Active vs Passive Security Threats Explained A threat as described by Workman, Phelps & Gathegi (2013) in relation to information security, view a threat to the potential of a security breach in relation to a vulnerability. Vulnerabilities as described by Workman, Phelps & Gathegi (2013), is an artifact of a system in …
Read MoreIT Requirements for an E-Commerce Affiliate Marketing Business
May 17, 2026 / · 10 min read · e-commerce affiliate marketing information systems infrastructure data management ·IT Requirements for an E-Commerce Affiliate Marketing Business Katalogs Plus is a new business planning to launch in the next year. The company mission is to build e-commerce mobile applications and websites that sell merchants products and services. Affiliate marketing product and service data feeds will be used to …
Read MoreSix-Phase Information Assurance Risk Assessment Process
May 16, 2026 · 7 min read · information assurance risk assessment security mitigation digitalglobe ·Six-Phase Information Assurance Risk Assessment Process The organization DigitalGlobe has been chosen for an abbreviated assessment. The paper will discuss the considerations for decreasing risk and mitigating assessed vulnerabilities. Information covered will be a summary of the assessed challenges in the information …
Read MoreInformation Assurance Capability Maturity Model Explained
May 15, 2026 / · 6 min read · information assurance capability maturity isa-cmm risk mitigation security ·Information Assurance Capability Maturity Model Explained The organization DigitalGlobe is the organization that has been chosen for an abbreviated assessment. The paper will discuss the considerations for decreasing risk and mitigating assessed vulnerabilities. Information covered will be a summary of the assessed …
Read MoreBuilding an Information Assurance Plan with ISO 27002
May 14, 2026 / · 6 min read · information assurance ISO 27002 risk management incident response disaster recovery ISMS ·Building an Information Assurance Plan with ISO 27002 This proposal has been assembled to address the void of a Information Assurance (IA) program at the Heavy Metal Engineering (HME) Corporation. The proposal will layout an IA plan for HME that includes an overview of IA requirements and discusses the fundamentals of …
Read MoreIoT Security Threats: Authentication and Denial of Service
May 14, 2026 / · 3 min read · internet of things iot security denial of service authentication research ·IoT Security Threats: Authentication and Denial of Service Recent Gartner research predicts that there will be more than 2.9 billion connected IoT devices in consumer smart home environments in 2015. These connected devices could provide a much larger surface for attackers to target home networks (Barcena & Wueest, …
Read MoreTrust, CIA Triad, and Safeguards in Information Security
Mar 14, 2026 / · 5 min read · information security information assurance organizational security ISO27001 cryptography access control physical security trust ·Trust and Safeguards in Information Security: An Organizational Perspective The word "Trust" is defined as related to information security. Based on ones understanding of securing your environment, what are some of the common safeguards is recommend to ensure trust is viable in an organization? Defining Trust in …
Read MorePersonnel and Physical Security in Information Assurance
Mar 13, 2026 / · 4 min read · information assurance personnel security physical security security policies environmental security access control background check ·Personnel and Physical Security in Information Assurance Personnel Security Process and procedures are needed to protect personnel security as Jacobs (2015) points out. The employee responsibilities need to be defined, and the employee must qualify for the role so that the risk is reduced from theft, fraud, or misuse …
Read MoreRisk Management in Security Systems Engineering Explained
Mar 12, 2026 / · 2 min read · risk management information assurance security engineering FISMA cybersecurity threats and vulnerabilities security controls systems engineering ·Risk Management as a Critical Element of Security Systems Engineering Explain how Risk Management is a critical element to the Security Systems engineering. Also disucss how Risk Management is a critical component to the Security Systems engineering. Why is Risk Management a critical element of Security Systems …
Read MoreSystems Engineering and Information Security in the SDLC
Nov 5, 2025 / · 3 min read · systems-engineering information-assurance agile-development cybersecurity ISO-27001 CICD-pipeline software-security requirements-engineering ·Systems Engineering and Information Security Integration in the Development Lifecycle Topic: Systems Engineering and Information Security Systems Engineering Overview Systems engineering centers on defining the client's requirements and functionality early in the development cycle. Then one refines and documents the …
Read More