Wednesday, February 26, 2020

Cybersecurity Profile Essay Example | Topics and Well Written Essays - 1250 words

Cybersecurity Profile - Essay Example In conclusion, it is important to note that security controls and profiles will vary with information systems in different organizations. In this case, the security controls inherent in the Agency are crucial controls that are aimed at maintaining the privacy and confidentiality of the data and information. To achieve a complete and sound security profile, the management, operational and technical controls must be implemented to complement each other for effective results. Planning control lays a foundation for other management controls, this can be done through security policy and procedures and security plan. Basic operational controls such as security awareness and training are crucial in any organization. Through security awareness and training policy and procedures and user awareness, security can be achieved. Finally, the technical controls offer a final remedy for security concerns in the organization. Basically, the identification and authentication control is one of the effe ctive technical controls. By user identification and authentication and device identification and authentication controls, the agency can address the issue of unauthorized access. The identification and authentication procedures and guidelines in the agency require that each device is identified and authenticated before a connection is established. Confidentiality and security can easily be breached through intruding devices. The agency has a device identification and authentication procedure in place that is guided by the IRM of IRS.

Monday, February 10, 2020

Advantages and Disadvantages of Pre-Coding Assignment

Advantages and Disadvantages of Pre-Coding - Assignment Example I cannot oppose the fact highlighted by Rousseau that indeed pre-coding is part and parcel of each research. The point is further made clear that pre-coding is a foundation of early planning and maintaining focus on essential parts of the research. I can add that pre-coding enables elimination of unwanted or unnecessary information that can, in turn, be misleading to the researcher and the readers. On the other hand, Rousseau failed to mention the disadvantages of pre-coding, but I think it is because he noted more of its benefits than the drawbacks it will bring in the topic of discussion. I find Donna’s arguments over the advantages of pre-coding to be very rational. To her, pre-coding is not just an activity, but a skill to be mastered by every researcher if he or she wants to summarize the data and at the same time retain all the vital data. Just like she refers to Patton’s (2002) suggestion on the process of organizing data, so do I strongly support that four steps are a must. Even though she argues that its disadvantage is that it works well only in a large amount of data, this may be a challenge and an opportunity for the researcher to be keener when handling errors.