Wednesday, December 11, 2019

Security Managerial Conceptual Framework †MyAssignmenthelp.com

Question: Discuss about the Security Managerial Conceptual Framework. Answer: Introduction: XYZ Immigration and education consultant company has an IT governance framework which comprises of leadership, IT policies, and organizational structure to ensure its IT capabilities sustain its operations and objectives. Leadership in the company in the context of IT involves a team of IT experts who play a key role in aligning the companys IT capabilities with its strategies. This team works in tandem with the company management to develop IT policies which defines the rules and regulations for use of IT assets. IT policy document is a critical component of the companys IT governance framework which outlines IT policies followed in the company (Veiga, 2007). These IT policies cover various IT aspects including use of IT assets, management of IT systems, roles and responsibilities of the managers, risk management, etc. The company also has an organization structure which different several management levels involved in decision-making. The structure includes top company managers, IT managers, and employees. Company and IT managers collaborate to make informed IT decisions while employees contribute to the decision-making process through feedback. As a junior business analyst, my main job is to evaluate and analyze business data, create solutions, and integrate business mode with the technology available. This role requires adherence to Australian standard for corporate governance which assists in managing risk during implementation and use of IT (Council, 2007). Recently, I was requested by the manager to conduct research on industry trends and use data modelling practices to analyze results and suggest strategies that could be adopted to improve the companys operations. In this case, I had to leverage on various IT tools to collect data, perform analysis, and make informed decisions when creating the strategies. In this role, I adhered to the Australian standard by ensuring the IT tools used performed well. I assessed the tools to ensure they are fit for the purpose of supporting the organization and kept them responsive to the changing requirements. I ensured that the data collection and analysis process conformed to formal rules and complied with the companys policies. Also, I aligned the tools with the business requirements and the current needs of the people involved in the process. Recently, I did a task which involved analyzing company data to identify business trends that could give insight into companys competitiveness. The aim of this task was to obtain knowledge on business trends that could be leveraged to enhance the companys strategies. In this task, I had to access the companys financial information including sales generated, profits made, revenue generated, costs incurred, etc. Most of this information is classified as confidential by the company and the IT policies require privacy to be maintained when handling such information. In this task, I had to comply with the Privacy Act of 1988. This Act regulates handling of personal information including its collection and disclosure (Alfawaz, 2008). The financial information include personal information of individuals who had purchased from the company. I adhered to this legislation by maintaining the privacy of confidentiality of the information I handled. This involved de-identifying personal informatio n and using secure tools to safeguard the data from malicious people. References Alfawaz, S., May, L.J. and Mohannak, K., 2008. E-government security in developing countries: A managerial conceptual framework. Council, A.C.G., 2007. Corporate governance principles and recommendations. Veiga, A. D., Eloff, J. H. (2007). An information security governance framework.Information Systems Management,24(4), 361-372.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.