Modern IT Systems and applications
The
introduction session shall involve having a meeting with policy and ethics
information manager Mr. Lee. He shall guide through the various briefing about
orientation to the tools and techniques applied in information assurance. The
session shall take two weeks. During first two days orientation, Mr. Lee shall
explain a wide range of information issues within social and organization
settings. The researcher shall be required to explore techniques for assessing
data and information. Researchers shall also be required to explore needs for
technology as well as defining social and ethical issues that should be
implemented in the information assurance (H. C. Lee, Personal Communication,
2nd May 2017).
Second half in the first
week I shall have seminar training with the foundation of organizations
information assurance training center. The facilitator and supervisor o
training process will be Miss Ivy, a principal in the foundation of
organizations information assurance training center. The main goal of the
session shall include learning and familiarizing with concepts, elements,
strategies as well as skills involving the life cycle of information assurance.
Researchers shall be allowed to analyze information assurance planning process
as well as determining information assurance organization goals, aims, threat,
spectrum risks as well as legal, ethical issues (N. M. Ivy, Personal
Communication, 4th May 2017).
First,
two days of the second week shall involve securing having an introduction to
information economics and business operation session shall be based on information
technology workshop. The aim of the session is to learn theoretical ad
practical implementation of information assurance in business sectors.
Researchers shall analyze the concept of disseminating data and information
from one area to another. The final session shall involve having an
introduction to fundamentals of information security and analytical security
concepts. Researchers shall have enough session to explore answers to key
business tragedies and issues involving data and information security (K. F.
Leon, Personal Communication, 7th May 2017). The session shall be conducted
under the supervision of Mrs. Leon, strategic manager for professional
information assurance.
Action
I
meet Mr. Lee who introduced me to the context of data and information assurance
professionals industry. Through his intervention we covered data and
information security concepts such as professional ethics, defining personal
privacy, and freedom of expression in regard data and information security. I
was privileged to explore various concepts such as intellectual properties as
well as tools that guarantee data and information assurance. Among various
techniques explored in the seminar, the meeting included authentication,
verification, validation, and authorization. Social interactions are main
loopholes that give easy penetration to data and information insecurity.
Ethical matters must be given priority as well as setting strong organization
policies (H. C. Lee, Personal Communication, 10th May 2017). Activities implemented in the
training session included having a training session involving implementing
confidentiality, integrity as well as the availability of data and information.
CIA principals are major security concepts that ensure complete mitigation of
security risks such as internal and external frauds, information and security
breaches, cyber attacks, hacking and intrusion among others (N. M. Ivy,
Personal Communication, 12th May 2017). I was capable of reviewing regulatory
and security compliance as well as noncompliance.
During the second week, I participated in
practical forums involving workshops. I took part in troubleshooting,
diagnosing and repairing technological failures. Among the technologies
examined included the online security analytical tools, and visualizing tools.
The business and organizations encounter issues such as financial losses, data,
and information leakage as well as loss of intellectual properties. Through
practical and theory training session I have understood how to plan, analyze
and evaluate possibilities of information breaches. The session involving
practical has facilitated effective implementation of visualizing of security
enhancing systems such as information signaling to secure information.
Structural systems that ensure secure parameters are guaranteed have also been
introduced to facilitate effective and efficient setting and configuring of
information centers (K. F. Leon, Personal Communication, 14th May 2017).
Observation
Through
orientation facilitated by Mr. Lee, Miss. Ivy, and Mrs. Leon I have observed
various trends that promote and encourage data and information assurance.
Introduction session has enabled to understand an advanced level information
assurance and new security issues. As a researcher, I have learned contemporary
security issues such as hacking, intrusion, money fraud, cyber security as well
as stealing of sensitive data. Other observations in the introduction session
include infrastructure security control and management processes. I have
observed various operations involve risk as well as analyzing techniques
involving data and information management. Security issues include security and
information planning such as analysis and safeguarding operations (K. F. Leon,
Personal Communication, 17th May 2017). I have observed different trends in
security policies revealing security integrity as well as development and
administration of security. The activities identified as major contingency
planning. It has revealed various operations such as incidence handling as well
as responding to security standards.
The
introduction session has also facilitated the effective acquisition of security
procedures that promote security. I have observed the strategies involved in
data and information assurance through promoting integrity, availability,
authenticity, non-repudiation as well as confidentiality. The element and
principles of data and information security guarantee complete surety on
organization data. I have acquired a better understanding of information-related
analysis on risk management in cyber as well as physical systems. The
operations have also provided direct and operational criteria’s for analyzing
systems integrity and operations (N. M. Ivy, Personal Communication, 19th May
2017). Among the information assurance
systems, the technologies that combat and ensure attackers are silenced include
forensic science, security management, and information systems. Organizations
should enforce information security by introducing digital forensics (John,
2002). Through seminars, training, and workshops I have learned fundamentals of
the forensic processing, evidence handling, and quality assurance ethical
issues as applied in digital forensics.
Reflection
Through
introduction session, I have acquired various techniques involving information
assurance. Various experts have brought clearly about the need for the
significance of information assurance. Through the study, I have successfully
acquired strategies and methodologies for effective and efficient identifying, monitoring,
and mitigating data and information operational risks. The major areas where
data and information assurance apply include personal, corporate and
institutional data. Information assurance must be guaranteed for data and
information on transit, stored data, as well as data and information in
processing status (H. C. Lee, Personal Communication, 20th May 2017). I have observed that all
information is vital and it should be secured, protected and prevented from
exposures, leakages or intention, and nonintentional dissemination.
Corporations and government agencies should ensure secure operation on networks
to safe data (Eric A., & Hitachi Data Systems, 2009). For persistent
information assurance, concerned individuals should analyze risk appetites, and
ensure drive risk awareness at each level of users who access corporate or
government data and information (Matthew H., & Stan, 2014).
Through
the introduction activities, I managed to examine technology failures
effectively, repair troubleshoots and diagnoses information handling systems.
Meeting with different experts facilitated professional knowledge and
information sharing. I have acquired skills as well as knowledge in security
issues such as crisis management in information technology, intellectual
property, and patent rights as well as ethical principles that govern the
handling of data and information. The
session involving introduction has provided other forms of information analysis
such as risk analysis and control management, data and information assurance
management. Other areas covered during orientation include assessing risks
analyzing risks, and risk mitigation planning (K. F. Leon, Personal
Communication, 20th May 2017). The future study shall focus on better and
improved information assurance based on online security analyzing tools as well
as implementing risk management process using several structured techniques and
approaches that facilitate information assurance and decision-making.
References
Eric
A., & Hitachi Data Systems (2009). Introduction to Information Assurance.
John
W. (2002). Information Assurance/Information Security Computer System Security
and Privacy.
Matthew
H., & Stan G. (2014). confidentiality, integrity, and availability (CIA
triad).
Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in urgent custom research papers. If you need a similar paper you can place your order from nursing school papers services.
Comments
Post a Comment