Answered! Discuss how information security and data threat identification should be performed within your organization or…

Discuss how information security and data threat identification should be performed within your organization or university. Should every threat be planned for? Why or why not? Please provide 3 full paragraphs, do not copy/paste word from word from websites/articles or use old examples.

Expert Answer

 First of all we need to know what is information security and data threat identification. Information security refers to the process of preventing data leaks(like unauthorized access,use, disclosure, disruption, modification, inspection, recording or destruction) of the valueable information(or data) within an organization from various unwanted sources.Data threat identification refers to the process for inspecting ,detecting threats and risks that an organization/system may face.An organization or university can also face various data threats and information leaks so they need some criteria or method to face this problem.

Information is a critical asset to our University. Much of any organisation’s value is based on its information including:

  1. Intellectual property
  2. Teaching and research information
  3. Processes and organisational structures which define how the organisation operates

The goal of information security is to support the organisation’s business objectives while maintaining an appropriate level of security.To achieve this, we must securely enable our work of education and research, while appropriately protecting information with due regard to regulation, legislation, governance and commercialisation.Information security policies and procedures help enable the University to satisfy its legal, regulatory, contractual and ethical responsibilities with regard to the information it holds and processes.We also rely on appropriate technology controls as a safeguard to prevent misuse and the exposure of our information assets, whilst limiting accidental damage. When consistently applied across the University, these policies and procedures provide information assurance, and, protect information assets and critical business processes from a range of threats to ensure business continuity.There are various software tools for maintaining security within information sharing that an university can apply for securing its data and information.

Data threat identification can be done by Forensic analysis of data.Forensic analysis of data breaches usually finds that clear evidence of malicious activity was sitting in audit logs. If the security team had known about the activity, they could have stopped, or at least mitigated, the security threat. But it is difficult to know which activities pose real or potential threats, and require investigation.To quickly identify threats before they cause damage, you need real-time information and analysis of security events as they occur. You need to rapidly spot things that are out of the ordinary and may require a closer look.There are various tools for information security and data threat identifiaction which an university/organisation can install such as:

  • Nessus (vulnerability scanners)
  • Wireshark (packet sniffers- previously known as Ethereal)
  • Snort (IDS – intrusion detection system)
  • Netcat (Netcat)
  • Metasploit Framework (vulnerability exploitation tools)
  • HPing2 (packet crafting tools)
  • Kismet (wireless tools or packet sniffers)
  • TCPDump (packet sniffers).

Yes,every threat should be planned for.This means that we should prepare of every possible threat that an organization can face in the upcoming time. If we can’t handle the threat atleast we can prepare for the threat and its maximum consequences. By following this not only an organization will be robust but it will also be a stable and progressive one.

Still stressed from student homework?
Get quality assistance from academic writers!