Discussion6_1

docx

School

University of the Cumberlands *

*We aren’t endorsed by this school

Course

831

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

1

Uploaded by DeanMolePerson601

Report
What do you think were the critical factors that fueled the need for IT governance? In what ways did ISO affect the standards for network security? Please make your initial post and two response posts substantive. A substantive post will do at least two of the following: In the last thirty years, as computing power increased and computers became cheaper, businesses leveraged technology to move many business processes to information systems. Today, every single business process relies on a computer and the internet or internal company network to conduct its daily activities. Information for business processing is now stored as data and files are transacted through information systems. While technology improvements over the last century resulted in handwritten records being replaced with paper records that were typed on a typewriter, the ability to store more information on a computer resulted in the accelerated use of computers in the workplace. The advent of the internet improved efficiencies in business communication as more and more companies used email to communicate and conduct business processes. Further improvements in cryptographic algorithms have given rise to encrypted communication and cryptographic hash signatures on contracts. This move from paper-based business processes to data or computer-based business processes was the critical step that resulted in the need for IT governance (Gregory et. al., 2018). In today’s business environment, any nonoperational time for an information technology system will result in significant losses for a business. Loss of data or questions on the integrity and authenticity of information stored within computer systems can result in poor business decisions. Incorrect information in a computer could also result in improper financial reports. This could cause negative news in the media or even fines from regulators. These impacts to a business due to improper information in an information system require proper governance procedures in place for IT systems (Gregory et. al., 2018). The international standards organization (ISO) produces many standards that govern the manufacture or deployment of services. Of the many standards produced by this organization, there is a set of standards that pertains to the information technology industry. Section 35 of ISO has many IT standards that include IT equipment, software development, security standards, and networking standards. The ISO network security standards cover the latest best practices in the industry that should be adopted by a company to ensure adequate network security for its own company. While compliance with these standards is not necessary, many companies adhere to them to signal to their customers that they follow the best industry standards (Mesquida, & Mas, 2015). References: Mesquida, A. L., & Mas, A. (2015). Implementing information security best practices on software lifecycle processes: The ISO/IEC 15504 Security Extension. Computers & Security, 48, 19– 34. https://doi.org/10.1016/j.cose.2014.09.003 Gregory, R. W., Kaganer, E., Henfridsson, O., & Ruch, T. J. (2018). It Consumerization and the Transformation of It Governance. MIS Quarterly, 42(4), 1225– 1253. https://doi.org/10.25300/MISQ/2018/13703
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help