Preview

Active Review #4

Good Essays
Open Document
Open Document
552 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Active Review #4
Chapter 12 #1 & #2 Chapter 10 #8 & #9

Active Review #4

Information Systems Development and Information Security Management are two of the most common workflow in almost every business and organization. If information systems is development well and correctly, many benefits will occur, including increase productivity, reduce the stock of material production, eliminating activities, improve service and customer satisfaction (“Benefits of management,” 2012). Certainly, Information Security Management is critical in today’s business. Information security management raises awareness throughout the business for information security risks and organization will improve credibility and trust among internal stakeholder and external vendors (“Six Main Benefits”, 2012). Information Security Managements an Information Systems Development are explained in many ways.
The first way that will be explained is information security management. The goal is information systems security can be achieved in many ways. Information Systems security involved a trade-off between costs and risks (Kroenke, 2012). Threats can be stopped, or if not stopped, the costs of loss can be reduced by creating appropriate safeguards (Kroenke, 2012). Also, another goal is finding an appropriate trade-off between the risk of loss and the cost of implementing safeguards (Kroenke, 2012). Overall, get in front of the security problem by making the appropriate trade-off for your life and your business (Kroenke, 2012). The impact of computer security problem varies in many ways. There is no full extent of data and financial loss due to computer security threats. Certainly, the losses due to human error are enormous, but few organizations compute these losses and even fewer publish them (Kroenke, 2012).
The last way that will be explained is information Systems Development. The most common tasks to perform for system maintenance, the last phase of the SDLC, are a



References: Kroenke, D. (2013). Experiencing mis. (4th ed.). Upper Saddle River, New Jersey: Pearson Education, Inc. Benefits of management information for business developmen . (2012, January 30). Retrieved from http://ariasena.blogspot.com/2012/01/benefits-of-management-information.html Six main benefits of information security management system. (2012, July 12). Retrieved from http://blog.deurainfosec.com/six-main-benefits-of-information-security-management-system

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Describe how an organization can properly manage its information security efforts using proper risk management techniques and cost-benefit analyses for these information security efforts.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…

    • 299 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    appropriate to manage these risks. IT managers then present this information to the senior management.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology/Cengage Learning.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Good Essays

    My doctoral study topic focuses on internet security for businesses. Internet security is a broad topic that involves a multitude of theories, beliefs, recommendations, and guidelines. My article selections detailed a synopsis of the government’s responsibility and the end users obligation to internet security. In addition, the annotated bibliographies give the reader a summarization of the article through it 's main focal points. The two articles below are for my doctoral study.…

    • 380 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    The Information Systems Department’s goal is to manage a company’s information through safe, secure and resourceful methods that can be accessed easily from anywhere inside the company. The Information Systems Department manages a wide variety of company information; everything from software, computers, storage, e-commerce, online websites, system integration, company networks, IT help, networking, consultation, billing, telecommunications, partnerships, implementation and training. The greatest resource provided by the Information Systems Department is transparency through technology; helping employees use accessible resources to seed the evolution of new technology and future innovation.…

    • 366 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Focus on foundations of Information Systems Management covering the essential concepts in Information Technology Management like planning, organizing, leading and controlling with strong practical orientation. A systemic approach to organizational structures considering information hierarchy around modern day constraints. Analysis and design of information systems as meshed with organizational design. Basic information concepts, data processing technology and its applications. Information Systems development methodology in terms of systems analysis, design and implementation.…

    • 1136 Words
    • 5 Pages
    Satisfactory Essays