information technology writing question
Select a Systems OR Software Development Life Cycle (SDLC) model and methodology then apply this model and methodology to a project using the Information Technology (IT) specialization you wrote about in your Week 1 Short Paper (managing information systems related to risks, use, processing, storage, and transmission of information or data). Be sure to define the *SDLC model (what) AND *SDLC methodology (how), and identify which SDLC step is associated with each project component. *Keep in mind that an SDLC model, such as the 7-step traditional SDLC model or 4-step SDLC model, is the basic framework for a project and it indicates what number of steps that are in the process. SDLC methodologies indicate how those steps will be specifically implemented during the process.
The paper must follow the formatting guidelines in the Publication Manual of the American Psychological Association [APA Manual], 2019, 7th edition, (i.e., APA 7), and contain a title page, five scholarly references, three to five pages of content, and a reference page. The paper will be submitted through Turnitin.
Requirements: 3-5 PAGES
Information systems play a crucial role in the operation and success of organizations across various industries. As technology continues to play a larger role in our lives, the management of information systems has become increasingly complicated. It’s now necessary to carefully consider a range of factors, including risks, usage, processing, storage, and transmission of information or data. In this conversation, I will thoroughly examine scholarly research to outline the fundamental concepts associated with managing information systems in relation to these factors. Additionally, I will compare the fundamental principles of information assurance and establish my own priorities.
To manage information systems effectively, one must comprehend several fundamental concepts associated with risks, usage, processing, storage, and transmission of information or data. One of the primary concepts is risk management, which entails recognizing, evaluating, and prioritizing potential risks to information systems and devising strategies to mitigate or prevent them. Risk management also involves identifying possible threats, assessing their likelihood and impact, and setting up controls to lessen or eradicate the risks (Stoneburner et al., 2002).
Data Use and Processing
Another concept related to managing information systems is data use and processing. This involves establishing policies and procedures for collecting, using, and processing data in a secure and ethical manner. Data use and processing policies should address issues such as data quality, data privacy, and data ethics. Organizations should also ensure that data use and processing policies comply with relevant laws and regulations (Rahman, 2023).
Data storage is another important concept related to managing information systems. Organizations must implement secure storage solutions to protect data from unauthorized access, theft, or loss. Data storage solutions should include measures such as encryption, access controls, and backups to ensure that data is protected from both external and internal threats (Rahman, 2023).
Finally, data transmission is a critical concept related to managing information systems. Organizations must ensure secure and reliable transmission of data across networks and systems to prevent interception or unauthorized access. This involves the adoption of secure communication protocols like Transport Layer Security (TLS) or Secure Sockets Layer (SSL), as well as the utilization of secure file transfer protocols like Secure File Transfer Protocol (SFTP) or Secure Shell (SSH) (Loch et al., 1992).
The term “Information Assurance” pertains to the collection of principles and methodologies applied to ensure the secrecy, consistency, and accessibility of information. The core principles of information assurance are confidentiality, integrity, and availability. If any of these three basic security principles is damaged, a security vulnerability can occur (Cherdantseva & Hilton, 2015).
Confidentiality is a fundamental principle that guarantees that sensitive or private information is solely accessible to authorized individuals. Confidentiality plays a crucial role in safeguarding sensitive information from being accessed by unauthorized persons, stolen, or lost. Organizations can ensure confidentiality by implementing access controls, such as passwords or biometric authentication, and encrypting sensitive data (Cherdantseva & Hilton, 2015).
Integrity refers to the principle that the Information should be precise and clear and not be changed without permission. Integrity plays a very important role in trusting and relying on the information we have. Organizations can ensure integrity by implementing measures such as data validation checks, backups, and access controls (Cherdantseva & Hilton, 2015).
We must attach great importance to availability to ensure that the desired information is accessed in the desired place and at the desired time. Availability is essential to ensure that information can be accessed and used when required. Organizations can ensure availability by implementing measures such as redundant systems, backups, and disaster recovery plans (Porter et al., 2022).
In terms of prioritization, the order of importance may depend on the specific context and goals of the information system. For example, in a healthcare system, confidentiality may be the highest priority to protect patient privacy, followed by integrity to ensure accurate medical records, and availability to ensure timely access to patient information. In a financial system, integrity may be the highest priority to prevent fraud or errors, followed by confidentiality to protect sensitive financial information, and availability to ensure smooth and continuous operation of financial transactions (Cherdantseva & Hilton, 2015).
Ultimately, all three principles are essential for effective information assurance and should be balanced and prioritized according to the specific needs and goals of the information system. For example, in a military setting, confidentiality and integrity may be the highest priorities due to the sensitive nature of the information being handled, while availability may be less critical.
In conclusion, careful evaluation of many ideas relating to risks, consumption, processing, retention, and conveyance of data or data is required while operating information systems. These concepts comprise risk management, data usage and processing, data storage, and data transmission. Additionally, information assurance plays a crucial role in managing information systems effectively. Information and data must be safeguarded against vulnerabilities and threats using the core concepts of data security, such as authenticity, validity, reliability, verification, and non-repudiation (Cherdantseva & Hilton, 2015).
Cherdantseva, Y., & Hilton, J. (2015). Understanding information assurance and security.?J.
Organ. End User Comput,?16(3), 1.
Loch, K. D., Carr, H. H., & Warkentin, M. E. (1992). Threats to information systems: today’s
reality, yesterday’s understanding.?Mis Quarterly, 153-186.
Porter, Z., Habli, I., & McDermid, J. (2022). A Principle-based Ethical Assurance Argument for AI and Autonomous Systems.?arXiv preprint arXiv:2203.15370.
Rahman, A. (2023). Data collection, wrangling, and pre-processing for AI assurance. In?AI Assurance?(pp. 321-348). Academic Press
Stoneburner, G., Goguen, A., & Feringa, A. (2002, July). Risk management guide for information technology systems. hhs.gov. Retrieved March 11, 2023, from https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/administrative/securityrule/nist800-30.pdf
smartcustomessays.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we\’ll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Why Hire smartcustomessays.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more