Saturday, June 22, 2019
Case Study Example | Topics and Well Written Essays - 1250 words - 9
Case Study ExampleThe scope of operations of Bank Solutions Inc. identifies the need for tribute measures but risk assessment of the fraternitys operational set up identifies security, interoperability, and operations issues that threaten the organizations ability to implement DRBC plan and safeguard its data. This report analyses issue close to the organizations system, based on results from its internal report, and recommend IT security controls and government regulations and standards that can safeguard the companys data.Scope of the companys operations that identifies data in electronic format and the companys outdated and untested data system identifies integrity, confidentiality, and authentication as major security issues (The United Nations, 2007). This is because the companys outdated and untested could be inefficient in detecting and preventing assertable internal threats. This also raises authenticity, repudiation, and integrity concerns due to possible arbitrary data alteration (Camara, Crossler, Midha, & Wallace, 2011). Confidentiality is also an issue because of companys laxity in customization and implementation of disaster recovery and business continuity achieve plan that mean that stored data is susceptible to breach from employees who are not entitled to access and external threats. Such access can only place malicious intention and breach of confidentiality (Chhabra, 2013) and lack of regulation on data access purports this.Operational issues are also evident in the case and implementation of Information Technology governance is an example. Effective governance offers leadership for availability and implementation of necessary frameworks for operations and security of a system (Grajek & Pirani, 2012). Assessment results suggest lack of such governance, leading to application of an outdated and untested system. Identified failure by some facilities to customize and implement DRBC plans also shows lack of potent governance
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment