Essay Available:
You are here: Home → Research Paper → IT & Computer Science
Pages:
55 pages/≈15125 words
Sources:
53 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 39.95
Topic:
Project Implementation Of Information Security Management System In Wilmington Pharmaceuticals (Research Paper Sample)
Instructions:
Project implementation of Information Security Management System in Wilmington Pharmaceuticals
source..Content:
Project implementation of Information Security Management System in Wilmington Pharmaceuticals
Name
Institution
Date
Abstract
This research is concerned with issues regarding information security management in Wilmington Pharmaceuticals led by the need for implementing effective information security management systems. The company has headquarters in Wilmington, North Carolina and is interested in implementing information security management system to protect its key infrastructure. The project will cover core issues in implementation process including analysis of the environment, modelling of the solution in the company, and evaluation of the value proposition of the project to the company. Successful implementation of the system will provide the company with a systematic approach to managing risks and enables it to make informed decisions on security investments.
Table of Contents
TOC \o "1-3" \h \z \u HYPERLINK \l "_Toc512491859" Introduction PAGEREF _Toc512491859 \h 8
HYPERLINK \l "_Toc512491860" Topicality of research PAGEREF _Toc512491860 \h 11
HYPERLINK \l "_Toc512491861" Research problem PAGEREF _Toc512491861 \h 14
HYPERLINK \l "_Toc512491862" Purpose of research PAGEREF _Toc512491862 \h 14
HYPERLINK \l "_Toc512491863" Research methods PAGEREF _Toc512491863 \h 14
HYPERLINK \l "_Toc512491864" Analysis of current state PAGEREF _Toc512491864 \h 15
HYPERLINK \l "_Toc512491865" Company and environmental analysis PAGEREF _Toc512491865 \h 15
HYPERLINK \l "_Toc512491866" Characteristics of the company PAGEREF _Toc512491866 \h 15
HYPERLINK \l "_Toc512491867" Scope of operation PAGEREF _Toc512491867 \h 15
HYPERLINK \l "_Toc512491868" Mission and vision PAGEREF _Toc512491868 \h 16
HYPERLINK \l "_Toc512491869" Analysis of information infrastructure PAGEREF _Toc512491869 \h 16
HYPERLINK \l "_Toc512491870" Entry PAGEREF _Toc512491870 \h 16
HYPERLINK \l "_Toc512491871" Storage PAGEREF _Toc512491871 \h 16
HYPERLINK \l "_Toc512491872" Execution PAGEREF _Toc512491872 \h 16
HYPERLINK \l "_Toc512491873" Information output PAGEREF _Toc512491873 \h 16
HYPERLINK \l "_Toc512491874" Environmental analysis PAGEREF _Toc512491874 \h 17
HYPERLINK \l "_Toc512491875" Macro-environment PAGEREF _Toc512491875 \h 17
HYPERLINK \l "_Toc512491876" Analysis of social trends PAGEREF _Toc512491876 \h 17
HYPERLINK \l "_Toc512491877" Technological trends PAGEREF _Toc512491877 \h 18
HYPERLINK \l "_Toc512491878" Political and legal environments PAGEREF _Toc512491878 \h 18
HYPERLINK \l "_Toc512491879" Demographics PAGEREF _Toc512491879 \h 19
HYPERLINK \l "_Toc512491880" Micro-environment PAGEREF _Toc512491880 \h 20
HYPERLINK \l "_Toc512491881" Marketing function PAGEREF _Toc512491881 \h 20
HYPERLINK \l "_Toc512491882" Product PAGEREF _Toc512491882 \h 21
HYPERLINK \l "_Toc512491883" Price PAGEREF _Toc512491883 \h 21
HYPERLINK \l "_Toc512491884" Distribution PAGEREF _Toc512491884 \h 21
HYPERLINK \l "_Toc512491885" Promotion and publicity PAGEREF _Toc512491885 \h 21
HYPERLINK \l "_Toc512491886" Production function PAGEREF _Toc512491886 \h 21
HYPERLINK \l "_Toc512491887" State of equipment PAGEREF _Toc512491887 \h 21
HYPERLINK \l "_Toc512491888" Human resources PAGEREF _Toc512491888 \h 21
HYPERLINK \l "_Toc512491889" Research and development (R & D) function PAGEREF _Toc512491889 \h 22
HYPERLINK \l "_Toc512491890" Management function PAGEREF _Toc512491890 \h 22
HYPERLINK \l "_Toc512491891" Information system PAGEREF _Toc512491891 \h 22
HYPERLINK \l "_Toc512491892" Strategic analysis PAGEREF _Toc512491892 \h 22
HYPERLINK \l "_Toc512491893" Modelling of existing state of the company PAGEREF _Toc512491893 \h 23
HYPERLINK \l "_Toc512491894" Contextual model PAGEREF _Toc512491894 \h 23
HYPERLINK \l "_Toc512491895" Sphere of activities model PAGEREF _Toc512491895 \h 23
HYPERLINK \l "_Toc512491896" Macro processes model PAGEREF _Toc512491896 \h 26
HYPERLINK \l "_Toc512491897" Function coordination PAGEREF _Toc512491897 \h 26
HYPERLINK \l "_Toc512491898" Control Functions PAGEREF _Toc512491898 \h 26
HYPERLINK \l "_Toc512491899" Other Functions PAGEREF _Toc512491899 \h 26
HYPERLINK \l "_Toc512491900" Synthesis – Target state PAGEREF _Toc512491900 \h 28
HYPERLINK \l "_Toc512491901" Business strategy of the company PAGEREF _Toc512491901 \h 28
HYPERLINK \l "_Toc512491902" Vertical Integration Strategy PAGEREF _Toc512491902 \h 28
HYPERLINK \l "_Toc512491903" Strategy according to the geographical scope PAGEREF _Toc512491903 \h 28
HYPERLINK \l "_Toc512491904" Multinational Strategy PAGEREF _Toc512491904 \h 29
HYPERLINK \l "_Toc512491905" Transnational Strategy PAGEREF _Toc512491905 \h 29
HYPERLINK \l "_Toc512491906" Modelling of target state of the company PAGEREF _Toc512491906 \h 31
HYPERLINK \l "_Toc512491907" Contextual model PAGEREF _Toc512491907 \h 31
HYPERLINK \l "_Toc512491908" Customer Segmentation PAGEREF _Toc512491908 \h 31
HYPERLINK \l "_Toc512491909" Value addition PAGEREF _Toc512491909 \h 31
HYPERLINK \l "_Toc512491910" Distribution and communication channels PAGEREF _Toc512491910 \h 32
HYPERLINK \l "_Toc512491911" Relationships with customers PAGEREF _Toc512491911 \h 32
HYPERLINK \l "_Toc512491912" Key resources PAGEREF _Toc512491912 \h 32
HYPERLINK \l "_Toc512491913" Key activities PAGEREF _Toc512491913 \h 32
HYPERLINK \l "_Toc512491914" Network of allies PAGEREF _Toc512491914 \h 33
HYPERLINK \l "_Toc512491915" Cost structure PAGEREF _Toc512491915 \h 33
HYPERLINK \l "_Toc512491916" Sphere of activities model PAGEREF _Toc512491916 \h 33
HYPERLINK \l "_Toc512491917" Macro processes model PAGEREF _Toc512491917 \h 35
HYPERLINK \l "_Toc512491918" Processes model PAGEREF _Toc512491918 \h 36
HYPERLINK \l "_Toc512491919" Target information infrastructure PAGEREF _Toc512491919 \h 38
HYPERLINK \l "_Toc512491920" Transaction processing system (TPS PAGEREF _Toc512491920 \h 40
HYPERLINK \l "_Toc512491921" Information structures PAGEREF _Toc512491921 \h 44
HYPERLINK \l "_Toc512491922" PROJECT IMPLEMENTATION PAGEREF _Toc512491922 \h 45
HYPERLINK \l "_Toc512491923" ISMS documentation PAGEREF _Toc512491923 \h 45
HYPERLINK \l "_Toc512491924" Characteristics of Valuable Information PAGEREF _Toc512491924 \h 45
HYPERLINK \l "_Toc512491925" Basic components of ISMS documentation systems PAGEREF _Toc512491925 \h 46
HYPERLINK \l "_Toc512491926" Integrated approach to ISMS documentation PAGEREF _Toc512491926 \h 48
HYPERLINK \l "_Toc512491927" Vertical Structure PAGEREF _Toc512491927 \h 48
HYPERLINK \l "_Toc512491928" Horizontal structure PAGEREF _Toc512491928 \h 49
HYPERLINK \l "_Toc512491929" Data entry PAGEREF _Toc512491929 \h 50
HYPERLINK \l "_Toc512491930" Data storage PAGEREF _Toc512491930 \h 50
HYPERLINK \l "_Toc512491931" Calculations PAGEREF _Toc512491931 \h 51
HYPERLINK \l "_Toc512491932" Organizational controls PAGEREF _Toc512491932 \h 52
HYPERLINK \l "_Toc512491933" Description of the organizational control system PAGEREF _Toc512491933 \h 53
HYPERLINK \l "_Toc512491934" Regulatory actions PAGEREF _Toc512491934 \h 54
HYPERLINK \l "_Toc512491935" Strategic management actions PAGEREF _Toc512491935 \h 54
HYPERLINK \l "_Toc512491936" Strategic formulation PAGEREF _Toc512491936 \h 55
HYPERLINK \l "_Toc512491937" Technical controls PAGEREF _Toc512491937 \h 56
HYPERLINK \l "_Toc512491938" Design of technical controls PAGEREF _Toc512491938 \h 56
HYPERLINK \l "_Toc512491939" Security of the information PAGEREF _Toc512491939 \h 57
HYPERLINK \l "_Toc512491940" Security standards PAGEREF _Toc512491940 \h 58
HYPERLINK \l "_Toc512491941" Technical controls guide PAGEREF _Toc512491941 \h 59
HYPERLINK \l "_Toc512491942" Technical controls and regulatory compliance PAGEREF _Toc512491942 \h 59
HYPERLINK \l "_Toc512491943" Inventory of Information Assets PAGEREF _Toc512491943 \h 60
HYPERLINK \l "_Toc512491944" Data Leak Prevention (DLP) PAGEREF _Toc512491944 \h 60
HYPERLINK \l "_Toc512491945" Monitoring: Correlation tools and logs management PAGEREF _Toc512491945 \h 61
HYPERLINK \l "_Toc512491946" Project Evaluation PAGEREF _Toc512491946 \h 62
HYPERLINK \l "_Toc512491947" Verification of organizational controls PAGEREF _Toc512491947 \h 62
HYPERLINK \l "_Toc512491948" Cybernetics PAGEREF _Toc512491948 \h 62
HYPERLINK \l "_Toc512491949" Feedback PAGEREF _Toc512491949 \h 62
HYPERLINK \l "_Toc512491950" Control and organizational complexity PAGEREF _Toc512491950 \h 63
HYPERLINK \l "_Toc512491951" Technical controls testing PAGEREF _Toc512491951 \h 63
HYPERLINK \l "_Toc512491952" Components and structure of technical controls PAGEREF _Toc512491952 \h 65
HYPERLINK \l "_Toc512491953" Control of environment PAGEREF _Toc512491953 \h 65
HYPERLINK \l "_Toc512491954" Financial analysis PAGEREF _Toc512491954 \h 65
HYPERLINK \l "_Toc512491955" Return on Investment (ROI) PAGEREF _Toc512491955 \h 65
HYPERLINK \l "_Toc512491956" Return on Equity (ROE) PAGEREF _Toc512491956 \h 66
HYPERLINK \l "_Toc512491957" Net Present Value (NPV) PAGEREF _Toc512491957 \h 67
HYPERLINK \l "_Toc512491958" Summary PAGEREF _Toc51...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Other Topics:
- How Hackers Steal Information And Recommendations Against The MenaceDescription: Identity theft is a crime that involves obtaining information from another person without their knowledge for the purpose of impersonating them and using their details for the imposter's gain...3 pages/≈825 words| 5 Sources | APA | IT & Computer Science | Research Paper |
- Incident Response Digital Forensics Investigating Procedures ResponseDescription: The sample is about incident response team. how incident response teamwork, how to increase their productivity, the current and future trends of incident response teams....5 pages/≈1375 words| 5 Sources | APA | IT & Computer Science | Research Paper |
- Data Warehoususes and Data Mining Research PaperDescription: How data needs to be prepared in the data warehouse before used by a data mining tool.. use examples to demonstrate.....5 pages/≈1375 words| 6 Sources | APA | IT & Computer Science | Research Paper |