[ad_1]
Information Assurance
American Military University
Dr. Mousa Ayyash
ISSC 660 Information Assurance
14 Aug 2022
Information Assurance
Introduction
In today’s interconnected world, information is literally at the tip of our fingers, thanks to ubiquitous computing devices like smartphones and computers. Groups and individuals all across the world are steadily upgrading their technological capabilities. Because of these developments, they have easier access to more data than ever. Most people who have access to something do not always realize what they can do with that access. In our haste to have everything at our fingertips, internet users often fail to realize that not everything can be found instantly. Unless people know the risks associated with information and cyber networks, all your data could be exposed (Meng, 2022). The best way to secure the organization’s data from cyber-attacks is through having the best information assurance strategies and plans for proactive response to the incidences.
HME Information Assurance
A scenario where the organization allows all the employees to access sensitive data without being concerned results in increased risks associated with using those and might lead to disastrous consequences. Lack of understanding or concern about the sensitivity of data in the organization puts the firm at much risk. This will damage reputation if a cyber-attack occurs where potential buyers would avoid HME like the plague (White, 2022). The intervention is to educate and train the employees and management about concepts and strategies, including confidentiality, integrity and data availability at HME IT networks. Understanding them is critical in reducing cyber-attack cases, especially the social engineering type of risks that target unsuspecting individuals.
Development of Information Assurance Plan
There is a need to evaluate and assess potential cyber-attacks in HME because that will be the basis and foundation for developing strategies and information security plans. The approach of understanding the known risks leads to the prioritization of the most sensitive and destructive risks to allocating resources.
Development and Implementation of Information Assurance Plan
The security plan is developed using the information sourced from the assessment of risks, whereas the risk management plan is developed to address risks that occur, minimizing the damages and also helping in preventing the risks from an occurrence. All employees are involved in the process of implementing the information assurance because they are the main implementers.
Conclusion
The HME strategy that focuses on having an information insurance plan assists in addressing the challenge of cybersecurity by ensuring employees are educated, trained, and aware of the risk factors. Addressing the challenge using the proactive approach ensures that the reputation of HME is protected.
References
Meng, L. (2022). Internet of Things Information Network Security Situational Awareness Based on Machine Learning Algorithms. Mobile Information Systems, 2022, 1-7. https://doi.org/10.1155/2022/4146042
White, G. (2022). Infrastructure Cyber-Attack Awareness Training. International Journal of Information Security And Privacy, 16(1), 1-26. https://doi.org/10.4018/ijisp.291702
[ad_2]