What are you waiting for?
Get free quote and order now!

Professional Writers

At Masterthesiswriting.com, we want you to FEEL SAFE when placing your order!

Plagiarism Free

At Masterthesiswriting.com, we want you to FEEL SAFE when placing your order!

Moneyback Guarantee

At Masterthesiswriting.com, we want you to FEEL SAFE when placing your order!

24/7 Support

At Masterthesiswriting.com, we want you to FEEL SAFE when placing your order!

Research Proposal on Information Security

Sample research proposal on Information security and Assurance IT Department Manager:
IT Department Manager role
The key role of IT in a company is to ensure that the communication, manipulation and handling of company’s data are made simple, effective and reliable. This is because IT provides the infrastructural platform for data handling and manipulation process. Some of the essential services provided by IT in a company includes; network management, provision of secure HTTP access in the web browser and ensuring network connection security. Some applications include MS Outlook, MS exchange, VLAN support as well as authenticated wireless connection.

It is thus the job of the IT manager to ensure that the process runs smoothly and that everything works correctly. The IT manager heads the technical team that is responsible for equipment configuration and management. Their tasks are usually divided according to their specialization. There are network technical support who will solely be responsible for the both the voice and data communication flow in the company. They therefore deal with routing and communication equipments such as routers, switches, cables and firewalls. Additionally this team is responsible for the network security and they thus work to ensure that both the hardware and the software of the company (usually firewall and firewall operating system) work according to the set standards and thus ensuring that unwanted data packets are blocked from entering the company’s servers (Whitman & Mattord, 2011).

The IT manager also works in collaboration with other IT support department to ensure that the company’s human resource is well served in terms of equipment functionality and quality. In essence, the collaboration helps in decentralizing IT functions into manageable sizes for both security and quality purposes. The IT manager is thus a crucial link and head of these different IT departments that contribute to the efficiency and security of the company’s critical data and information about its business (Stamp, 2006).

Company’s servers usually keep information related to the sales, production, inventory and marketing, the information security and assurance department which is a central part of the IT infrastructure plays a critical in preserving the integrity of this information. The customized database is capable of storing the sales, production and inventory data for usage in the marketing and sales department. Since IT allows easy accounting of inventory and sales, the company is less likely to experience problems related to overstocking or under-stocking and hence ensuring continuous service to its clientele.

Issues affecting Information Security and Assurance Department
There are a number of issues that affect this department; they range from security concerns to the challenges that came with development of technology. With the development of technology, new technologies emerge with added challenges, for instance, wireless technology has emerged with standards and authentication standards such as WPAS2 PSK and SSID (McLeod & Schell, 2007). These authentication platforms have continuously faced security threats from smart hackers. Another issue that faces a company is the increased web-based threats considering the move to adopt cloud computing. The security and integrity of the company’s data is always a major concern with the adaptation of these technologies such as SaaS where the services are shared via a web browser. Despite the increased assurance by cloud computing vendors, the integrity of the company’s information is still vulnerable to unwanted access. Another challenge that usually faces assurance and information security department is the decision making process concerning the adaptation of which kind of technology. This is an issue because adaptation of new technology does not mean that it will fit into the organization’s needs and that is why creating a balance is a requirement that is indispensable.

Do you need professional help with research proposal online? Our online research proposal writing service will write a custom research proposal on any topic for you. Certified PhD academic writers.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>