This website uses cookies to ensure you have the best experience. Learn more

Security Management Models For Information Systems

1014 words - 4 pages


Security management within the context of information systems “needs a paradigm shift in order to successfully protect information assets” (Eloff & Eloff, 2003). Due the rapid increase in information security threats, security management measures have been taken to proactively remedy the growing threat facing information security. As a result of this, security management “is becoming more complex everyday, many organization’s security systems are failing, with serious results” (Fumey-Nassah, 2007). To remedy the increase threats to information security systems, organizations are seeking alternatives to network vulnerabilities from malicious attacks. There are several management measures that organizations must take to fully understand the vulnerabilities at stake.
There are dominant security management frameworks that encompass security management models for information systems. Therefore, in order to fully analyze the topic of security management we must first understand the security management models that form the foundation of security management practices. There are several models that structure information security mechanisms in an enterprise organization. In general “information security models are standards that are used for reference or comparison and often serve as the stepping-off point for emulation and adoption” (Mattord & Whitman, 2010). If we analyze security management within the context of access controls we find that access controls are needed to regulate “the admission of users into trusted areas of the organization. Access controls in security management are needed to restrict different levels of access to things like assets, information and other resources of information systems infrastructure.
If we analyze security management within the perspective of security management models we see that an access control model clearly distinguishes between the “principles of least privilege, need to know, and separation of duties” (Mattord & Whitman, 2010). In ERP systems, security management is critical because an organization must be concerned with “establishing and maintaining a secure information environment” (Eloff & Eloff, 2003). Access controls measures must also be considered when granting access and controls to users of an organization. Furthermore, the restriction of information negates penetration of network vulnerabilities to the access of information assets. When considering a security management approach, organizations must not fail to consider the systematic structure that enables the full functionality of information systems.
Essentially, the “domain of information security management is no longer exclusively of a managerial nature, technical aspects also need to be considered on management level. Information security management can be approached from various perspectives” (Eloff & Eloff, 2003). The strategic approaches that an organization decides to pursue will be influenced by the foundational...

Find Another Essay On Security Management Models for Information Systems

Project Management for Information Systems Essay

3569 words - 14 pages Project Management for Information Systems Abstract Information systems (IS) projects are vulnerable to resource cutbacks and the increasing complexity of systems and advances in information technology make finding the right personnel difficult and the associated development costs high. Good project management is essential for success. Some alignment methodologies include IBM's business systems planning (BSP), Robert Holland's strategic

An analysis of strategic role of information systems, specific social, ethical and legal issues, IT infrastructure and emerging technologies, and information systems security within FedEx Corporation

5469 words - 22 pages technologies; information systems security; couple with final conclusions and recommendations.2. Strategic role of information systems at FedExA strategic information system is the one that can change the goals, product/service, processes, and/or environmental relationships to help achieve competitive advantage for an organisation (Martakos n.d., p.11). To understand competitive advantage Porter's competitive forces (i.e. new market entrants

Management Information Systems

1664 words - 7 pages the bigger picture. That would allow for more collaboration between adjacent troops References Books 1) Business and Information Systems, Robert C.Nickerson, 2001, second edition, Prentice Hall International, Inc. 2) Information systems a management perspective, Steven Alter, 1996, second edition, The Benjamin/Cummings Publishing Company, Inc. 3) Global Business Information Technology, Geoffrey Elliott, 2004, first edition, Pearson Addison Wesley. Journals 1) International Journal of Decision Support System Technology, est. 2004, Editor-in-Chief: Pascale Zaraté

Management Information Systems

2619 words - 10 pages 1.      General Motors has several internal and external influences that are challenging them to reduce their operating costs and become more efficient. In doing an analysis of the General Motors using Porter’s Competitive Model these influences become clear and opportunities for the company to reduce costs and increase efficiency using information systems becomes obvious. Porter’s Competitive Model is a model used to

Management information systems

4674 words - 19 pages control. This way, the supermarket would not even have to contact Healthlite personally, but let the computer do the order.SecurityThe security for these kinds of systems will have to be increased. Great databases have been excellent targets for piracy or other crimes. Because of the old paper-based transactions, the chance of crime was quite large, but only from inside the business. And because we do not have enough information about the

Management Information Systems

2178 words - 9 pages When it comes to management information systems (MIS), the amount of data collected is becoming increasingly larger every day. For employees the information includes such things as name, address, gender, social security number, work habits, likes and dislikes. For the customer, data collected include name, address, gender, credit card number, likes and dislikes. The question is how we handle this growing collection of data, maximize our profits

Management Information Systems

1266 words - 5 pages internal biases were below the .05 threshold. Therefore, no statistically significant differences were found among the responses to the survey.      The survey was extremely useful in identifying specific problems within the Management Information systems. Participants responded to the need for future upgrades, staff training, research, and network and application security. A cursory review of the responses helped to

Emerging Management Support Systems Models For Global Managers In The New Economy

5897 words - 24 pages reevaluate their current management support systems for their effectiveness. Some organizations have not kept pace with the rapid growth of emerging technologies thereby making their information systems obsolete. Also, new government laws and regulations have forced many organizations to seek emerging solutions from the major software and hardware providers. This writer proposes new emerging management systems models to integrate some of the

Devising of Optimization Models and Modelling Systems for Supply Chain Planning and Management

1847 words - 7 pages integrate other departments and functions that were outside of the manufacturing-planning arena, but still were related. (Chapman 1996, 1-7) Essentially, ERP systems are the software infrastructure that facilitates the flow of information between all functions in a company (manufacturing, logistics, finance, human resources, etc.)At their core, you can visualize ERP systems as huge database applications for storing transaction data. When your sales

What´s Management Information Systems

1778 words - 8 pages . Reports, displays and responses produced by management information systems provide information that these decision makers have specified in advance as adequately meeting their information needs. Such predefined information products satisfy the information needs of decision makers at the operational and tactical levels of the organization who are faced with more structured types of decision situations. For example, sales managers rely heavily on

Benefits of Management Information Systems

596 words - 3 pages Evolution of technology has a better option in the revolution of the world thereby progressing from the Stone Age to the classier development and implementation of systems rich in “human intelligence”. The purpose and relevance of management information system is to give direct control to executives to make decisions that give dynamic takeover of the company’s goals. An active Management information system combines data amassed by company’s

Similar Essays

Biometrics Introduction To Information Systems Security

622 words - 2 pages gathering information on people's travel patterns.Biometric devices and applications have been growing worldwide. They are expected to be the way for accessing personal computer systems. According to research it is expected that biometric expenditure will reach $300 million in 2008. Biometrics works on the principle that everyone in the world is different. A variety of factors are taken into consideration when implementing a biometric system. Each

The Deployment Of Security Policy In Information Systems

1556 words - 7 pages against at least one template and incase of a match, each of the matched native audits is reduced (A method for eliminating audit trail , 2006). A security management and audit program database provided in which information security policy and object system correspond to management and audit programs (Kayashima et al., 2001). REFERENCES [1] Snene M., “Knowledge patterns of distributed information systems- the case of distribution design and

The Deployment Of Security Policy In Information Systems

1024 words - 5 pages of database security content. It also provides well monitoring procedure for the database actions. within the daily million of database transactions. Therefore, it is a best solution for any organization that tends to tackle and curb any violations on database systems. The researcher provides these proposed solutions technique to oracle SYSDBA security hole and SQL injection to curb the security problems, therefore, database security developer

My Paper Discusses How Applied Information Management Systems Have A Variety Of Risks And The Different Types Of Security You Can Get

2007 words - 8 pages leaving oneself logged into a network, and even spilling beverages on your computer. "'Hackers,' or computer criminals [are] becoming more numerous and adept at stealing and altering private information" (73). However, there are ways to prevent hackers from stealing your information by security systems that keep your information confidential. For example, there is fault-tolerant, which is a system that ensures "availability in case of a system