Sign In
Not register? Register Now!
Essay Available:
You are here: HomeResearch PaperIT & Computer Science
55 pages/≈15125 words
53 Sources
IT & Computer Science
Research Paper
English (U.S.)
MS Word
Total cost:
$ 400.95

Project Implementation Of Information Security Management System In Wilmington Pharmaceuticals (Research Paper Sample)


Project implementation of Information Security Management System in Wilmington Pharmaceuticals

Project implementation of Information Security Management System in Wilmington Pharmaceuticals Name Institution Date Abstract This research is concerned with issues regarding information security management in Wilmington Pharmaceuticals led by the need for implementing effective information security management systems. The company has headquarters in Wilmington, North Carolina and is interested in implementing information security management system to protect its key infrastructure. The project will cover core issues in implementation process including analysis of the environment, modelling of the solution in the company, and evaluation of the value proposition of the project to the company.  Successful implementation of the system will provide the company with a systematic approach to managing risks and enables it to make informed decisions on security investments. Table of Contents  TOC \o "1-3" \h \z \u  HYPERLINK \l "_Toc512491859" Introduction  PAGEREF _Toc512491859 \h 8  HYPERLINK \l "_Toc512491860" Topicality of research  PAGEREF _Toc512491860 \h 11  HYPERLINK \l "_Toc512491861" Research problem  PAGEREF _Toc512491861 \h 14  HYPERLINK \l "_Toc512491862" Purpose of research  PAGEREF _Toc512491862 \h 14  HYPERLINK \l "_Toc512491863" Research methods  PAGEREF _Toc512491863 \h 14  HYPERLINK \l "_Toc512491864" Analysis of current state  PAGEREF _Toc512491864 \h 15  HYPERLINK \l "_Toc512491865" Company and environmental analysis  PAGEREF _Toc512491865 \h 15  HYPERLINK \l "_Toc512491866" Characteristics of the company  PAGEREF _Toc512491866 \h 15  HYPERLINK \l "_Toc512491867" Scope of operation  PAGEREF _Toc512491867 \h 15  HYPERLINK \l "_Toc512491868" Mission and vision  PAGEREF _Toc512491868 \h 16  HYPERLINK \l "_Toc512491869" Analysis of information infrastructure  PAGEREF _Toc512491869 \h 16  HYPERLINK \l "_Toc512491870" Entry  PAGEREF _Toc512491870 \h 16  HYPERLINK \l "_Toc512491871" Storage  PAGEREF _Toc512491871 \h 16  HYPERLINK \l "_Toc512491872" Execution  PAGEREF _Toc512491872 \h 16  HYPERLINK \l "_Toc512491873" Information output  PAGEREF _Toc512491873 \h 16  HYPERLINK \l "_Toc512491874" Environmental analysis  PAGEREF _Toc512491874 \h 17  HYPERLINK \l "_Toc512491875" Macro-environment  PAGEREF _Toc512491875 \h 17  HYPERLINK \l "_Toc512491876" Analysis of social trends  PAGEREF _Toc512491876 \h 17  HYPERLINK \l "_Toc512491877" Technological trends  PAGEREF _Toc512491877 \h 18  HYPERLINK \l "_Toc512491878" Political and legal environments  PAGEREF _Toc512491878 \h 18  HYPERLINK \l "_Toc512491879" Demographics  PAGEREF _Toc512491879 \h 19  HYPERLINK \l "_Toc512491880" Micro-environment  PAGEREF _Toc512491880 \h 20  HYPERLINK \l "_Toc512491881" Marketing function  PAGEREF _Toc512491881 \h 20  HYPERLINK \l "_Toc512491882" Product  PAGEREF _Toc512491882 \h 21  HYPERLINK \l "_Toc512491883" Price  PAGEREF _Toc512491883 \h 21  HYPERLINK \l "_Toc512491884" Distribution  PAGEREF _Toc512491884 \h 21  HYPERLINK \l "_Toc512491885" Promotion and publicity  PAGEREF _Toc512491885 \h 21  HYPERLINK \l "_Toc512491886" Production function  PAGEREF _Toc512491886 \h 21  HYPERLINK \l "_Toc512491887" State of equipment  PAGEREF _Toc512491887 \h 21  HYPERLINK \l "_Toc512491888" Human resources  PAGEREF _Toc512491888 \h 21  HYPERLINK \l "_Toc512491889" Research and development (R & D) function  PAGEREF _Toc512491889 \h 22  HYPERLINK \l "_Toc512491890" Management function  PAGEREF _Toc512491890 \h 22  HYPERLINK \l "_Toc512491891" Information system  PAGEREF _Toc512491891 \h 22  HYPERLINK \l "_Toc512491892" Strategic analysis  PAGEREF _Toc512491892 \h 22  HYPERLINK \l "_Toc512491893" Modelling of existing state of the company  PAGEREF _Toc512491893 \h 23  HYPERLINK \l "_Toc512491894" Contextual model  PAGEREF _Toc512491894 \h 23  HYPERLINK \l "_Toc512491895" Sphere of activities model  PAGEREF _Toc512491895 \h 23  HYPERLINK \l "_Toc512491896" Macro processes model  PAGEREF _Toc512491896 \h 26  HYPERLINK \l "_Toc512491897" Function coordination  PAGEREF _Toc512491897 \h 26  HYPERLINK \l "_Toc512491898" Control Functions  PAGEREF _Toc512491898 \h 26  HYPERLINK \l "_Toc512491899" Other Functions  PAGEREF _Toc512491899 \h 26  HYPERLINK \l "_Toc512491900" Synthesis – Target state  PAGEREF _Toc512491900 \h 28  HYPERLINK \l "_Toc512491901" Business strategy of the company  PAGEREF _Toc512491901 \h 28  HYPERLINK \l "_Toc512491902" Vertical Integration Strategy  PAGEREF _Toc512491902 \h 28  HYPERLINK \l "_Toc512491903" Strategy according to the geographical scope  PAGEREF _Toc512491903 \h 28  HYPERLINK \l "_Toc512491904" Multinational Strategy  PAGEREF _Toc512491904 \h 29  HYPERLINK \l "_Toc512491905" Transnational Strategy  PAGEREF _Toc512491905 \h 29  HYPERLINK \l "_Toc512491906" Modelling of target state of the company  PAGEREF _Toc512491906 \h 31  HYPERLINK \l "_Toc512491907" Contextual model  PAGEREF _Toc512491907 \h 31  HYPERLINK \l "_Toc512491908" Customer Segmentation  PAGEREF _Toc512491908 \h 31  HYPERLINK \l "_Toc512491909" Value addition  PAGEREF _Toc512491909 \h 31  HYPERLINK \l "_Toc512491910" Distribution and communication channels  PAGEREF _Toc512491910 \h 32  HYPERLINK \l "_Toc512491911" Relationships with customers  PAGEREF _Toc512491911 \h 32  HYPERLINK \l "_Toc512491912" Key resources  PAGEREF _Toc512491912 \h 32  HYPERLINK \l "_Toc512491913" Key activities  PAGEREF _Toc512491913 \h 32  HYPERLINK \l "_Toc512491914" Network of allies  PAGEREF _Toc512491914 \h 33  HYPERLINK \l "_Toc512491915" Cost structure  PAGEREF _Toc512491915 \h 33  HYPERLINK \l "_Toc512491916" Sphere of activities model  PAGEREF _Toc512491916 \h 33  HYPERLINK \l "_Toc512491917" Macro processes model  PAGEREF _Toc512491917 \h 35  HYPERLINK \l "_Toc512491918" Processes model  PAGEREF _Toc512491918 \h 36  HYPERLINK \l "_Toc512491919" Target information infrastructure  PAGEREF _Toc512491919 \h 38  HYPERLINK \l "_Toc512491920" Transaction processing system (TPS  PAGEREF _Toc512491920 \h 40  HYPERLINK \l "_Toc512491921" Information structures  PAGEREF _Toc512491921 \h 44  HYPERLINK \l "_Toc512491922" PROJECT IMPLEMENTATION  PAGEREF _Toc512491922 \h 45  HYPERLINK \l "_Toc512491923" ISMS documentation  PAGEREF _Toc512491923 \h 45  HYPERLINK \l "_Toc512491924" Characteristics of Valuable Information  PAGEREF _Toc512491924 \h 45  HYPERLINK \l "_Toc512491925" Basic components of ISMS documentation systems  PAGEREF _Toc512491925 \h 46  HYPERLINK \l "_Toc512491926" Integrated approach to ISMS documentation  PAGEREF _Toc512491926 \h 48  HYPERLINK \l "_Toc512491927" Vertical Structure  PAGEREF _Toc512491927 \h 48  HYPERLINK \l "_Toc512491928" Horizontal structure  PAGEREF _Toc512491928 \h 49  HYPERLINK \l "_Toc512491929" Data entry  PAGEREF _Toc512491929 \h 50  HYPERLINK \l "_Toc512491930" Data storage  PAGEREF _Toc512491930 \h 50  HYPERLINK \l "_Toc512491931" Calculations  PAGEREF _Toc512491931 \h 51  HYPERLINK \l "_Toc512491932" Organizational controls  PAGEREF _Toc512491932 \h 52  HYPERLINK \l "_Toc512491933" Description of the organizational control system  PAGEREF _Toc512491933 \h 53  HYPERLINK \l "_Toc512491934" Regulatory actions  PAGEREF _Toc512491934 \h 54  HYPERLINK \l "_Toc512491935" Strategic management actions  PAGEREF _Toc512491935 \h 54  HYPERLINK \l "_Toc512491936" Strategic formulation  PAGEREF _Toc512491936 \h 55  HYPERLINK \l "_Toc512491937" Technical controls  PAGEREF _Toc512491937 \h 56  HYPERLINK \l "_Toc512491938" Design of technical controls  PAGEREF _Toc512491938 \h 56  HYPERLINK \l "_Toc512491939" Security of the information  PAGEREF _Toc512491939 \h 57  HYPERLINK \l "_Toc512491940" Security standards  PAGEREF _Toc512491940 \h 58  HYPERLINK \l "_Toc512491941" Technical controls guide  PAGEREF _Toc512491941 \h 59  HYPERLINK \l "_Toc512491942" Technical controls and regulatory compliance  PAGEREF _Toc512491942 \h 59  HYPERLINK \l "_Toc512491943" Inventory of Information Assets  PAGEREF _Toc512491943 \h 60  HYPERLINK \l "_Toc512491944" Data Leak Prevention (DLP)  PAGEREF _Toc512491944 \h 60  HYPERLINK \l "_Toc512491945" Monitoring: Correlation tools and logs management  PAGEREF _Toc512491945 \h 61  HYPERLINK \l "_Toc512491946" Project Evaluation  PAGEREF _Toc512491946 \h 62  HYPERLINK \l "_Toc512491947" Verification of organizational controls  PAGEREF _Toc512491947 \h 62  HYPERLINK \l "_Toc512491948" Cybernetics  PAGEREF _Toc512491948 \h 62  HYPERLINK \l "_Toc512491949" Feedback  PAGEREF _Toc512491949 \h 62  HYPERLINK \l "_Toc512491950" Control and organizational complexity  PAGEREF _Toc512491950 \h 63  HYPERLINK \l "_Toc512491951" Technical controls testing  PAGEREF _Toc512491951 \h 63  HYPERLINK \l "_Toc512491952" Components and structure of technical controls  PAGEREF _Toc512491952 \h 65  HYPERLINK \l "_Toc512491953" Control of environment  PAGEREF _Toc512491953 \h 65  HYPERLINK \l "_Toc512491954" Financial analysis  PAGEREF _Toc512491954 \h 65  HYPERLINK \l "_Toc512491955" Return on Investment (ROI)  PAGEREF _Toc512491955 \h 65  HYPERLINK \l "_Toc512491956" Return on Equity (ROE)  PAGEREF _Toc512491956 \h 66  HYPERLINK \l "_Toc512491957" Net Present Value (NPV)  PAGEREF _Toc512491957 \h 67  HYPERLINK \l "_Toc512491958" Summary  PAGEREF _Toc51...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • How Hackers Steal Information And Recommendations Against The Menace
    Description: Identity theft is a crime that involves obtaining information from another person without their knowledge for the purpose of impersonating them and using their details for the imposter's gain...
    3 pages/≈825 words| 5 Sources | APA | IT & Computer Science | Research Paper |
  • Incident Response Digital Forensics Investigating Procedures Response
    Description: The sample is about incident response team. how incident response teamwork, how to increase their productivity, the current and future trends of incident response teams....
    5 pages/≈1375 words| 5 Sources | APA | IT & Computer Science | Research Paper |
  • Data Warehoususes and Data Mining Research Paper
    Description: How data needs to be prepared in the data warehouse before used by a data mining tool.. use examples to demonstrate.....
    5 pages/≈1375 words| 6 Sources | APA | IT & Computer Science | Research Paper |
Need a Custom Essay Written?
First time 15% Discount!