ABCD University is a 21st century college which has advanced technological infrastructure. The organization has an impressive collection of multimedia and computing resources. The university has total 19000 staff and students who use 3000 computers on a regular basis. The university provides maximum resources to the students like computer laboratories, server connection and also various learning facilities. Along with these all the resident students use the university network for their work purpose. Thus the university tries to benefit all the staff and students from their advanced network system. The firm wants to further improve their network system and implement security strategies. For this reason the university has hired a policy maker who would make the students understand the importance of network security and would increase the security system of the entire network connection of the university. He would train both the staff and students in how to maintain security of their own network. Thus this would make the University network more protected and secure to work with.
According to Ronald Reagan “The oxygen of modern age is Information. It is the most powerful tool one can have.”(West, 2008). Every organization including universities must have Information Security-Management System (ISMS). It is one of the most important components of a place which deals with many computers and network server (Microsoft, 2005). All the data present in the IT systems of a University is extremely valuable. It helps in storing and processing information. Thus information security is very essential. The importance of information security is as follows:
Thus Information Security is extremely essential to keep an individual’s personal data secured. In universities there are many students who are doing their research or project using ABCD’s network system so no data or information can be allowed to leak out. According to Network Security Guidelines persons who extract data from different networks can face punishment from the court of law (Siponen, 2001).
Thus information security should be the primary focus of ABCD University so that all the students can make optimum usage of the universities network system.
Every organization and universities has many types of assets. And in the 21st century all the record and data about the various assets are stored in the ABCD’s universities server. It is through this network that the organization controls and classifies its assets and properties. Billions of dollars of assets and their details are stored in the universities server. All the record since the beginning of the university and all the details of the students are incorporated inside the server of the university.
Thus to protect all these, information security is extremely essential for the university. Information security prevents a third party from viewing and accessing those confidential data about the universities assets.
Information security helps to classify information according to security basis. The security system protects the entire data and server of the university but it has priority according to importance basis. For example all the record and details of each and every single student and staff is considered to be high priority. For this reason only a single user is given the liberty to access it. While library information is of medium priority and thus it is accessible to both the student and the librarian. Similarly the university has many medium priority data and information which is accessible to only few people. However for example a certain University club has data and information about its events is of least priority. Here the information security system allows all the members or students to access the club’s data and other event information.
ABCD uses 3000 computers and even has its own network system for the benefit of the students and the staff. It has voice and data network systems with high network security. It has UNIX hosts and also fileservers which support many upgraded applications.
For high security purposes and for optimum use of the computing laboratories the university even has a technical support team. The technical support team is always present inside the campus and offers support to all the students. They even have a help desk with expert technicians who fixes all the software and hardware problems faced by the staff and students. If any malfunction took place or any kind of security problem the technicians would be immediately informed and they would help the students and staff to solve it.
During the early 2000s and also late 1990s many laws were established regarding the privacy and security of information of organizations. This was successful due to the involvement of large company like Enron (Wixom & Todd, 2005).The main focus of all the information security laws and regulations is to protect the integrity, availability and confidentiality of all the information that might have an impact on the stakeholders of an organization (Solms, 2004). The laws regarding information security has certain goals like:
Thus all the laws governing the information security of an organization have the same goal of protect one’s information which he does not want to share. The information security of ABCD University will abide by all the rules and regulations so that all the staff and students can make optimum use of the university’s network and server.
The information security installed in the ABCD University is extremely user friendly. But it requires a little guidance so the technicians arranged a training program for all the staff and students. The program was of 3 hour duration where all the students participated. The following things were taught and showed during the training session:
Thus from the training program the students were shown a demo of the information security. They were also warned about the violation of the information security protocols. The entire program was a successful event.
Information is one of the most important assets of an organization. The information security helps to protect all the data and record of a University or a firm. It uses various software to protect the infiltration of a third party from viewing the data and also prevents various viruses from corrupting the files. Information security contains high level antivirus (Kagan, 2007). The two basic functions of information security are as follows:
Access Control determines and ensures the proper user who is allowed to view or access the information. It does not allow any other person to view the record and data. It controls the servers, mobile devices, mainframes, operating systems, and network services, desktop and also the laptops are monitored by the access control software (Vroom & Solms, 2004). No third party can bypass the security systems provided by the access control. All the data and information is available to only the authorized person and he has unique password to access any data.
Cryptography is considered to be a science which uses complex mathematics including logical designing methods. Strong encryptions are required to hide data and information about an organization (Mogull, 2005). Information security has such strong and protected encryption that allows the valuable information of the University to remain hidden. At present there are many hackers who can even hack and retrieve data and information from highly secured encryptions. The cryptographic control of information security prevents such things from happening.
Thus both access control and cryptographic control is an essential part of information security. The security system installed by ABCD University has both the facilities and thus the students can use the learning resources of the university without any problem.
Auditing of an organization is extremely necessary. It maintains and checks the security of the firm and also maintains the risk management of the company (Petter, Straub & Rai, 2007). Thus ABCD University must make a thorough auditing of the entire system of the university. The university must undergo auditing because of the following reasons:
Thus from the above we can see that ABCD University require a good and thorough auditing. Thus it helps to maintain the security measures of the university and also the various securities polices of ABCD University. Information security also helps to control the environmental security of the university. The university after the auditing installed various information security software by UniTech so that both the students and the staff could receive the optimum benefit of the computing laboratories and the learning resources.
Thus from the above detailed analysis of ABCD University it is evident that information security plays a major role in the privacy of the company. The following things have been derived from the above study:
Thus it can be said that ABCD University must increase their information security and upgrade it so that both the students and staff can utilize the learning resources of the university to its optimum level.
After such a detailed study about the information security of ABCD University many points have come to light. Information security is extremely important for the university so that it can protect all its assets and have proper cryptographic control over the details of every student. The following are the recommendations that the university can add:
MyAssignmenthelp.com has become one of the leading assignment help provider in New York City and Boston. We provide top class auditing assignment help. Not only auditing, but we also cover more than 100 subjects and our writers deal with all types of assignments with utmost expertise. To make writing process faster and accurate, we have segmented our assignment experts' teams as per their expertise on writing different types of assignments. We guaranteed that students who buy our assignment online get solutions worth their investment.
You are required to write a researched argument essay that convinces persuades the reader of your position / stance. This is an academic, researched and referenced do...Read More
Executive Summary The purpose of this report is to elaborate the factors which are considered by individuals before selecting an occupation. Choosing an occupati...Read More
Introduction With the increase enhancement in the field of technology, it has been considered essential by the businesses to implement such technology in their b...Read More
Executive Summary In a merger & acquisition, role of an HR has emerged as a very critical function. At each stage of merger and acquisition process, HR plays a s...Read More
Introduction In this competitive business environment where every business organization is trying to attract the customers of each other, it becomes essential for ...Read More