top of page

Enterprise Information Assurance

Assure information and manage risks related to the use, processing, storage, and transmission of information. Topics include assurance of integrity, availability, authenticity, non-repudiation and confidentiality. Students will gain a firm understanding of information-related risk management in cyber and physical systems. Hands-on exercises and practice opportunities will be provided to students.

Cybersecurity Deliverables
Reflection

Businesses, corporations, conglomerates, whether there's 5 employees to thousands ​of them on the payroll, these companies rely on technology to safeguard their information from unauthorized users. The Enterprise Information Assurance course demonstrates the steps in protecting information systems which include the 5 main areas of this; Integrity, Availability, 

Authentication, and Nonrepudiation. These concepts are also used by the US government in order to keep their data secured. 

The following samples of work reflect this.

The ITIL Framework: 

The Information Technology Infrastructure Library (ITIL) is a set of detailed practices for IT service management (ITSM) that focuses on aligning IT services with the needs of businesses. This also reflects how important it is for a business to have a cyber policy put in place. 

TJX Security Breach: This is a case study that discussed the events how a significant data breach for the company TJMaxx impacted them along with sensitive customer data information. Unfortunately, TJX’s lack of security consisted of the failed requirement to have strong passwords, updating security on networks, limit wireless access, and the failure to detect and prevent unauthorized access.

Wells Fargo Cybersecurity Assessment: This capstone project focuses on the bank, Wells Fargo, where my team was a assign to create a written policy regarding the creation of a cybersecurity risk assessment. The importance of this is to ensure an assessment that identifies vulnerabilities and exploits within the company while following up on the accountability. Without this, Wells Fargo information systems are exposed to vulnerabilities, security breaches, and are liable for the suppliers that could result to legal action.

IA in the M&A Process: Various sectors of a business have become increasingly vulnerable from the lack of cybersecurity due diligence and it’s important for these companies to become aware of the issue. During the M&A process, it’s crucial for businesses to have a strong cybersecurity framework in place to detect intruders and prevent security breaches from happening. By doing so, customer data is prevented, the company’s reputation is protected, and the network is secured.

​

bottom of page