Wednesday, June 19, 2019

Information Security Program Survey Research Paper - 1

Information Security Program Survey - Research Paper ExampleIn protecting its training data, the division involves five offices in its government to effectively secure data in their possession. These offices are the chief technology officers council, the chief information officers council, the chief information security officers workgroup, and the enterprises architecture workgroup. This paper seeks to analyze information security concepts in relation to the roles of the Chief Information Officers Council (HHS.gov, 2012).Information security programs protect the information the organization gathers, creates, processes, transmits and stores. One of the information security programs the organization applies is the use of computerized system to store sensitive information touch oning to personal employee information, various departments financial and management operations, information pertaining to the medical records of millions of American seeking financial aid through the vario us insurance programs it operates, such as medicare (HHS.gov, 2012).Computerized system of storing and disseminating data is vulnerable to dotty entry and hackers from the cyber space. This has an effect of loss of data, and availability of sensitive and highly confidential information to unwarranted recipients. To protect against these risks, the United States congress, in 2002 passed a legislature requiring whole Federal institutions to initiate security measures, aimed at protecting their information systems.The statute is referred to as Federal Information Security Management Act, of 2002. In response to this act, the department of Health and Human Services formed the department of the Chief Information Officer (HHS OCIO), whose role is to advice the secretary, and his assistant on all issues pertaining to information security that pertain to the achievement of the organizations goals (HHS.gov, 2012).The office of OCIO develops programs that protect the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.