Information Security Analysis. IT & Computer Science Research Paper (Research Paper Sample)
ThE TASK WAS TO choose a company, give a brief overview of the company, analyze it's security systems and provide mitigation measure
this sample is about security analysis of the Media group (tmg) company. the paper begins by providing a brief overview of the company, a summary of cyber security analysis, the weaknesses and risks involved. the paper goes further to discuss the security models in place, and concludes by providing mitigation measures.
Information Security Analysis
Name
Institution
Abstract
With increased threats associated with modern technology, our organization has been under poor information system thus sabotaging organization’s confidentiality, integrity, and availability (CIA) of information and data. This project will mainly aim at significantly incorporating contemporaneous cyber safety and risk measures at large with an intent of reviewing the currently experienced information breach in our organization as well as measures of mitigating possible future threats. The management of this will constitutes enactment of several factors such as the assets, possible threats, organizational weaknesses, vulnerabilities as well as control plans which are collectively computed in relation to probabilities and the impacts. The best security model implemented will be the foundation of our secured information database.
Organization Review
Our organization, The Media Group (TMG) is one of the best media houses providing the most reliable information on sports, politics, entertainment, and education globally operating on international media act (IMA).
Our Mission:
TMG serves matters of public interests in information provision and adherence to professional accountability by;
* Backing up for continuity and operation under international and quality standards,
* Striving towards enactment and implementation of media professional standards,
* Having a domain for responding to unethical professional behaviours, and
* Being a watch-dog on matters of public interests.
Our Vision
To be the leading international media house with high standard of professionalism that is essential for public trust guided by seeking the truth while refraining from interference by the political and economic class.
Organization Structure
The overall structural workflow of the company is under the well managerial platform to ensure tranquillity of the workplace and delivering the services per the organization’s policies. At the top is Chief Technology Officer(CTO), then five directors, followed by Risk department (CISO), logistics department (manager), HR department (manager) and Broadcast and publishing department (manager), the lower ranks include editors, studio instructor, and field director thereafter followed by other employees.
The organization has been receiving several calls from an unknown number requesting the operators of certain organization’s machines to switch off their machines for approximately 15 minutes, they identified themselves as Communication and Technology Controllers. The risk department has been under intervention and has realized that the systems have always been affected. Some information altered and to justify this; there is no registered organization as Communication and Technology Controllers. The chief information security officer (CISO) is working on the situation to curb possible problems.
at
Other Topics:
- Artificial IntelligenceDescription: Artificial Intelligence IT & Computer Science Research Paper...6 pages/≈1650 words| 10 Sources | APA | IT & Computer Science | Research Paper |
- Error Handling In An Activity Diagram: Explanation Of The ReasonsDescription: This paper will give a closer look into error handling in an activity diagram. I will provide a diagram that would include two error-handling pathways. I will provide a narrative, which describes the added error-handling pathways....4 pages/≈1100 words| 3 Sources | APA | IT & Computer Science | Research Paper |
- The Major Data Security Breaches That Have Happened In The Recent TimeDescription: The assignment discussed some of the major data security breaches that have happened in the recent time and identified the main reasons behind these security breaches and how it could have been avoided....7 pages/≈1925 words| 7 Sources | APA | IT & Computer Science | Research Paper |