All aspects of life currently depend on information assurance and computer systems. Information assurance is important in areas such government agencies, the transportation sector, communication sector, banking organization, commercial operations as well as manufacturing industries. Information Assurance is a term that refers to the individuals, hardware components, software systems, policies, as well as procedures that provide security to information systems (Eric, 2014). The research study performs various activities to improve information assurance using modern IT infrastructure. The activities implemented include.
- Providing assurance that Information is secure and available when needed
- Assurance of data and information Integrity
- Use modern IT infrastructure for Authenticity and verification
- Use tools that assure data and information is kept confidential
- Guarantee provision of how origin of the data and information can be provided
The purpose of the research study is helping data and information owners, businesses, institutions as well as information assurance industries through the use of appropriate Industrial Control Systems (ICS) required for improving security in their systems. The study research is focused on information assurance aspects, aiming at providing measures required in network security, database security, security analytical tools as well as other frameworks required in dealing with security framework. Research work intends to provide a quantifiable approach for helping systems analysts and systems managers to make an informed decision in dealing with reducing risks of systems security breach. The research implements new technologies in research such as application whitelisting (AWL) for detecting and preventing any attempts of malware execution. The research is purposing in determining technology tools that support emergency preparing of information assurance industries in preventing data and information from health care systems by detecting frauds such as bioterrorism as well as breach personal privacy and confidentiality.
The document involved conducting research with the aim of suggesting new technologies a well as methods for improving security on links connecting various systems with security applications such as systems for detecting intruders. Research focuses on evaluating the role of IT in improving security analysis for secure decision-making. New applications such as information management, safe communication, and secure access to data and information shall be encouraged (Eric, 2014). Research shall also implement various ways of accessing barriers towards implementation of IT proving methods and strategies to overcome barriers to technologies that can improve safety and quality of data and information access.
The research provides solutions to various cases involving data and information crimes. The paper provides various ways of integrating systems to provide e-security to prevent systems from internal attacks and external attacks. Almost all industries rely on database servers as well as human-machine interfaces in controlling, managing storing, distributing and disseminating data and information thus increasing the potential of executing malware (Victoria, & Riemenschneider, 2008). In reality, most of industrial computerized infrastructural systems are increasingly experiencing attacks such as viruses, worms, hackers, as well as data and information thieves. Each business requires their systems have their information safe and secure. Real-time businesses such as banking insurance industries as well as government agencies need to protect their systems as well as clients from computer frauds. Information requires total security from denial of services attacks that may lead to delaying sensitive transactions (Victoria, & Riemenschneider, 2008). Similarly, issues such as data and information theft can be disastrous to organizations and clients.
Many cases have been reported concerning data and information stealing that leads to further stealing of client’s money from personal accounts or reveal trade secrets. Information stealing has been linked with constant blackmailing businesses as well as individuals. In case data and information from government sites get into hands of unauthorized people, it can result in a breach of security, confidentiality, and rights.
Action research refers studies conducted by a practitioner with a purpose of improving a particular working condition or efficiency of operations. The importance of conducting a research study is solving a problem encountered by the society (David, 2005). The practitioner investigates a specific phenomenon through interacting with workers or experts in the field of research. It is a process of learning through conducting investigations with a purpose of understanding particular field and gaining skills, experience, and knowledge needed in that field. It involves making inquiries, attending seminars, workshops as well as meeting with experts and professionals. Systematic observations and step by step data and information collection are involved for further decision-n making and reflection.
Kurt Lewin invented the step-by-step process of action research in 1946. According to Lewin, it involves inquiry of actions. It is a process implemented through a cycle of repeating stages in which researcher improves the practice through the systematic taking of research in the field. Lewin described the process of stages as involving planning, implementing, describing, and evaluating improved change. It is usually applied in different fields such as improving social activities like sports, improving education sectors like formulating new curriculum, developing particular aspects and philosophies. Most of the early applications included bringing changes in administration, community development, organization changes, and teaching
It has four stages namely planning, acting, observe, and reflection. In the planning, stage researcher determines problems to be solved. The stage determines steps to take to solve the problem as well as defining methods to use to ensure the successful solution is implemented. The second step is action stage where the agreed procedures are taken and implemented. During the observation, stage research conducts data and information collection as well as gathering appropriate knowledge to facilitate the occurrence of effective and efficient change. The fourth step deals with reflection stage whereby researchers analyze data and information, discuss findings, as well as determining the extent in which a particular action-n has helped in solving the problem. Through reflection, further decisions are made to determine further plans and next steps. The cycle begins and continues (David, 2015).
The methodology addresses various topics and sections of research through mutual concern. The research is based on learning through enquiry based on a sharing knowledge to perform the research. The methodology allows researchers involved to participate in various methods. The knowledge involves sharing of various controls over the research processes. Promotes teamwork and social networks especially min raising attributes of sharing ideas during decision making (****, 2000).
Action research methodology will facilitate effective achievement of purpose of the study. Through action research methodology, I shall have effective time to develop quality and acceptable security measures that guarantee data and information confidentiality, integrity, and availability. Action research is a procedural approach thus providing best platform for learning new insights, ideas, and skills on how to apply modern technologies in the information assurance.
David G. (2015). Doing Research In Real World.
David T.(2005). Action research: a methodological introduction.
****, B. (2000) A beginner’s guide to action research.
Eric H. (2014). Introduction to Information Assurance.
Victoria S & Riemenschneider (2008). Information Assurance Cases: Problems and Approaches.
Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in custom speech writing companies services. If you need a similar paper you can place your order from affordable term papers services.