Tuesday, May 5, 2020

Information Security Management for AG - MyAssignmenthelp.com

Question: Discuss about theInformation Security Managementfor AG Community. Answer: Effect of Delivery People Overfishing has been haunting us since ages, and it is high time that we need to step forward for countering this issues. The scenario presented here about the success of Auto-fishing group or AG is a perfect example of the necessary changes that are needed in this field. The company is hugely based on the information communication technology which helps the associate fishermen and delivery men to operate. AG provides fishers with the information about the quantity of fishes needed, and the fishermen deliver them directly to the distribution centre of AG (Kumar, 2016). Thus ruling out the influence of the middlemen which has two advantages one the fishermen gets their fair price and the consumers also get their products in reasonably lesser rates. Thus it does effect the delivery men in the middle in a broader perspective as they are stripped of their role. Effect of the Fishermen Information is a boon and using the information technology in fishing is a brilliant initiative by AG society. It helps the fishermen and the community to make their living at a very low cost of Mother Nature. AG community has taken up ICT to a whole new level helping to have a check in overfishing as well as protecting those fishes which are vulnerable due to the actions of humans. The member fishermen do have an adventitious prospect due to AG society ("The Benefits of ICT", 2007). First of all, they are well coordinated and guided towards the shoal of fishes which are needed to be hunted and thus help in reducing overfishing as only those fishes which are necessary are caught thus reducing wastage. The fishermen also get the information what exactly is the requirement, and they just do it according to it without meandering to other places. Managing the Information Security AG society should have cyber security ready so as to meet the objectives of the first cyber security so that they are prepared during any course of cyber security attack. They must be willing and have the ability to detect and respond adequately during the scenario of computer security phishing or malware attacks, intrusions or breach or during the threat of losing the intellectual property or data originating within or outside the network (Sullivan, 2016). AG society must take up proactive approach in protecting or identifying their assets of utmost importance such as business process, customers data, as well as their banking data, information technology and also the information regarding the Unmanned Aerial Vehicles or UAVs. The risk management of information security would help AG society to evaluate what it is trying to protect as well as identifying the security measures they must take up to protect themselves. It is quite important to focus on the information systems purpose wh ich in turn help to attain the organisation's mission. The information is the primary element which provided support for the business and helps the organisation for the sustainability of its operations (Stoneburner, Goguen, Feringa, 2002). References Kumar, P. (2016). Advantages Of Information And Communication Technologies In Distance Education Sector. Retrieved from https://ijariie.com/AdminUploadPdf/Advantages_Of_Information__And_Communication___Technologies_In_Distance___Education_Sector_ijariie1533.pdf Stoneburner, G., Goguen, A., Feringa, A. (2002). Risk Management Guide for Information Technology Systems.National Institute. Retrieved from https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/administrative/securityrule/nist800-30.pdf Sullivan, P. (2016). Information security risk management: Understanding the components. Retrieved from https://searchsecurity.techtarget.com/tip/Information-security-risk-management-Understanding-the-components The Benefits of ICT. (2007).Bell ICT Solutions. Retrieved from https://www.bell.ca/web/enterprise/newsroom/en/pdf/benefits-of-ict-white-paper-en.pdf

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.