Preview

Active Review #4

Good Essays
Open Document
Open Document
552 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Active Review #4
Chapter 12 #1 & #2 Chapter 10 #8 & #9

Active Review #4

Information Systems Development and Information Security Management are two of the most common workflow in almost every business and organization. If information systems is development well and correctly, many benefits will occur, including increase productivity, reduce the stock of material production, eliminating activities, improve service and customer satisfaction (“Benefits of management,” 2012). Certainly, Information Security Management is critical in today’s business. Information security management raises awareness throughout the business for information security risks and organization will improve credibility and trust among internal stakeholder and external vendors (“Six Main Benefits”, 2012). Information Security Managements an Information Systems Development are explained in many ways.
The first way that will be explained is information security management. The goal is information systems security can be achieved in many ways. Information Systems security involved a trade-off between costs and risks (Kroenke, 2012). Threats can be stopped, or if not stopped, the costs of loss can be reduced by creating appropriate safeguards (Kroenke, 2012). Also, another goal is finding an appropriate trade-off between the risk of loss and the cost of implementing safeguards (Kroenke, 2012). Overall, get in front of the security problem by making the appropriate trade-off for your life and your business (Kroenke, 2012). The impact of computer security problem varies in many ways. There is no full extent of data and financial loss due to computer security threats. Certainly, the losses due to human error are enormous, but few organizations compute these losses and even fewer publish them (Kroenke, 2012).
The last way that will be explained is information Systems Development. The most common tasks to perform for system maintenance, the last phase of the SDLC, are a



References: Kroenke, D. (2013). Experiencing mis. (4th ed.). Upper Saddle River, New Jersey: Pearson Education, Inc. Benefits of management information for business developmen . (2012, January 30). Retrieved from http://ariasena.blogspot.com/2012/01/benefits-of-management-information.html Six main benefits of information security management system. (2012, July 12). Retrieved from http://blog.deurainfosec.com/six-main-benefits-of-information-security-management-system

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Proposal Just Relax Inc

    • 1722 Words
    • 7 Pages

    Kroenke, D. M., Gemino, A., Tingling, P. (2010). Experiencing MIS (2nd Ed). Toronto, Ont. Pearson Education…

    • 1722 Words
    • 7 Pages
    Best Essays
  • Satisfactory Essays

    Describe how an organization can properly manage its information security efforts using proper risk management techniques and cost-benefit analyses for these information security efforts.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…

    • 299 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    appropriate to manage these risks. IT managers then present this information to the senior management.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 457 Words
    • 2 Pages

    Information is an organization’s most valuable asset, yet traditional security practices have either not provided adequate protection of information or have been so restrictive that they have prevented organizations from making the maximum use of information to innovate, collaborate, and achieve competitive advantage. This is primarily due to the reactive approach to security that many organizations have been forced to take in the past. Rather than viewing information security as a business enabler, they have tended to view it as a business inhibitor—a defensive strategy, designed to prevent bad things from happening.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology/Cengage Learning.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Good Essays

    My doctoral study topic focuses on internet security for businesses. Internet security is a broad topic that involves a multitude of theories, beliefs, recommendations, and guidelines. My article selections detailed a synopsis of the government’s responsibility and the end users obligation to internet security. In addition, the annotated bibliographies give the reader a summarization of the article through it 's main focal points. The two articles below are for my doctoral study.…

    • 380 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The Information Systems Department’s goal is to manage a company’s information through safe, secure and resourceful methods that can be accessed easily from anywhere inside the company. The Information Systems Department manages a wide variety of company information; everything from software, computers, storage, e-commerce, online websites, system integration, company networks, IT help, networking, consultation, billing, telecommunications, partnerships, implementation and training. The greatest resource provided by the Information Systems Department is transparency through technology; helping employees use accessible resources to seed the evolution of new technology and future innovation.…

    • 366 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Focus on foundations of Information Systems Management covering the essential concepts in Information Technology Management like planning, organizing, leading and controlling with strong practical orientation. A systemic approach to organizational structures considering information hierarchy around modern day constraints. Analysis and design of information systems as meshed with organizational design. Basic information concepts, data processing technology and its applications. Information Systems development methodology in terms of systems analysis, design and implementation.…

    • 1136 Words
    • 5 Pages
    Satisfactory Essays