Using the study selected in Project Part 1, you will continue to develop your research proposal that supports an extension of the published study. For this assignment, you will be writing a short summ

RESEARCH FOUNDATIONS FOR THE INFORMATION SECURITY PRACTITIONER 1




Research Foundations for the Information Security Practitioner

Amar Koduri

University of Fairfax












Topic: IT Security and Governance

Project overview

Advanced technology has effectively transformed the world. The majority of stakeholders, therefore, have taken the initiative of adopting it alongside the emerging trend. In this case, its, therefore, significant development has been realized. The objective of the technical framework has been improving and extending service and enhancing professionalism in areas of application. There has been radical innovation and invention that have helped in coming up with new processes for industrial use (Shuji Kawaguchi, 2009). It has managed to serve as the road map for attaining a competitive and sustainable advantage especially by appreciating the data management and governance roles

Thesis statement

This proposal highlights the problem area of the topic (information security governance) and a hypothetical strength argument for the extension.

Description of the problem

IT security and governance are defined system process where an organization has direct control of the firm security processes and procedures. The international standard organization, reg no38500, fully supports this framework. This plays a different role, and its roles should be detached from security management aspects. It's mainly involved in making effective decisions and plans that are used to respond to any form of disaster and attack that can halt business processes. Governance, in this case, shows the great necessity of governance and coordination, which specifies the best and most forceful reforms. Besides, there is an added advantage of coordinating all elements of those necessary run organization affairs. Governance ensures that all the reforms and plans put in place have been effectively arrived at. This includes monitoring objectives and making recommendations in a typical IT environment.

Despite the well-outlined role and function of security governance, there have been several challenges, as depicted in the selected case. When the approach does not adopt the best compliance as well as creating a mitigation plan, there emerges a challenge with the entire ruining and managing of IT security. This necessarily happens when the model and approach applied do not genuinely reflect the objective of the organization as far as security infrastructure is concerned.

As outlined, there is a set of challenges that are mainly caused by poor designs and regulations. For instance, the research has proved that many companies and businesses are suffering because of network and vulnerability exposure. When the plan has not outlined the excellent security infrastructure in the system, this puts as firm in the dangers of experiencing attacks and data leakages. Besides, there may also a rise in challenges that relate to fear of the unknown in assets and networks. Access points and updates should be analyzed and put in place to avoid network-related issues (Aaron Nolan, 2017). At times, there may be segmented network vulnerability and distributed across a department. From the study population samples, these factors indeed possess challenges in especially when there abuse of accounts and privileges that have been given to different stakeholders. Besides, the firm may not be able to manage network security and infrastructure because of the depth and security and high configuration that has not been mapped in the right way. This factor makes it hard for IT security and governance to fulfill and attain its mandate.

Summary of finding

Following a point of analysis, there is a set of challenges and factors that are affecting a typical IT security and governance center. Based on fact, it's a critical part of the organization and must follow a strict plan and offer high results as far as security concerned. In this case, there is an excellent eddo extend security service procedures to prevent crimes and associate challenges. It has been proved that firms that have not enhanced IT security and governance have challenges of integrity. Besides, there is a reduced trust from all aspects, thus raising cyber alerts in the system (Aaron Nolan, 2017). The comprehensive model should also be launched to help manage the massive effect that has been caused by the identified challenges. Organizational information security systems, therefore, should be taken as a priority and interdependencies part of the organization.

Besides, firms should have an eternal plan that will act as an assurance scheme. In case of any compromise, there should always be corporate designs of responding to all those forms of attack. The security of the management and all stakeholder s in a firm should develop a social and professional aspect that appreciates computing technology and policy that are fundamental consideration when planning for an IT security and governance processes. To sum up, the control system of the security governance caters to all aspects of the organization; this includes hardware abstraction, software, and, more importantly, executive control (Shuji Kawaguchi, 2009). Enhancement of the network findings is a critical factor of strengthening IT security and governance as well the entire security processes in a typical working environment



Extension of the research

The research should analyze and give a more and consistent picture of the actual effect that the firm is likely to face in case policy has not been strictly followed. Some of the outlines that should have been taken into consideration include configuration aspect and robust authentication processes that will prevent intruders and third parties on the system. Besides, it's vital to understand the structure and response processes that should be taken into consideration. All the access control and administrative surveillance should be put in place. The management should be at the forefront of strengthening and appreciating the value of IT security and governance in running the IT environment Aaron Nolan. (2017). It should act as a rule set that ensures safe use of the system and all resources used in dispatching and substantial organizational information.









References

Aaron Nolan. (2017). Information security governance. Retrieved from

https://library.educause.edu/topics/cybersecurity/information-security-governance


National Education Association of the United States. Commission on the Reorganization

of Secondary Education. Committee on Social Studies. (2017). The teaching of mmunity civics.

Shuji Kawaguchi. (2009, November 13). Information security governance framework. Retrieved

from https://dl.acm.org/doi/abs/10.1145/1655168.1655170