This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Locate and provide a URL for the primary website of each organization

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Unit 9 assignment: system frameworks

Part 1: security systems

Qsn1. Locate and provide a URL for the primary website of each organization

  1. Control Objectives for Information and Related Technology (COBIT)\

https://www.isaca.org/resources/cobit

  1. Capability Maturity Model Integration (CMMI)

https://cmmiinstitute.com/

  1. International Organization for Standardization (ISO) 2700 series

https://www.iso.org/isoiec-27001-information-security.html

  1. Information Technology Infrastructure Library (ITIL)

https://www.axelos.com/best-practice-solutions/itil/what-is-itil

  1. National Institute of Standards and Technology (NIST) Special Publication 800 (SP800) series

https://www.nist.gov/itl/publications-0/nist-special-publication-800-series-general-information

Qsn2. Provide a summary of the organization’s mission (30–50 words).

  1. Control Objectives for Information and Related Technology (COBIT):  it was first established in 1996 and founded on a key mission, “to research, develop, publicize and promote an authoritative, up-to-date, international set of generally accepted information technology control objectivesfor day-to-day use by business managers and auditors” (COBIT (2019).
  2. CMMI is a methodology normally sued for the development and refining of organizational software development [process and was established for the military. The mission is to, “CMMI best practices focus on what needs to be done to improve performance and align operations to business goals” (Vanderburg, 2019).
  3. ISO 27000 is one of the rapidly growing families of information security management systems. The ISO framework focuses on “managing assent security such as financial information and Intellectual properties.”
  4. The ITIL infrastructure is a set of composed of detailed practices for information technology management concerned with aligning IT services with business needs. The organization’s mission is to “make individuals and organizations more effective by providing practical guidance, content, and qualifications distilled from real-world experience and developing practices.”
  5. The NIST is composed of various guidelines and recommendations concerning cybersecurity activities. The mission of the organization is to “address and support the security and privacy needs of U.S. Federal Government information and information systems (Allen, 2018).”

Qsn3. Assessing Sources to Undertake Research

  1. The capability maturity model integration is an improvement technique established by the Carnegie Mellon software engineering institute. CMMI continues to play a critical role in providing the organization with vital elements and also is used in guiding improvement processes across all projects in an organization. Over the years, it has gained significant attention across the globe.

Links: https://broadswordsolutions.com/what-is-cmmi/

:https://www.cerait.com/cmmi.htm

: https://www.cio.com/article/2437864/process-improvement-capability-maturity-model-integration-cmmi-definition-and-solutions.html

 

  1. The ISO has, over the past years, gained significant attention due to its extensive ways of evaluating the comprehensiveness of companies’ policies and standards. It is composed of guidelines that help in addressing cybersecurity concerns.
  2. COBIT is a framework that is focused on helping companies focused on implementing, monitoring, and improving IT governance and information management.
  3. One of the contemporary problems facing many people across the world is an emerging trend towards information security due to reliance on the internet. Most companies have adopted the BYOD policy top ensure people can work with their own devices. However, cybercrime has become a major security issue. The use of the ITIL framework would play a critical role in offering protection against any form of malware.
  4. Despite the ITIL framework being one of reliable in offering security, it is faced with various challenges, such as the cost of implementing the ITIL tools (Watson, 2011).

 

 

 

 

 

 

 

 

 

References

 

 

Allen, T. A. (2018, May 21). NIST Special Publication 800-series General Information. Retrieved  from https://www.nist.gov/itl/nist-special-publication-800-series-general-information

CERAIT (2019). What is CMMI? Retrieved from https://www.cerait.com/cmmi.htm

CMMI Institute. (n.d.). Retrieved from https://cmmiinstitute.com/cmmi/intro.

COBIT (2019). Performance Management Model to Assess Governance and Management Objectives. Retrieved from https://www.isaca.org/resources/cobit

Vanderburg, E. (2019). Information Security Compliance: ISO 27000.retrieved\ fromhttps://www.tcdi.com/iso-27000-certification-history-overview/

Watson, M. (2011). What are the benefits and drawbacks of using ITIL?. Retrieved from https://www.itgovernance.co.uk/blog/what-are-the-benefits-and-drawbacks-to-using-itil

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask