Unit 9 assignment: system frameworks
Part 1: security systems
Qsn1. Locate and provide a URL for the primary website of each organization
- Control Objectives for Information and Related Technology (COBIT)\
https://www.isaca.org/resources/cobit
- Capability Maturity Model Integration (CMMI)
- International Organization for Standardization (ISO) 2700 series
https://www.iso.org/isoiec-27001-information-security.html
- Information Technology Infrastructure Library (ITIL)
https://www.axelos.com/best-practice-solutions/itil/what-is-itil
- National Institute of Standards and Technology (NIST) Special Publication 800 (SP800) series
https://www.nist.gov/itl/publications-0/nist-special-publication-800-series-general-information
Qsn2. Provide a summary of the organization’s mission (30–50 words).
- Control Objectives for Information and Related Technology (COBIT): it was first established in 1996 and founded on a key mission, “to research, develop, publicize and promote an authoritative, up-to-date, international set of generally accepted information technology control objectivesfor day-to-day use by business managers and auditors” (COBIT (2019).
- CMMI is a methodology normally sued for the development and refining of organizational software development [process and was established for the military. The mission is to, “CMMI best practices focus on what needs to be done to improve performance and align operations to business goals” (Vanderburg, 2019).
- ISO 27000 is one of the rapidly growing families of information security management systems. The ISO framework focuses on “managing assent security such as financial information and Intellectual properties.”
- The ITIL infrastructure is a set of composed of detailed practices for information technology management concerned with aligning IT services with business needs. The organization’s mission is to “make individuals and organizations more effective by providing practical guidance, content, and qualifications distilled from real-world experience and developing practices.”
- The NIST is composed of various guidelines and recommendations concerning cybersecurity activities. The mission of the organization is to “address and support the security and privacy needs of U.S. Federal Government information and information systems (Allen, 2018).”
Qsn3. Assessing Sources to Undertake Research
- The capability maturity model integration is an improvement technique established by the Carnegie Mellon software engineering institute. CMMI continues to play a critical role in providing the organization with vital elements and also is used in guiding improvement processes across all projects in an organization. Over the years, it has gained significant attention across the globe.
Links: https://broadswordsolutions.com/what-is-cmmi/
:https://www.cerait.com/cmmi.htm
- The ISO has, over the past years, gained significant attention due to its extensive ways of evaluating the comprehensiveness of companies’ policies and standards. It is composed of guidelines that help in addressing cybersecurity concerns.
- COBIT is a framework that is focused on helping companies focused on implementing, monitoring, and improving IT governance and information management.
- One of the contemporary problems facing many people across the world is an emerging trend towards information security due to reliance on the internet. Most companies have adopted the BYOD policy top ensure people can work with their own devices. However, cybercrime has become a major security issue. The use of the ITIL framework would play a critical role in offering protection against any form of malware.
- Despite the ITIL framework being one of reliable in offering security, it is faced with various challenges, such as the cost of implementing the ITIL tools (Watson, 2011).
References
Allen, T. A. (2018, May 21). NIST Special Publication 800-series General Information. Retrieved from https://www.nist.gov/itl/nist-special-publication-800-series-general-information
CERAIT (2019). What is CMMI? Retrieved from https://www.cerait.com/cmmi.htm
CMMI Institute. (n.d.). Retrieved from https://cmmiinstitute.com/cmmi/intro.
COBIT (2019). Performance Management Model to Assess Governance and Management Objectives. Retrieved from https://www.isaca.org/resources/cobit
Vanderburg, E. (2019). Information Security Compliance: ISO 27000.retrieved\ fromhttps://www.tcdi.com/iso-27000-certification-history-overview/
Watson, M. (2011). What are the benefits and drawbacks of using ITIL?. Retrieved from https://www.itgovernance.co.uk/blog/what-are-the-benefits-and-drawbacks-to-using-itil