ASSIGNMENT 2

No of words: 700

Format APA

Don't use plagiarized sources. Get Your Custom Essay on
ASSIGNMENT 2
Just from $13/Page
Order Essay

For this assignment, you are to provide a Critical Analysis of the following article . You should ensure that you are following standard APA formatting.

  

Preparing Information Systems (IS) Graduates to Meet the Challenges of Global IT Security: Some Suggestions 

Advisory from Professionals

Preparing Information Systems (IS) Graduates to Meet the

Challenges of Global IT Security: Some Suggestions

Jeff Sauls

IT Operations Professional

Austin, TX, USA

Naveen Gudigantala

Operations and Technology Management

University of Portland

Portland, OR 9

72

03, USA

gudigant@up.edu

ABSTRACT

Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy

breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are

investing heavily in IT resources to keep up with the challenges of managing their IT security and assurance. Therefore, the IT

industry relies greatly on the U.S. higher education system to produce a qualified and competent workforce to manage security

challenges. This advisory discusses some security challenges faced by global companies and provides input into the design

and delivery of IS curriculum to effectively meet such challenges.

Keywords: Information assurance and security, Curriculum design and development, Computer security

1. INTRODUCTION

Information security and assurance management is vital for

the success of organizations. It is particularly relevant for

global companies whose customers demand a high level of

security for their products. Meeting such high expectations

requires companies to study security best practices,

continually invest in technical and human resources, and

implement a secure corporate environment. The goal of this

paper is to discuss some security challenges faced by global

organizations and to provide suggestions to IS academics

concerning security curriculum to effectively educate the

next generation IT workforce to meet these challenges.

2. SECURITY CHALLENGES FACED BY GLOBAL

COMPANIES

This advisory focuses on security challenges faced by global

companies. For instance, security challenges faced by a

multinational company operating manufacturing plants in

several countries are likely to be much different than those of

a company with a manufacturing plant in a single location.

The goal of this section is to present some security

challenges faced by global companies.

What many companies do in terms of security is driven

by the needs of their customers. For instance, consider the

case of a global manufacturing company that makes

hardware for a smart card. Smart cards include embedded

integrated circuits and customers generally provide the

manufacturer with a detailed list of functional and assurance

requirements for security. The manufacturer of the hardware

is expected to comply with the specifications of the

customer. If the company decides to manufacture in two

plants in Europe and the U.S., it becomes important for the

manufacturer to have uniform security standards in both

plants. These security standards may include many aspects

such as how firewalls are managed, how data is encrypted,

type of security policies, and implementation of security

policies. Having uniform security standards in both plants

makes it easier for the company to support these plants and

the customer to audit the security.

Some customers require the manufacturers to conform to

the Common Criteria for Information Technology Security

Evaluation (abbreviated as Common Criteria). Common

Criteria is an internationally recognized technical standard,

Journal of Information Systems Education, Vol. 24(1) Spring 2013

71

which includes a framework that is used for evaluating the

security of Information Technology (IT) products and

technology (SANS Institute, 2003). Common Criteria

assures that the processes involved in creating a computer

security product have been conducted in a standard manner.

The extent to which manufacturers meet specifications can

be tested by laboratories. For global companies, meeting

Common Criteria standards presents a challenging task

because of the time and effort involved in preparing the

documentation for security evaluation.

Having the ability to meet the needs of customers with

high security requirements helps companies meet the

security demands of other customers as well. However,

achieving this high level of secure environment comes at a

great expense. Research by Gartner finds that global

spending on security is expected to increase 8.4% to $60

billion in 2012 and projects the spending to increase to $86

billion in 2016 (CIO Insight, 2012). Thus, organizations

must incur large costs from an IT perspective to implement

and maintain this high level of security environment.

Some security challenges faced by companies may not be

technical in nature but related to human elements. A majority

of the communication between customer and vendor is back

and forth. Given that not everything can be automated in

companies, the jobs performed by humans can result in

mistakes. For instance, an employee could mix up the order

specifications and another employee could show incorrect

data to a client. Therefore, to mitigate these human errors, it

is important for companies to provide training to employees

on the best practices to avoid making such mistakes.

Global companies experience additional challenges when

dealing with different cultures, laws, and practices. For

instance, in some far eastern countries, users can be lax with

passwords if they feel sharing passwords will help someone

else. Typically, internal audits expose such inconsistencies

and force global companies to implement uniform password

policies. In addition, global companies must respect local

laws before making and enforcing any security policies. For

instance, creating a uniform policy for remote access control

across the U.S., China, and Korea may not be a good idea

because local laws must be researched and incorporated

when creating such a policy in each of the countries.

The discussion so far highlights security challenges faced

by global companies. The need to meet security needs of

customers, use common security standards, manage technical

and human security threats, and meet cultural and legal

aspects of security policies require a next generation IT

workforce that is well trained. The next section discusses

skills needed by IS graduates and some general advice for

designing IS security curriculum.

3. SKILLS REQUIRED FOR GRADUATES

SPECIALIZING IN INFORMATION SYSTEMS (IS)

SECURITY

The IT infrastructure of modern day global companies is

very complex. The large number of systems and applications

can easily be overwhelming. Succeeding in such an

environment requires the IS graduates to have solid

foundational technical knowledge. Different programs may

offer different technical foundations. For instance, a

computer science student may take different foundational

courses compared to an information systems student. A

computer science student may take courses in data structures,

programming, operating systems, and software engineering,

while an IS graduate may take courses in data

communications and networking, database management, and

systems analysis and design. Regardless of the content

differences, the core idea is that an IS security entry level

employee must be able to understand what is going on in the

system when encountered with a problem. Having solid

foundational technical knowledge will help graduates

correctly diagnose the problem. Therefore, it is important for

today’s graduates to understand the IT infrastructure as a

system as opposed to focusing on a specific component such

as a database or a specific application.

In addition to having foundational technical knowledge,

IS graduates must have analytical thinking and problem

solving skills. For instance, an employee working with an

Oracle product, when encountered with an issue, could first

call Oracle support. However, it is advisable for the

employee to first think about the causes of the problem

(analytical skills help here), dig deeper into the problem, and

try to solve it on his or her own before reaching out for help.

This could result in a solution sooner than going through a

vendor’s support structure. Similarly, an entry-level

programmer, in addition to writing good code, must think

about the environment in which the code will run and keep

the whole system in mind when programming. Therefore,

foundational technical knowledge, analytical skills, and

problem solving skills constitute the core competencies

needed by today’s IS graduates to work in the IT industry in

general and IS security in specific.

4. ADVICE TO IS FACULTY FOR THE DESIGN AND

DELIVERY OF IS CURRICULUM

This section presents practical advice to IS faculty

concerning improvements to the IS program and curriculum.

Though these suggestions may not address every challenge

discussed in this advisory, some key inputs are provided to

design and deliver IS security curriculum with a view to

graduating a competent IT workforce.

1. The IS curriculum to prepare the next generation of
security professionals must provide students with strong

foundational technical knowledge. The inclusion of

courses and the orientation of teaching must help

students think about IT infrastructure as a system and

not as an individual piece of the puzzle. The role of

analytical thinking must be highlighted in solving

problems.

2. There must be a strong emphasis on practical exposure
to concepts in terms of hands-on experience for

students. It is advisable to have each course

accompanied by a lab in which students work with

technologies and apply concepts. An example is a lab in

which students could be divided into two teams, red and

blue, with the red team enacting the role of an attacker

and the blue team playing the role of a defender. The

use of such hands-on activities enables students to

better retain knowledge. In addition, students with

Journal of Information Systems Education, Vol. 24(1) Spring 2013
72

hands-on exposure tend to do well in interviews in

terms of answering questions or explaining concepts.

3. Student internships must be strongly encouraged. While
classroom learning is important, nothing substitutes for

the knowledge acquired from real-world experiences.

4. Students must be encouraged to take electives in
interdisciplinary areas. For instance, knowledge of

operations management, in terms of process analysis,

setting up policies, and optimization techniques can

help reduce mistakes at the workplace.

5. Faculty could explore the possibility of applying for
grants from National science foundation (NSF) and

Department of Defense for innovative curriculum

design.

6. Faculty are strongly encouraged to integrate latest
knowledge concerning best practices in information

security into their courses by attending the following

workshops: The Colloquium for Information Systems

Security Education, Information Security Curriculum

Development Conference (InfoSecCD), and World

Conference on Information Security Education (WISE)

(Whitman and Mattord, 2004).

7. From many years of interviewing, it seems that there is
a dearth of qualified technical graduates from U.S.

universities. A substantial number of job applicants

seem to come from foreign countries and, hence, it is

very important for U.S. universities to recruit, train,

retain, and place a substantial number of technically

qualified degree students to meet the demands of the IT

security industry.

5. CONCLUSION

While the need for global information security and assurance

is increasing, it appears that the supply of qualified technical

IS students is on the decline. Given the increasing necessity

to protect the IT infrastructure and deliver IS assurance,

organizations will become increasingly dependent on the

U.S. higher education system to provide a workforce with

adequate skills to meet these challenges. Therefore, the onus

is on the IS academia to design a curriculum that excites

students, trains them with hands-on exposure, and provides

them with the necessary skills to achieve success in the IT

industry. This paper presents practical advice in such

direction.

6. ACKNOWLEDGEMENTS

The authors would like to thank Venkata Ramana Jetty for

facilitating this work.

7. REFERENCES

CIOinsight (2012). Gartner Predicts Security Market Will

Top $86 Billion in 2016, Retrieved June 24,

2013, from

http://www.cioinsight.com/c/a/Latest-News/Security-

Infrastructure-Market-to-Top-86-Billion-in-2016-Gartner-

591583/

SANS Institute (2013). Common Criteria and Protection

Profiles: How to Evaluate Information. Retrieved June 24,

2013, from

http://www.sans.org/reading_room/whitepapers/standards/

common-criteria-protection-profiles-evaluate-

information_1078

Whitman, M. & Mattord, H. (2004). A Draft Curriculum

Model for Programs of Study in Information Security and

Assurance. Proceedings of the 1st annual conference on

Information security curriculum development, 1-7.

AUTHOR BIOGRAPHIES

Jeff Sauls manages corporate IT operations for a

multinational company, in addition to

providing architectural and policy

guidance to multidisciplinary teams as

they relate to IT. After graduating

from Texas A&M University, he has

had over 15 years of experience in

various roles of system administration,

software development, database

administration and management. Jeff

has designed large and small systems to support varying

global business needs with overarching goals of reducing

long term support costs while increasing security and

capability.

Naveen Gudigantala is Assistant Professor of MIS in the

Robert B. Pamplin Jr. School of

Business Administration at University

of Portland. He received his Ph.D. in

MIS from Texas Tech University. His

research interests include Web-based

decision support systems, information

systems education, and containing

gray markets for Information

Technology products. His work has

appeared in the Communications of Association for

Information Systems, Decision Support Systems journal,

International Journal of Information Management, among

other journals.

Journal of Information Systems Education, Vol. 24(1) Spring 2013

73

STATEMENT OF PEER REVIEW INTEGRITY

All papers published in the Journal of Information Systems Education have undergone rigorous peer review. This includes an
initial editor screening and double-blind refereeing by three or more expert referees.

Copyright ©2013 by the Education Special Interest Group (EDSIG) of the Association of Information Technology Professionals.
Permission to make digital or hard copies of all or part of this journal for personal or classroom use is granted without fee
provided that copies are not made or distributed for profit or commercial use. All copies must bear this notice and full citation.
Permission from the Editor is required to post to servers, redistribute to lists, or utilize in a for-profit or commercial use.
Permission requests should be sent to the Editor-in-Chief, Journal of Information Systems Education, editor@jise.org.

ISSN 1055-3096

Running Head: Case Studies

2

Running Head: Case Studies

Case Studies Reviews

Type Your Full Name Here

Professor Dr. Lynda Marshall
University Of The Cumberlands
Organization Leadership
And
Decision Making
Type Date Here

Abstract

Type a paragraph that briefs your audience/ reader about your paper. Synthesize each topic of discussion. The abstract section is always typed on page 2 following the title page. Font type is Times New Roman with 12 font size letters. A minimum of 7 succinct sentences is required in this section.

Introduction

Type a paragraph that prepares your audience/ reader on what you are about to say. Indent the first sentence of each paragraph and include in-text citations using the list from your reference list. Font type is Times New Roman with 12 font size letters.

1. Type question here Case #1 Week 1

Type your response to the question here. Indent the first sentence of each paragraph and include in-text citations using the list from your reference list. Font type is Times New Roman with 12 font size letters.

2. Type question here Case #2 Week 2
Type your response to the question here. Indent the first sentence of each paragraph and include in-text citations using the list from your reference list. Font type is Times New Roman with 12 font size letters.
3. Type question here Case #3 Week 3
Type your response to the question here. Indent the first sentence of each paragraph and include in-text citations using the list from your reference list. Font type is Times New Roman with 12 font size letters.
#. Type question here Case # Week #

Etcetera…

Summary

Type a paragraph that summarizes to your audience/ reader what you just said. Indent the first sentence of each paragraph and include in-text citations using the list from your reference list. Font type is Times New Roman with 12 font size letters. A minimum of 7 concise sentences is required in this section.

REFERENCES

*Apply page-break to make this its own page

Take note that the first line of the reference is left aligned with second line as hanging indentation. See example below.
Last Name, Abbreviate First Name. Abbreviate Middle Name. (Year). Type title of article here and in Italic font. (Web Article). Retrieved from Type or Paste URL Address here

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy