulgurcu et.al, 2010). The chosen information system must be safe to use and protective of private information, while also remaining accessible to the needs of individuals within the organization when they are provided with the appropriate level of access (Bulgurcu et.al, 2010). The management of this system must convey confidence that employees are in compliance with the system, along with other factors that will favorably impact operations, including increased confidence and assurance that the system in place is meeting expectations (Bulgurcu et.al, 2010). This is a critical path that an organization must follow so that it is able to address its strengths and weaknesses regarding information security, accompanied by other factors that will protect the organization in the event that breaches might occur. This article is important because it supports a high level framework regarding the needs of organizations that will positively impact operations so that the firm will be able to operate in the desired manner with as few security breaches as possible.
References
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS quarterly, 34(3).
Kuhn, D. R., Coyne, E. J., & Weil, T. R. (2010). Adding attributes to role-based access control. IEEE Computer, 43(6), 79-81.
Spears, J. L., & Barki, H. (2010). User Participation in Information Systems Security Risk Management. MIS quarterly, 34(3).
Stuck with your Term Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee