StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The Unification of Information Security Program Management and Project Management - Article Example

Cite this document
Summary
The breakthrough of the new technology and the aim of any organization or enterprise to achieve development and better service have pushed the unification of Information Security Program Management and Project Management. As more organizations follow the trend of the new age, more and more people are learning to navigate in the field of Information Security so that they can supply each other the competence they need…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
The Unification of Information Security Program Management and Project Management
Read Text Preview

Extract of sample "The Unification of Information Security Program Management and Project Management"

Download file to see previous pages

However, converging the two managements has drawbacks as well. More often than not, drawbacks weigh more than success on the first stages of the implementation. In light of the mentioned union, his paper will discuss the risks brought about by the new technology, the tasks to be dealt with in developing the Enterprise Information Security Program, and the adherence to executing risk management. The life of any organization or enterprise moving to build up a gateway lies in making goals into reality, and maintaining a successful position in the industry.

Dealing with new things may bring more thoughts to ponder. The unification of Information Security Program Management and Project Management comes with new security threats/risks that must be addressed accordingly. "Unfortunately, in the context of security, requirements and specifications are most often overlooked. This may in turn account for the estimated 92% of security vulnerabilities NIST3 recently attributed to applications."1 Organizations wanting to advance with Information Security Program are susceptible to the possible hazards for the Project Management in setting up new systems to adhere with the goals of both managements.

A partner of Hurwitz and Associates, Fran Howarth, wrote an article about "The Convergence of Physical and IT Security." Howarth stated that "IT systems are increasingly being attacked-and not in the way they used to be, by hackers concerned most with gaining the respect of their peers for their exploits, but by criminals intent on financial gain."2 Howarth further explained that: the heightened security threats that we face today-especially given the high levels of international terrorism that we face-affect huge parts of our lives.

In recent years, public buildings, hotels, embassies and transport links have all been targeted by terrorists. And huge parts of our critical national infrastructures, including power, water and food supply, transport links and facilities, government and commercial facilities remain vulnerable, not just to terrorist attacks, but also to theft, sabotage and environmental disasters.3 An executive summary of a research entitled "Making Security an Integral Part of the Management" from Computer Electronics Inc.

reveals that "security should be an important element of project management, to ensure that the security implications of these changes are addressed."4 A skilled and knowledgeable project manager must be aware of the security requirements in managing projects. In addition, A Guideline to the Project & Program Management Standard produced by the International Association of Project and Program Management for the benefit of the project managers who need "to attain project success according to schedule, cost, quality, and to customer expectations.

"5 IAPPM sees a greater need in developing new techniques as organizations compete to be more accessible in providing solutions, products and services.6 IAPPM describes project management as "the centralized management by an individual to plan, organize, control and deploy key milestones, deliverables and resources from conception through retirement, according to customer goals. Often project managers are skilled to use specific templates and techniques to manage through the preferred project life-cycle.

"7 For example, a

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Unification of Information Security Program Management and Project Article”, n.d.)
The Unification of Information Security Program Management and Project Article. Retrieved from https://studentshare.org/miscellaneous/1506670-the-unification-of-information-security-program-management-and-project-management
(The Unification of Information Security Program Management and Project Article)
The Unification of Information Security Program Management and Project Article. https://studentshare.org/miscellaneous/1506670-the-unification-of-information-security-program-management-and-project-management.
“The Unification of Information Security Program Management and Project Article”, n.d. https://studentshare.org/miscellaneous/1506670-the-unification-of-information-security-program-management-and-project-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Unification of Information Security Program Management and Project Management

The influence of the US foreign policy on the prospective unification of Koreas

However, even before WW II, any such hopes of unification received a setback when in 1910 Japan forcibly conquered Korean Peninsula.... When Japan was defeated at the end of WWII in 1945, there were some hopes of a Korean unification that were again destroyed by partitioning....
48 Pages (12000 words) Dissertation

The Issue of Regional Currency Unification

The issue of regional currency unification Introduction Fully integrated market within the region increases competitiveness in the business.... hellip; The role of Euro as a major currency with its significant influence in the world economy has acted as a launching pad for the discussions with reference to the introduction of regional currency unification by the various regions for the benefit of the international trade and economic development....
26 Pages (6500 words) Essay

Enterprise Architecture: Justification

Information Systems project management.... It provides guideline for decision making, accountability, investment management and other management activities.... The administration is responsible for the management and oversight of the system (Arison & Torkzadet, 2008).... In the Department of Motor Vehicles, management of information and data is very vital.... the unification and integration of data across is another advantage....
3 Pages (750 words) Essay

Network Security

Thus, network management procedures are used for the effective management of the network security aspects (Kaminsky, 2012; Cisco, 2000; Huang, MacCallum, & Du, 2010).... This paper ''Network security'' has discussed a wide variety of security issues and attacks that can occur in a computer network.... Though, these advanced technologies offer a large number of benefits and opportunities but they also cause a wide variety of security and privacy issues....
6 Pages (1500 words) Literature review

Protocols and Policy to Secure Software

8 Pages (2000 words) Essay

The Looming Tower by Lawrence Wright

The paper also proposes in details the security measures taken to prevent leakage of information especially in the cyberspace in addition to protection of information that might be of national interest.... This project aims at discussing in details the measures taken by the department of homeland security in ensuring that the air territory is well protected and avoid repeat of the 9/11.... Department of Homeland security has a major responsibility of taking care of the lives of every American by preventing any form of terrorist attack as witnessed in 9/11....
10 Pages (2500 words) Essay

Pakistan Drought Hit Thar Desert

This paper "Pakistan Drought Hit Thar Desert" focuses on the fact that the Thar Desert is the biggest in its region.... It consists of barren sand dunes, tracts covered with thorny bushes.... It has irregular parallel ridges with enclosed valleys.... The valleys have enough moisture.... nbsp;… Transport problems also affect the medical sector since the sick find it very difficult to access treatment....
9 Pages (2250 words) Case Study

The Adoption of the SCCM System to Upgrade the Current Management System Used by the Supreme Council

"The Adoption of the SCCM System to Upgrade the Current management System Used by the Supreme Council" paper presented the problem that has led to the adoption of the SCCM system to upgrade the current management system used by the supreme council.... nbsp;… The project report is all about the development of the SCCM (system center configuration manager) system with reference to supreme council management operational frameworks.... Development and installment of the new system will be of benefit because it will help in setting up a more robust and effective management system....
20 Pages (5000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us