StudentShare solutions
Triangle menu

Security Program Alignment - Essay Example

Not dowloaded yet

Extract of sample
Security Program Alignment

ion/attack. It is, hence, computer detective work.
The importance of computer forensic technologies to the securitization of information and for the detection of the source of cyber crimes, manifest in the unauthorized retrieval of data, cannot be overemphasized. As both Stephenson (1999) and Carrier (2004) emphasize, organizations which do not have a digital forensics system in place are inexcusably careless and irresponsible. The implication here is that organizations which handle sensitive data, especially data which the law holds as confidential and private such as patient information, will have a digital forensics system in place. This was confirmed by our organization's IT Director who explained that a digital forensics analysis system was implemented over two years ago. While the IT Director claimed that the organization did not abide by criteria for the determination of whether to use open source or commercial tool sets, his explanation of the system and the process of its selection underscore its efficiency.
Tool Selection
The selection of the tool set was determined by the needs of the organization, the nature of its data and, importantly, a review of past attacks and unauthorized intrusion attempts. As a healthcare organization, the securitization of data is of primary importance since the leakage of patient information to unauthorized personnel renders the organization vulnerable to litigation. Furthermore, because of the nature of its activities, the data information combines between text, as in medical reports and demographic data, graphics, as in patient X-rays, and numbers, as in financial information. The organization, therefore, has to protect three data types.
In their analysis of the various computer forensic tools, Yasinsac and Manzano (2001) maintain that the criteria for selection should be data type and organizational needs and activities. Further explaining this, they note that the tools which are used vis--vis graphical data are not effective when used for numerical or textual information. Watermarking tools are most effective where graphical data is concerned but not so in relation to textual data (Yasinsac and Manzano, 2001). Furthermore, whether commercial or open source tool sets are used should depend on an organization's size, the complexity of its functions and the volumes of data it handles (Yasinsac and Manzano, 2001).
Even though he concurred with Yasinsac and Manzano's (2001) recommendations, the IT director admitted that adherence to their tool set selection criteria was not feasible. While open-source rather than commercial tools were used as a result of the complexity of the organization's processes and the volumes of data it handles, it did not distinguish between graphic and text-based data. Doing so would involve the implementation of two different digital forensics tool sets, thereby multiplying the human and non-human resources assigned ...Show more

Summary

The growing indispensability of computer and internet technologies to the storage, retrieval, communication and analysis of information data has made the adoption of data security technologies an imperative. Most, possibly all, organisation which handle sensitive data have security technologies which are designed to pre-empt and prevent unauthorized intrusion but there is no fool-proof preventative strategy…
Author : jjohnston
Security Program Alignment essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Security Program Alignment"
with a personal 20% discount.
Grab the best paper

Related Essays

Value Alignment
Keeping some values in life will always help a person in reaching the target. Nobody can reach anywhere without hard work. Some people opt for shortcuts in order to reduce the efforts and to reach the targets. Such people often face immense troubles later in their life.
2 pages (500 words) Essay
The Information Technology in Business Organizations
The first section provides a brief but succinct overview of the company under consideration. This section aims to introduce the organization, its history and main work focus. This section provides details about the organization's goals and objectives, mission statement and strategies to achieve those goals.
11 pages (2750 words) Essay
Security Manager Role
As information technology is now considered as the fundamental function for business automation, every organization acquires information systems for business automation and better provision of value added services for gaining competitive edge. On the other hand, security is also becoming paramount with the complexity of systems and applications.
5 pages (1250 words) Essay
Information Security Program Survey
It is the second largest department of the US Federal government and currently employs approximately 280,000 people. VA mainly runs medical facilities and benefits officers for veterans and is responsible for managing the administration programs of veterans and their dependants.
5 pages (1250 words) Essay
Information Security Program Survey
As per 2011 NASA strategic plan, NASA’s mission is to “drive advances in science, technology, and exploration to enhance knowledge, education, innovation, economic vitality, and stewardship of Earth”. Safety, integrity, teamwork, and excellence are the core values of this government agency.
4 pages (1000 words) Essay
Curriculum Alignment
Any mishaps in designing a curriculum might inadvertently lead to disbursement of education that lacks in quality and hence is practically useless. So it is highly advisable to take immense care when dealing with such an important issue and the more when tinkering with the minds of kids who are still very young and the things that they learn at this age will no doubt mould their personalities and when one puts this old quote in context that liquid takes the shape of its container then it is very important to see what these children are being taught.
4 pages (1000 words) Essay
The Impact of Strategic Alignment on IT Projects
By using an Australian Local Australian Council as a case study, this paper tries to answer the question: How is Strategic Alignment achieved in a public organization' The crucial issue is to investigate the role of SA in the success of IT projects. The study identifies perspectives of SA contribute to the Australian Council and IT projects.
11 pages (2750 words) Essay
Standard Alignment
Language arts does not only emphasize on the correctness of the language we speak, but also teaches us the beauty of expressiveness through words. It also enhances the imagination and creation of a child by letting him compose any piece of work with words of his choice.
2 pages (500 words) Essay
Security Manager Role
As information technology is now considered as the fundamental function for business automation, every organization acquires information systems for business automation and better provision of
5 pages (1250 words) Essay
Social Security Program
In the years that took after, then again, industry developed quickly and the economy tended undeniably to be characterized by industrialization, specialization, and urbanization. The effect
2 pages (500 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation