StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Systems Security Assurance Management - Article Example

Cite this document
Summary
The paper “Information Systems Security Assurance Management” presents a case of study of disaster management and recovery by Municipal Solutions, a company that is engaged in providing information systems and solutions to municipalities in the United States…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Information Systems Security Assurance Management
Read Text Preview

Extract of sample "Information Systems Security Assurance Management"

Information Systems Security Assurance Management Summary:As the title suggests, the paper presents a case of study of disaster management and recovery by Municipal Solutions, a company that is engaged in providing information systems and solutions to municipalities in the United States. Based in Cleveland, Ohio, the company, through hard work and dedication managed to become a leader in providing software solutions exclusively to municipal corporation in the US as well as Canada. The firm was headed by its founder Paul Teitelbaum, an industrial engineer, previously employed with Pricewaterhouse Coopers.

Teitelbaum is described as a visionary and a team man, who was congenial and loved to give credit to others where it was due. The disaster that occurred was a major fire that completely destroyed the company’s servers including the entire software code of the programs made for their clients. Moreover, MSS also hosted a few of the programs of their smaller clients on their own servers.The news of the fire was relayed to Brian Elkin, who was in charge of research and development. Teitelbaum was out of town at the moment, so Elkin rushed to Andrew Katula (senior software engineer).

It was the practice of the company to take backups of the software regularly. Katula was in the practice of doing so every evening after business, and Elkin was reveilved that he done so the previous evening also. The authors state that had this not been done, the company’s business would have come to a stop and might even result in closure. When Teitelbaum returned he provided a free reign to his employees to purchase new hardware immediately. MSS’s telephone company, Verizon was asked to forward all calls to a new number.

He contacted a friend for temporary office space and within four days had a functioning office with all the required hardware and infrastructure. Only the small clients who had servers with MSS were affected to a certain extent. The hardware vendors went out of their way to get the equipment for MSS. Most of the other clients did not even know about the fire at the company premises. Servers and other equipments are now protected by sensors that switch on cooling fans if the temperature exceeds a certain limit.

Backup is being done everyday as before. Review:It can be seen that the best disaster management practice was taking daily backups. Otherwise the company would have suffered irreversible damage. The fact that MSS did not have a proper fire safety system in the first place is not a good practice in disaster management. but the recovery aspect was handled very well by Teitelbaum and his team. The fact that he gave free hand in purchasing the hardware and other requirement is testimony to the fact.

On the whole the disaster management and recovery in this case was handled efficiently with only minimum of disruption of its own business and those of its customersWith regard to the paper, it is felt that the authors has gone into too much detain with regard to the company’s history and background. It does not have any apparent relation with disaster management and recovery. The diagram showing hierarchy does not add much to the usefulness of the paper. The authors could have just mentioned about Elkin and Katual instead of showing them in the hierarchal structure.

In spite of going into so much detail about the company’s background and history, the authors seem to have omitted the period within which MSS started operations in its renovated office. This could have provided a picture of how quickly the company restored operations in its own premises. But otherwise the paper is well-laid out with clear headings. The language used is also clear and concise and personal statements made by Teitelbaum makes the article more intimate and readable. Diagrams and photographs showing the server infrastructure is also very good.

Personal experience:My personal experience with regard to disaster management and recovery is limited. But inadequate power protection in an organization where I worked was damaged to a power surge. The firm had five computers (networked) and was engaged in the business of advertising. It was a small firm with limited number of clients doing assignments for clients within the city limits. It can be seen that the firm did not have a prevention strategy. But the hard disks could be saved and the full data was recovered after two days.

The firm had minor problems, but after the incident proper power protection equipment was installed and the employee in charge of IT was asked to take backups of data every day. It can be concluded that every organization should have preventive measures along with a strategy for management and recovery from a disaster. The current environment has the potential to bring about disasters in many forms and firms should be equipped to prevent or if not to handle and manage them.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Systems Security Assurance Management Article”, n.d.)
Information Systems Security Assurance Management Article. Retrieved from https://studentshare.org/management/1563265-go-beyond-just-summarizing-the-readings-include-personal-experiences-synthesize
(Information Systems Security Assurance Management Article)
Information Systems Security Assurance Management Article. https://studentshare.org/management/1563265-go-beyond-just-summarizing-the-readings-include-personal-experiences-synthesize.
“Information Systems Security Assurance Management Article”, n.d. https://studentshare.org/management/1563265-go-beyond-just-summarizing-the-readings-include-personal-experiences-synthesize.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Systems Security Assurance Management

Information systems security incident

To fulfill this mission the operational framework for security of the software,hardware and data associated with information systems is defined based on ISO 17799.... To fulfill this mission the operational framework for security of the software, hardware and data associated with information systems is defined based on ISO 17799.... This paper describes the types of logs that are maintained at B-Concepts, the log management system and discusses the advantages of security logs....
8 Pages (2000 words) Essay

Why Information Assurance (IA) is Important to our Organization

According to Tulloch (2003), Information assurance is the process of protecting and defending information systems and infrastructures against attack.... ?? An increasingly popular approach for ensuring information assurance is the Common Criteria & Methodology for Information Technology Security Evaluation, an international effort to standardize criteria for evaluating the security of information systems outlined in the ISO 15408 standard.... Information assurance's broader connotation also includes reliability and emphasizes strategic risk management over tools and tactics [Wikipedia]....
5 Pages (1250 words) Essay

The Future of Information Assurance

The functions that information systems perform within an organization, and related transforms in vulnerability and threat models are significant.... Since networked information systems become indispensable to present living, the need for information assurance in securing accessibility, reliability, and privacy for information become progressively more vital.... The increase in networking… In the future, the problem for information assurance managers will be to let large numbers of allies into the enterprise even as controlling and observing their It needs a great deal of deeper layering of protection methods within the enterprise and globally it requires major developments to the fundamental information infrastructure in addition to extended collaboration across enterprise and national boundaries (techdigest, N....
4 Pages (1000 words) Essay

Information Technology- Security

Facility management and it role in the protection of organization against threatsThe international Facility management association defines facility management as a profession encompassing multiple disciplines that enhances the functionality of the built environment.... Customer relation, time management, business continuity and financial awareness are some of the activities that are prone to information insecurities.... The management should also regulate the transmission of information in its physical form....
2 Pages (500 words) Research Paper

Safety Management Programs

The paper “Safety management Programs” looks at programs, which are presently turning into a necessary part of aeronautics operations security.... The absence of these "voluntary" programs, it would imply that the capacity for a specialist to have a fruitful SMS is restricted in that the reporting society and structure important to help and drive the motors of SMS (Safety Risk management (SRM) and Safety Assurance (SA)) might not be set up.... In other words, they are particularly named Flight Operations Quality assurance (FOQA), Line Operations Safety Audit (LOSA), Aviation Safety Action Partnership (ASAP), and Voluntary Disclosure Reporting Programs (VDRP) (Kelloway & Cooper, 2011)....
4 Pages (1000 words) Assignment

The Role of the Information Security Officer

In the paper “The Role of the Information security Officer” the author looks at the field of information security, which deals with the security of information against threats like illegal access, leakage of confidential information, interference between flows of information between organizations.... Impact of Information security ThreatsAccording to (Williams, 2007; Pesante, 2008; Turban et al.... 2005), there are some information security risks those can be faced by the users such as • They must be able to trust on the information which they are using....
12 Pages (3000 words) Dissertation

Network Security - Information Assurance

With the multi-dimensional growth of information, information systems and the states of existence of the information, the environment has grown to be highly information-intensive and the availability of information in an assured manner is of paramount importance.... The paper "Network Security - Information assurance" highlights that in general, the explosive growth of Information Technology and the amalgamation of IT with telecommunication have brought together the world much closer than any time before in history....
12 Pages (3000 words) Coursework

The Companys Vulnerability of Information Leakages in BioMed Devices

The CEO will promote the proper management of the company.... Data Protection There are a few roles of individuals included in the assurance of data from BioMed Company.... Aside from the organization picking a Qualified, Experienced Mobile Security Provider, the CEO will be the leader of the team and concerned with the correct administration of the entire organization while guaranteeing that all divisions work as an inseparable unit for the benefit of society particularly in data assurance....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us