Information Risk And Assurance To Defend Information Technology

 

Evaluate Information Risk And Assurance To Defend Information Technology

Consider the significant risks and assurance exposures within the organization.
Identify how one would establish criticality and prioritize exposures because of limited resources.
Emphasize recent changes and implications of technology use, protection, and threats. Do not include future changes, because they form part of next week’s consideration.
Include a table that provides a prioritized listing of the top concerns for the organization.
Conclude with specific recommendations pertaining to the unique or unusual characteristics of essential elements within risk and assurance for the specific organization.

 

Sample Solution

Undetected software flaws can cause great information risk, increasing the likelihood unauthorized users can utilize the information. Information assurance (IA) is the practice of making sure certain data or risks are managed appropriately throughout application usage, storage, processing, and transmission. The practice involves taking specific measures to protect user data.Information assurance security focuses primarily on information in its digital form; however, it also encompasses analog or physical forms. IA is important to organizations because it ensures that user data is protected both in transit and throughout storage. Information assurance has become an important component of data security as business transactions and processes consistently rely on digital handling practices.

communication. Weiss’s (1994) points on helping the interviewees develop information on internal events contributed to my success in this mission. Asking about the feelings in certain situations, like “And how do you feel when you video chat them?” allowed me to gain entry to this dimension. Thus, applying these ideas not only strengthened the quality of the responses but also developed my interviewing style. Furthermore, during my third and fourth interviews, I paid particular attention to wait for full responses and to avoid self-reporting as much as possible. While preparing for these interviews, I memorized the most relevant questions. This strategy enabled me to concentrate more on the interviewee during the interview and be more flexible on the questions.

Even though the development of the second-round interviews is notable, I acknowledged further skills to improve as a researcher. To help capture the emerging themes earlier, next time I should write down my impression right after the interview – what surprised me, what made me worried or upset, what were the circumstances. Luker (2008) argues that this technique considerably shapes the research and facilitates the analytical procedure.

Reflecting on a remarkable issue concerning insider knowledge, I should also consider some elements of research design more carefully in future research. A participant of the research was involved in qualitative research and informed me after the interview that they could acknowledge the interview structure. Thus, this interviewee gave rather short answers to the warming-up questions. Although this time it did not have any significant impact on the interview neither structure nor content-wise, in future research I should pay attention to the background of participants in qualitative research and not just to my insider situation in the researched topic.

Following the research ethics protocol, I shared an information sheet (see Appendix I.) about the project and asked for written consent of the participants prior to the interviews. During the course of the research, I faced an appearing ethical dilemma. In one interview I asked the participant to walk me through the last time they contacted their parents. They rejected it because they found the discussed topic too sensitive to share: “The last time, maybe it’s too personal to share with you, but, I mean, I can recall another one”. I acknowledged it was my ethical competence to deal with this kind of ‘conflict’ (Edwards and Mauthner, 2002). I believe my decision should

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.