Subject: Emerging Threats and Countermeasures (need 2 copies of answers)Question 1: Write a 500 word essay (APA format & 2 latest scholarly journal article references 2016 on words) Attacks on our nat

Running Head: FINAL PAPER 0

Final Paper: Project Description

ITS-833: Information Governance

The information technology industry is essential in the current world based on the ever-growing and improving technology aspect. The sector of information technology needs to adhere to all the principles of information that are abbreviated and initialized as CIA, meaning that the information principles need to adhere to confidentiality, integrity, and availability. The companies and organizations in the IT industry need to take into consideration the elements of information governance (Grewal, 2018) .with appropriate and effective information governance within the industry. There are minimal chances of the company being sued for infringement or breaching of the rules and regulations. It is essential to note that companies within the information technology sector or industry are prone to the effects of malicious attempts and need to be on toes in matters of technology to ensure they are safe and the information is kept secure.

Some of the challenges facing the companies in the industry on matters of information governance include effects from social media. Social media is a known platform for interaction and sometimes can be mishandled by the users and leak information that was not supposed to leak or be revealed. Some employees can resort to airing their grievances via social media and may print the image of the company and its reputation wrongly. Most of the companies in the IT industry rely on reputation and a good image, which assures clients retention and attraction of new customers.

Another notable challenge facing companies in the IT industry is the impact of hackers. Hackers are known to affect the IT Company by stealing vital information and also revealing secrets to rival companies (Carey & Jin, 2020). Sometimes the virus the hackers use may erase records and make records inaccessible. Some can even make the devices unable to work again hence forcing them to incur unnecessary costs. Hackers can implement illegal access or remote access and access the information which is supposed to be held with a lot of confidentiality. An IT company risks being sued in a court of law for violating privacy and confidentiality principle; hence there is a need to secure the devices and the system by making them more secure and keep data safe.

Another challenge facing the companies in the information technology industry is the lack of awareness and adherence to the federal and state requirement that governs information. It has been recorded that some companies have been violating the federal requirement that needs the information and other essential information to be retained. Some information, like personal data on health issues of employees, needs to be held with a lot of privacy. If, in any case, the information leaks to outsiders, the company may be sued and may be forced to compensate the affected person (Smallwood, 2016). There are also regulations stating the duration information need to be retained by even after the employee has resigned, expelled, or even reached the end of the contract. Such information needs to be retained for not less than three years by the federal laws to be revisited in the case of legal action or if there can be a dispute in the near future (Smallwood, 2019). Some companies within the industry fail to understand these laws and requirements and hence end up being fined for failing in information retention.

References

Arma International. (2018). Information governance body of knowledge (IGBOK).

Carey, M. J., & Jin, J. (2020). Tribe of hackers security leaders: Tribal knowledge from the best in cybersecurity leadership. John Wiley & Sons.

Grewal, J. (2018). Facing new challenges. Oxford Scholarship Online. doi:10.1093/oso/9780199467099.003.0009

Information governance, IT governance, data governance. (2019). Information Governance, 19-28. doi:10.1002/9781119491422.ch2

Keyser, T. (2018). Information governance. The Information Governance Toolkit, 3-9. doi:10.1201/9781315385488-1

Masys, A. J. (2016). Exploring the security landscape: Non-traditional security challenges. Springer.

Rai, D. (2018). Ethical hacking for beginners: #hack_ethically, #hack_smartly. Createspace Independent.

Shafik, N. (2016). Economic challenges facing Middle Eastern and North African countries. Springer.

Smallwood, R. F. (2016). Information governance for executives: Fundamentals & strategies. Createspace Independent Publishing Platform.

Smallwood, R. F. (2018). Information governance for healthcare professionals: A practical approach.