Importance Of Information Objective Planning Objectives (1)
docx
keyboard_arrow_up
School
Laikipia University *
*We aren’t endorsed by this school
Course
301
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
6
Uploaded by KidAlligatorPerson498
1
Importance Of Information Objective Planning Objectives
Student's Name
Institutional Affiliation
Course Code and Name
Instructor Name
Due Date
2
Importance Of Information Objective Planning Objectives
Introduction
Planning for information security has become crucial to corporate operations in the
current digital era. Protecting this infrastructure is essential to maintaining data confidentiality,
integrity, and availability since organizations rely on it to carry out crucial tasks. This paper aims
to present techniques for protecting information systems infrastructure while highlighting the
need for comprehensive information security planning.
Importance of Information Security Planning
Planning for information security is essential for securing sensitive information,
preserving company continuity, and defending against potential online attacks. Adequate security
measures are implemented to help stop unauthorized access, data breaches, and other security
issues. Financial loss, reputational damage, and legal implications are just some of the negative
outcomes that can result from a security breach. Businesses must develop comprehensive
information security procedures to protect their infrastructure from potential threats or attacks.
According to the National Academies Press, information security has three primary objectives:
privacy, reliability, and accessibility. Confidentiality prevents sensitive data from being exposed
to unauthorized parties. Integrity ensures that information is true and unaltered. The information
must be accessible and readily available to authorized users at all times. By putting in place the
necessary security measures, information security planning seeks to accomplish these goals
(Ursillo & Arnold, 2019).
Methodologies for Securing Information Systems Infrastructure
Infrastructure for information systems must be secured using a comprehensive strategy that
includes adopting several security measures. The information systems infrastructure may be
3
protected using the following approaches while maintaining the infrastructure's confidentiality,
integrity, and availability:
1.
Risk Assessment
Risk assessment is crucial in identifying potential security risks and threats to information
systems infrastructure. It involves analyzing the current infrastructure, identifying potential
threats and vulnerabilities, and assessing the impact of security incidents. Organizations can
efficiently prioritize their security activities and allocate resources thanks to the risk assessment
process. Utilizing a risk management framework, which offers a systematic and organized
procedure for discovering, evaluating, and managing risks, is one strategy for risk assessment. A
well-known risk management system was created by the National Institute of Standards and
Technology (NIST), and it consists of five steps: identity, protect, detect, respond, and recover.
Organizations evaluate possible threats and vulnerabilities in the first stage while identifying the
assets and systems individuals must secure. In the second stage, organizations put protections in
place to protect these resources and techniques. Finding any potential security flaws is the third
stage. Responding to security events comes in at step four, and repairing any harm is done at step
five (Bibri et al., 2020). Utilizing a quantitative or qualitative risk analysis is another method for
risk assessment. While qualitative risk analysis uses subjective judgments to analyze threats,
quantitative risk analysis entails putting numerical numbers on the possibility and possible
consequences of a security breach. Both methods can identify and rank possible security risks
and threats.
2.
Access Control
Access control is a safety mechanism that limits access to confidential information and
computer systems. It entails putting rules, processes, and technology in place to guarantee that
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
only those with the proper authorization may access sensitive data. Role-based access control,
multi-factor authentication, and password policies are examples of access control measures. By
restricting access to those permitted to see, edit, or delete the information, access control seeks to
avoid the abuse, unauthorized modification, or disclosure of sensitive data (Bibri et al., 2020).
This technique defines access controls and user rights and privileges. Encryption, authentication,
authorization protocols like role-based access control, and authentication methods like passwords
or biometric identifiers can be used to implement access control policies (Bourgeois &
Bourgeois, 2014).
3.
Encryption
Encryption is a method of converting plain text data into a coded format for security.
Encryption may be used to safeguard data both while it is stored and while it is in transit.
Algorithms are used to convert data into an incomprehensible format that authorized parties can
only decrypt.
4.
Firewall Protection
A security feature called firewall protection aids in preventing unwanted access to the
infrastructure of information systems. Firewalls are devices used to protect a network.
Monitoring and blocking network traffic that does not conform to predetermined security criteria.
They are a barrier between a company's internal network and the internet to prevent unwanted
access to the information systems infrastructure. By reviewing network traffic, firewalls may
detect and stop possible security risks like malware, viruses, and other harmful software.
Additionally, to lower the danger of illegal access to private data, firewalls may be set up to
restrict access to particular programs or services, including email or file-sharing (Bibri et al.,
2020). A significant security measure that can aid in preventing unwanted access to the
5
infrastructure of information systems is the implementation of firewalls as part of an
organization's overall information security planning strategy.
5.
Patch Management
Patch management regularly installs updates and patches for software to address security
flaws in the operating system, programs, and other software. The infrastructure is protected
against known vulnerabilities and attacks thanks to routine patch management. Maintaining the
security of an organization's information systems infrastructure requires effective patch
management. Organizations may lessen the risk of cyberattacks and safeguard their private data
by routinely applying updates and fixes. Furthermore, patch management guarantees that
businesses' software and systems are up to date with the most recent security features and
industry best practices.
Conclusion
Overall, there can be no leaks, alterations, or lack of access to data. That's why it's so
essential to get ready for data protection. This paper describes a few methods that may be used to
secure the infrastructure of an information system. To safeguard an organization's infrastructure
against potential threats and assaults, it might establish policies, procedures, and controls as part
of a more comprehensive information security strategy. Businesses may use these strategies to
protect their infrastructure and confidential information from being compromised.
6
References
Bibri, S. E., Krogstie, J., & Kärrholm, M. (2020). Compact city planning and development: Emerging
practices and strategies for achieving sustainability goals.
Developments in the built
environment
,
4
, 100021.
https://www.sciencedirect.com/science/article/pii/S266616592030017X
Bourgeois, D., & Bourgeois, D. T. (2014). Learning Objectives; Chapter 6: Information systems security
– Information systems for business and beyond. Create OER with Pressbooks – Your partner in
open publishing.
https://pressbooks.pub/bus206/chapter/chapter-6-information-systems-security/
Ursillo, S., & Arnold, C. (2019). Cybersecurity Is Critical for All Organizations–Large and Small.
2019
International Federation of Accountants
.
https://www.ifac.org/knowledge-gateway/preparing-
future-ready-professionals/discussion/cybersecurity-critical-all-organizations-large-and-small
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help