Describe about the Importance of Information Security, the laws and regulations of information security and Compliance, system audit controls of ABCD University?
ABCD University is a 21st century college which has advanced technological infrastructure. The organization has an impressive collection of multimedia and computing resources. The university has total 19000 staff and students who use 3000 computers on a regular basis. The university provides maximum resources to the students like computer laboratories, server connection and also various learning facilities. Along with these all the resident students use the university network for their work purpose. Thus the university tries to benefit all the staff and students from their advanced network system. The firm wants to further improve their network system and implement security strategies. For this reason the university has hired a policy maker who would make the students understand the importance of network security and would increase the security system of the entire network connection of the university. He would train both the staff and students in how to maintain security of their own network. Thus this would make the University network more protected and secure to work with.
According to Ronald Reagan “The oxygen of modern age is Information. It is the most powerful tool one can have.”(West, 2008). Every organization including universities must have Information Security-Management System (ISMS). It is one of the most important components of a place which deals with many computers and network server (Microsoft, 2005). All the data present in the IT systems of a University is extremely valuable. It helps in storing and processing information. Thus information security is very essential. The importance of information security is as follows:
Thus Information Security is extremely essential to keep an individual’s personal data secured. In universities there are many students who are doing their research or project using ABCD’s network system so no data or information can be allowed to leak out. According to Network Security Guidelines persons who extract data from different networks can face punishment from the court of law (Siponen, 2001).
Thus information security should be the primary focus of ABCD University so that all the students can make optimum usage of the universities network system.
Every organization and universities has many types of assets. And in the 21st century all the record and data about the various assets are stored in the ABCD’s universities server. It is through this network that the organization controls and classifies its assets and properties. Billions of dollars of assets and their details are stored in the universities server. All the record since the beginning of the university and all the details of the students are incorporated inside the server of the university.
Thus to protect all these, information security is extremely essential for the university. Information security prevents a third party from viewing and accessing those confidential data about the universities assets.
Information security helps to classify information according to security basis. The security system protects the entire data and server of the university but it has priority according to importance basis. For example all the record and details of each and every single student and staff is considered to be high priority. For this reason only a single user is given the liberty to access it. While library information is of medium priority and thus it is accessible to both the student and the librarian. Similarly the university has many medium priority data and information which is accessible to only few people. However for example a certain University club has data and information about its events is of least priority. Here the information security system allows all the members or students to access the club’s data and other event information.
ABCD uses 3000 computers and even has its own network system for the benefit of the students and the staff. It has voice and data network systems with high network security. It has UNIX hosts and also fileservers which support many upgraded applications.
For high security purposes and for optimum use of the computing laboratories the university even has a technical support team. The technical support team is always present inside the campus and offers support to all the students. They even have a help desk with expert technicians who fixes all the software and hardware problems faced by the staff and students. If any malfunction took place or any kind of security problem the technicians would be immediately informed and they would help the students and staff to solve it.
During the early 2000s and also late 1990s many laws were established regarding the privacy and security of information of organizations. This was successful due to the involvement of large company like Enron (Wixom & Todd, 2005).The main focus of all the information security laws and regulations is to protect the integrity, availability and confidentiality of all the information that might have an impact on the stakeholders of an organization (Solms, 2004). The laws regarding information security has certain goals like:
Thus all the laws governing the information security of an organization have the same goal of protect one’s information which he does not want to share. The information security of ABCD University will abide by all the rules and regulations so that all the staff and students can make optimum use of the university’s network and server.
The information security installed in the ABCD University is extremely user friendly. But it requires a little guidance so the technicians arranged a training program for all the staff and students. The program was of 3 hour duration where all the students participated. The following things were taught and showed during the training session:
Thus from the training program the students were shown a demo of the information security. They were also warned about the violation of the information security protocols. The entire program was a successful event.
Information is one of the most important assets of an organization. The information security helps to protect all the data and record of a University or a firm. It uses various software to protect the infiltration of a third party from viewing the data and also prevents various viruses from corrupting the files. Information security contains high level antivirus (Kagan, 2007). The two basic functions of information security are as follows:
Access Control determines and ensures the proper user who is allowed to view or access the information. It does not allow any other person to view the record and data. It controls the servers, mobile devices, mainframes, operating systems, and network services, desktop and also the laptops are monitored by the access control software (Vroom & Solms, 2004). No third party can bypass the security systems provided by the access control. All the data and information is available to only the authorized person and he has unique password to access any data.
Cryptography is considered to be a science which uses complex mathematics including logical designing methods. Strong encryptions are required to hide data and information about an organization (Mogull, 2005). Information security has such strong and protected encryption that allows the valuable information of the University to remain hidden. At present there are many hackers who can even hack and retrieve data and information from highly secured encryptions. The cryptographic control of information security prevents such things from happening.
Thus both access control and cryptographic control is an essential part of information security. The security system installed by ABCD University has both the facilities and thus the students can use the learning resources of the university without any problem.
Auditing of an organization is extremely necessary. It maintains and checks the security of the firm and also maintains the risk management of the company (Petter, Straub & Rai, 2007). Thus ABCD University must make a thorough auditing of the entire system of the university. The university must undergo auditing because of the following reasons:
Thus from the above we can see that ABCD University require a good and thorough auditing. Thus it helps to maintain the security measures of the university and also the various securities polices of ABCD University. Information security also helps to control the environmental security of the university. The university after the auditing installed various information security software by UniTech so that both the students and the staff could receive the optimum benefit of the computing laboratories and the learning resources.
Conclusions
Thus from the above detailed analysis of ABCD University it is evident that information security plays a major role in the privacy of the company. The following things have been derived from the above study:
Thus it can be said that ABCD University must increase their information security and upgrade it so that both the students and staff can utilize the learning resources of the university to its optimum level.
After such a detailed study about the information security of ABCD University many points have come to light. Information security is extremely important for the university so that it can protect all its assets and have proper cryptographic control over the details of every student. The following are the recommendations that the university can add:
References
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download