Order for this Paper or Similar Assignment Writing Help

Fill a form in 3 easy steps - less than 5 mins.

Posted: September 25th, 2022

Information Assurance

Information Assurance
As software and systems engineering have matured, there is a clear need for an “architectural view” of organizational systems. This need has grown as a result of the increasing complexity of systems and their interactions within and between organizations. Additionally, continued pressures to reduce information technology costs and deliver real, quantifiable business benefits from solutions necessitate a clear understanding of how systems support, add value, and enable the business.

Directions: Read the article “An Enterprise Security Program and Architecture to Support Business Drivers” (attachment ) Preview the document by Brian Ritchot.
How does the author leverage an enterprise security architecture to link the goals and objectives to meet the information assurance of an organization?
Using the knowledge you’ve gained from this article, create a model of business risk for the company you selected in week 1 (United Health Group) . In your model of business risk, describe and include examples for each of the following:
Your trust model
Your threat model
Your safeguards

Information Assurance
Information assurance relates to the management or processing, transmission, use, and processing of data. Confidentiality, Integrity and Availability must be upheld to maintain a successful business. For any connected network it is natural that there may be information assurance challenges, therefore the need to come up with IT guidelines to manage possible risks. Information Assurance being theoretical, it provides a way to achieve solutions for data through transformation of data policies (Paul, 2018). Considering risks in alignment to business objectives enables one to apply appropriate controls to keep the company running successfully.
Brian Ritchot (2013) in his article “An Enterprise Security Program and Architecture to Support Business Drivers” addresses the issue of linking goals and objectives to meet the information assurance of an organisation. He claims that security architecture is an important aspect that could be used by organisations to thrive in information assurance. Through the Sherwood Applied Business Security Architecture (SABSA) methodology, Ritchot suggests aligning security measures alongside objective while considering possible risks that may arise. IT security should be viewed as a tool of success rather than an avoidable obstacle. The SABSA model breaks down the security architecture into six parts and considers an essential element for each. There is the contextual, conceptual, logical, physical, component, and operational architectures on the model and the levels are expected to consider assets, motivation, process, people, location and time respectively. The SABSA methodology focuses on controlling the operational risks of a company to enable the objectives, unlike other approaches that focus on eliminating threats toward an organisation (Buecker et al., 2014). The countermeasures offered by the method preserves Confidentiality, Integrity, and availability.
Understanding a business through its drivers and attributes is the first step to risk identification. Drivers concern the strategies of an organisation that are considered vital to their success while attributes are crucial parts of objectives that need protection from the enterprise security. Driver’s can be identified through the mission statement while attributes can be discovered by interviewing top management. It is then possible to come up with proxy assets by linking the drivers to attributes. Once a business is understood, prioritisation for risk identification is possible. An organisation can opt for a risk assessment to control potential threats. Managing risks means considering their duality, in that they can be avoidable or unavoidable. Hence, an organisation is expected to form key performance indicators and key risk indicators. Key risk indicators can be used to tell when the risk will be considered more than bearable for the business. Once the understanding of risks is accomplished, an organisation can head towards business risk modelling. These models of business risk include trust models, threat models and safeguards that are used to affect enterprise-wide risks hence formation of logical security services.
Using the above information, the following is a model of business risk for United Health Group:
United Health Group trust model
Trust is established when two business entities interact and exchange information. Our trust model towards healthcare providers will include checking equity resources in hospitals by analysing the time and money spent by patients. This information will give a view of the inventory a hospital claims to have in accordance to the services they claim to give. Trust is established if the provider is able to meet our requirements by having the appropriate equipment and services to give the clients who seek them. Furthermore, personal information of patients will be necessary as well as the link between hospitals and patients who have already come into contact (Massaci & Znnone, 2004). There has to be a link between third parties as proof that clients did receive the said services. Hence, patients will be required to fill out forms that will act as evidence of visiting the establishment. Clients are also required to sign any payments they make to the hospital. Moreover, customers will be required to provide their personal information such as age, names, gender, address, and contacts. Such information gives more information about the customer and how to treat them better. Using this information, it is possible to derive purpose-based trust management solutions.
United Health Group threat model
Threats involve the possible risks that could cause damage to a business. Our threat model consists in considering a potential breach in data or cyber-attacks. To make this possible, the model focuses on correlating threat intelligence to the perceived threats, looking for current threats that are common within the industry, prioritization of risks, and understanding the attack vector relative to the threat identified (UcedaVelez, 2015). Once these activities are incorporated into the threat model, it will be easier to ensure the continued success of the business. Threats need to be identified prior to mitigation to decide on the most appropriate way to deal with them. Some threats never die, hence the need to come up with methods that help reduce them. Through proper prioritization we shall be able to move through each level with proper solutions. Identification of the source of a threat will give the organization a view of how to handle the situation without interfering in business activities. Reoccurring malware threats shall be analyzed to check if the present threat is the same version as the previous one. As the technological world advances, so do cybercrimes. There is a need to ensure that information security is up to date, to combat the ever advancing cyber-criminal. These measures ensure preservation of information confidentiality, integrity and availability within an organization.
United Health Group safeguards
United Health Group considers ISO 27001 as its information security management guideline. As the de facto international standard for information security management, it will provide the roadmap to proper commercial, legal and contractual responsibilities. With the use of the ISO 27001 framework, it will be possible to show clients that our organization has identified the risks and is willing to reduce them. Through this achievement, business is expected to be more resilient towards providing the best information security to clients. This framework increases reliability and security information’s since the establishment strives to uphold the guidelines stated. Achieving these standards proves that the business is aligned with customer requirements with their security in mind. Hence, customer and business partnerships are improved.
In conclusion, describing and representing the inherent risk a business faces is possible once all the control measures, threats, trust, and risks are identified. Organizations shouldn’t solely focus on eradicating risks because sometimes risks cannot be done away with. Hence the need to come up with models that focus on containing those risks at a manageable level. It is possible to achieve information assurance for the success of a business.

References
Buecker et al. (2014). Using IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security (p.123). IBM Redbooks
Massacci, F. & Zannone, N. (2004). Privacy Is Linking Permission to Purpose. Lecture Notes in Computer Science. 3957. 10.1007/11861386_20.
Paul, P., Bhuimali, A., Aithal, P., & Rajesh, R. (2018). Cyber Security to Information Assurance: An Overview. Nternational Journal On Recent Researches In Science, Engineering & Technology, 6(4), 8-14. Retrieved from https://www.researchgate.net/publication/325202411_Cyber_Security_to_Information_Assurance_An_Overview
Ritchot, B. (2013). An enterprise security program and architecture to support business drivers. Technology Innovation Management Review, 3(8).
UcedaVelez, T. (2015). Risk Centric Threat Modelling (p. 429 – 431). John Wiley & Sons

Tags:

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

Our writing team is assembled through a rigorous selection process, where we handpick accomplished writers with specialized expertise in distinct subject areas and a proven track record in academic writing. Each writer brings a unique blend of knowledge and skills to the table, ensuring that our content is not only informative but also engaging and accessible to a general college student audience

Discounted Prices

Competitive pricing is a cornerstone of our service, where we balance affordability with exceptional quality. In offering the best writers at rates that rival other writing services, we ensure that students can access top-notch content without breaking the bank unnecessarily. Our fair and transparent pricing structure is designed to provide value for money, making us a go-to choice for students seeking high-quality writing services at an affordable price.

100% Plagiarism-Free

Academic integrity is paramount to our writing service, which is why we produce original research and writing content for every paper. Each piece of work is carefully written from scratch, ensuring that every sentence, paragraph, and page is authentic and free from plagiarism. Our rigorous quality control process involves thorough scanning of every final draft, guaranteeing that the content meets the highest standards of originality and academic integrity. With keen attention to citation and referencing, we ensure that every source is properly credited, giving you complete peace of mind. We also have the best plagiarism checkers like safeassign and turnitin thus providing similarity score for each paper.

How it works

When you decide to place an order with Dissertation Help, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.