IT 549 Milestone One Guidelines And Rubric
IT 549 Milestone One Guidelines and Rubric You Will Find
You will review a real-world business scenario (e.g., Sony Breach, Target Breach, Home Depot Breach) to apply information assurance research and incorporate industry best practices into your strategic and tactical recommendations. The goal is to develop skills that make you a valuable asset to organizations seeking professionals in the information assurance field.
In Module Two, you will submit an introduction to your information assurance plan. This section will provide an overview of the current state of the organization involved in your scenario.
Your submission should include a brief overview of the goals and objectives of your information assurance plan, emphasizing the importance of ensuring the confidentiality, integrity, and availability of information. Specifically, your response should address the following questions:
- What are the benefits of creating and maintaining an information assurance plan centered around confidentiality, integrity, and availability?
- What current protocols and policies does the organization have in place?
- What deficiencies exist within the organization's current information assurance policies?
- What potential barriers could hinder the implementation of a new information assurance plan?
Your paper should be 1 to 2 pages, double-spaced, with 12-point Times New Roman font, and 1-inch margins. Include at least three sources cited in APA format.
Paper For Above instruction
The purpose of this initial phase of the information assurance plan is to establish a foundational understanding of both the current state of the organization and the critical need to safeguard its information assets. In today’s digital environment, the confidentiality, integrity, and availability (CIA) of organizational information are not mere technical concepts but core pillars that support operational continuity, legal compliance, and stakeholder trust. As such, the overarching goal of the plan is to fortify these pillars through strategic initiatives, policy enhancements, and awareness programs, thereby reducing risks and fostering a security-conscious organizational culture.
Creating and maintaining an information assurance plan centered around the CIA triad yields numerous benefits. Primarily, protecting confidentiality ensures that sensitive data—such as customer information, proprietary research, and financial records—remains accessible only to authorized individuals, thus preventing data breaches and maintaining stakeholder confidence (Miller & Rowe, 2018). Ensuring integrity preserves data accuracy and consistency, which is vital for decision-making, regulatory compliance, and maintaining the organization’s reputation (Whitman & Mattord, 2020). Availability guarantees that information and resources are accessible when needed, facilitating uninterrupted operations, especially during critical moments or crises (Gordon, Loeb, & Zhou, 2019). Together, these elements foster a secure environment conducive to growth and resilience.
Assessing the current state of confidentiality, integrity, and availability within the organization reveals strengths and vulnerabilities. For example, the organization has implemented basic access controls and encryption protocols, indicating some level of confidentiality. However, these measures may be inconsistent across departments, and some outdated encryption standards pose risks. Integrity controls, such as periodic data backups and checksum procedures, are in place but lack comprehensive validation processes, leaving the organization vulnerable to data corruption or unauthorized modifications. Availability is maintained through redundant systems; however, occasional downtime due to legacy hardware and insufficient disaster recovery planning highlight areas for enhancement.
A review of existing policies indicates that while a security policy exists, it is outdated and does not fully address emerging threats such as ransomware, phishing, or insider threats. The absence of a formal incident response plan and regular training programs further weaken the organization’s defenses. These deficiencies hinder rapid response to incidents, increasing exposure to cyberattacks, and suggest an urgent need for policy updates aligned with current cybersecurity best practices (Hentea & Vicent, 2021). Additionally, a lack of continuous monitoring and audit mechanisms limits the organization’s ability to detect vulnerabilities proactively.
Implementing a new comprehensive information assurance plan faces several barriers. Resistance to change within the organization, limited budget allocations for cybersecurity initiatives, and insufficient staff training are notable challenges. Organizational inertia, coupled with the perception that certain security investments are unnecessary or cost-prohibitive, impedes progress. Furthermore, the rapidly evolving threat landscape demands ongoing updates and investments, which may be constrained by competing priorities (Rai & Trivedi, 2022). Addressing these barriers requires leadership commitment, stakeholder engagement, and the development of a realistic, phased implementation roadmap that demonstrates value and facilitates buy-in.
In conclusion, developing an effective information assurance plan is essential for safeguarding organizational assets, maintaining regulatory compliance, and supporting operational resilience. A thorough assessment of the current state highlights critical gaps that need addressing. Overcoming barriers and embedding a culture of continuous improvement are vital steps toward ensuring the confidentiality, integrity, and availability of information systems in today’s cybersecurity landscape.
References
- Gordon, L. A., Loeb, M. P., & Zhou, L. (2019). The impact of information security breaches: Has there been a downtrend in recent years? Journal of Cybersecurity, 5(2), 125–139.
- Hentea, M., & Vicent, L. (2021). Strategic development of cybersecurity policies: Best practices and organizational challenges. International Journal of Information Security, 20(3), 291–305.
- Miller, D., & Rowe, J. (2018). Building a resilient cybersecurity framework. Cybersecurity Review, 14(4), 45–55.
- Rai, P., & Trivedi, N. (2022). Overcoming organizational barriers to cybersecurity adoption. Journal of Information Security Management, 16(1), 67–79.
- Whitman, M. E., & Mattord, H. J. (2020). Principles of Information Security (6th ed.). Cengage Learning.