Modern IT Systems and applications


The introduction session shall involve having a meeting with policy and ethics information manager Mr. Lee. He shall guide through the various briefing about orientation to the tools and techniques applied in information assurance. The session shall take two weeks. During first two days orientation, Mr. Lee shall explain a wide range of information issues within social and organization settings. The researcher shall be required to explore techniques for assessing data and information. Researchers shall also be required to explore needs for technology as well as defining social and ethical issues that should be implemented in the information assurance (H. C. Lee, Personal Communication, 2nd  May 2017).
Second half in the first week I shall have seminar training with the foundation of organizations information assurance training center. The facilitator and supervisor o training process will be Miss Ivy, a principal in the foundation of organizations information assurance training center. The main goal of the session shall include learning and familiarizing with concepts, elements, strategies as well as skills involving the life cycle of information assurance. Researchers shall be allowed to analyze information assurance planning process as well as determining information assurance organization goals, aims, threat, spectrum risks as well as legal, ethical issues (N. M. Ivy, Personal Communication, 4th May 2017).
First, two days of the second week shall involve securing having an introduction to information economics and business operation session shall be based on information technology workshop. The aim of the session is to learn theoretical ad practical implementation of information assurance in business sectors. Researchers shall analyze the concept of disseminating data and information from one area to another. The final session shall involve having an introduction to fundamentals of information security and analytical security concepts. Researchers shall have enough session to explore answers to key business tragedies and issues involving data and information security (K. F. Leon, Personal Communication, 7th May 2017). The session shall be conducted under the supervision of Mrs. Leon, strategic manager for professional information assurance.   

Action

I meet Mr. Lee who introduced me to the context of data and information assurance professionals industry. Through his intervention we covered data and information security concepts such as professional ethics, defining personal privacy, and freedom of expression in regard data and information security. I was privileged to explore various concepts such as intellectual properties as well as tools that guarantee data and information assurance. Among various techniques explored in the seminar, the meeting included authentication, verification, validation, and authorization. Social interactions are main loopholes that give easy penetration to data and information insecurity. Ethical matters must be given priority as well as setting strong organization policies (H. C. Lee, Personal Communication, 10th  May 2017). Activities implemented in the training session included having a training session involving implementing confidentiality, integrity as well as the availability of data and information. CIA principals are major security concepts that ensure complete mitigation of security risks such as internal and external frauds, information and security breaches, cyber attacks, hacking and intrusion among others (N. M. Ivy, Personal Communication, 12th May 2017). I was capable of reviewing regulatory and security compliance as well as noncompliance.
 During the second week, I participated in practical forums involving workshops. I took part in troubleshooting, diagnosing and repairing technological failures. Among the technologies examined included the online security analytical tools, and visualizing tools. The business and organizations encounter issues such as financial losses, data, and information leakage as well as loss of intellectual properties. Through practical and theory training session I have understood how to plan, analyze and evaluate possibilities of information breaches. The session involving practical has facilitated effective implementation of visualizing of security enhancing systems such as information signaling to secure information. Structural systems that ensure secure parameters are guaranteed have also been introduced to facilitate effective and efficient setting and configuring of information centers (K. F. Leon, Personal Communication, 14th May 2017).

Observation

Through orientation facilitated by Mr. Lee, Miss. Ivy, and Mrs. Leon I have observed various trends that promote and encourage data and information assurance. Introduction session has enabled to understand an advanced level information assurance and new security issues. As a researcher, I have learned contemporary security issues such as hacking, intrusion, money fraud, cyber security as well as stealing of sensitive data. Other observations in the introduction session include infrastructure security control and management processes. I have observed various operations involve risk as well as analyzing techniques involving data and information management. Security issues include security and information planning such as analysis and safeguarding operations (K. F. Leon, Personal Communication, 17th May 2017). I have observed different trends in security policies revealing security integrity as well as development and administration of security. The activities identified as major contingency planning. It has revealed various operations such as incidence handling as well as responding to security standards.
The introduction session has also facilitated the effective acquisition of security procedures that promote security. I have observed the strategies involved in data and information assurance through promoting integrity, availability, authenticity, non-repudiation as well as confidentiality. The element and principles of data and information security guarantee complete surety on organization data. I have acquired a better understanding of information-related analysis on risk management in cyber as well as physical systems. The operations have also provided direct and operational criteria’s for analyzing systems integrity and operations (N. M. Ivy, Personal Communication, 19th May 2017).  Among the information assurance systems, the technologies that combat and ensure attackers are silenced include forensic science, security management, and information systems. Organizations should enforce information security by introducing digital forensics (John, 2002). Through seminars, training, and workshops I have learned fundamentals of the forensic processing, evidence handling, and quality assurance ethical issues as applied in digital forensics.

Reflection

Through introduction session, I have acquired various techniques involving information assurance. Various experts have brought clearly about the need for the significance of information assurance. Through the study, I have successfully acquired strategies and methodologies for effective and efficient identifying, monitoring, and mitigating data and information operational risks. The major areas where data and information assurance apply include personal, corporate and institutional data. Information assurance must be guaranteed for data and information on transit, stored data, as well as data and information in processing status (H. C. Lee, Personal Communication, 20th  May 2017). I have observed that all information is vital and it should be secured, protected and prevented from exposures, leakages or intention, and nonintentional dissemination. Corporations and government agencies should ensure secure operation on networks to safe data (Eric A., & Hitachi Data Systems, 2009). For persistent information assurance, concerned individuals should analyze risk appetites, and ensure drive risk awareness at each level of users who access corporate or government data and information (Matthew H., & Stan, 2014).
Through the introduction activities, I managed to examine technology failures effectively, repair troubleshoots and diagnoses information handling systems. Meeting with different experts facilitated professional knowledge and information sharing. I have acquired skills as well as knowledge in security issues such as crisis management in information technology, intellectual property, and patent rights as well as ethical principles that govern the handling of data and information.  The session involving introduction has provided other forms of information analysis such as risk analysis and control management, data and information assurance management. Other areas covered during orientation include assessing risks analyzing risks, and risk mitigation planning (K. F. Leon, Personal Communication, 20th May 2017). The future study shall focus on better and improved information assurance based on online security analyzing tools as well as implementing risk management process using several structured techniques and approaches that facilitate information assurance and decision-making.

References

Eric A., & Hitachi Data Systems (2009). Introduction to Information Assurance. 
John W. (2002). Information Assurance/Information Security Computer System Security and Privacy. 
Matthew H., & Stan G. (2014). confidentiality, integrity, and availability (CIA triad). 

Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in urgent custom research papers. If you need a similar paper you can place your order from nursing school papers services.

Comments

Popular Posts