Access over 20 million homework & study documents

It Governance Cobit 2

Content type
User Generated
Subject
Management
Type
Homework
Rating
Showing Page:
1/5
Running head: IT Security Governance - COBIT 1
IT Security Governance - COBIT
[Author Name(s), First M. Last, Omit Titles and Degrees]
[Institutional Affiliation(s)]
Author Note
[Include any grant/funding information and a complete correspondence address.]

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5
IT SECURITY GOVERNANCE - COBIT 2
Introduction
The vast relying on technology techniques and devices has increased the need for the use of
standard methods in different industrial and service sectors. Hence, there has been a change in
the implementation of IT security governance that can have impact on the organization
performance, which can include; (ISACA Releases COBIT 5)
Embrace the organization performance to expand network platforms that can include mobile,
cloud.
Implementation of different IT audits and compliance necessities to ensure the value that
security can provide to the business.
Ensure the security of network for increasing the use of private individuals device and
integrated them to the existing network as private laptop, mobiles, access business emails at
private mobiles.
Increase the use of social media and the risks associated of transferring information or news
about an organization.
Hacking and thefts attacks that considered to be old or new e.g. Conficker that can have a
negative impact on the organization itself. Studies show that these threats have increasing
dramatically since 2007
Owners and operators of critical infrastructure require strong IT security governance to
ensure effective ongoing management of these and other threats. (ISO/IEC DIS 29382: 2007)
Main elements of the COBIT Framework
Sarbanes-Oxley compliance wills significantly impression the IT organization on most
public companies. On the other hand, there is one particular enormous problem. ITIL can be an

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
Running head: IT Security Governance - COBIT IT Security Governance - COBIT [Author Name(s), First M. Last, Omit Titles and Degrees] [Institutional Affiliation(s)] Author Note [Include any grant/funding information and a complete correspondence address.] 1 IT SECURITY GOVERNANCE - COBIT 2 Introduction The vast relying on technology techniques and devices has increased the need for the use of standard methods in different industrial and service sectors. Hence, there has been a change in the implementation of IT security governance that can have impact on the organization performance, which can include; (ISACA Releases COBIT 5) • Embrace the organization performance to expand network platforms that can include mobile, cloud. • Implementation of different IT audits and compliance necessities to ensure the value that security can provide to the business. • Ensure the security of network for increasing the use of private individuals device and integrated them to the existing network as private laptop, mobiles, access business emails at private mobiles. • Increase the use of social media and the risks associated of transferring information or news about an organization. • Hacking and thefts attacks that considered to be old or new e.g. Conficker that can have a negative impact on the organization itself. Studies show that these threats have increasing dramatically since 2007 • Owners and operators of critical infrastructure require strong IT security g ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Documents