Case Study in Information Security
How is the TMS managed and maintained at TKU?
I agree that the role of the Computing Systems department is important as it deals with the technical end of the transaction management system (TMS). Due attention is paid to the server management-related practices, the ability to set up off-campus merchants, ensuring on-campus connections, and resolving hooting networking issues. Corporate cultural issues should be considered to provide control over the system’s functioning. Undoubtedly, there is a need for developing strong leadership to initiate a reliable security program that will help to improve the security culture across the company, highlighting the role of security behaviors of employees. In other words, the TMS is managed and maintained at TKU in a way that requires dependence on multiple divisions, including IT, Finance, and Administrative Support divisions. In order to improve the management of TMS at TKU, it is crucial to raise awareness among the users through training, strong access control, top management support practices, improved security culture, and strengthened security efforts.
How is the security structure of the TMS handled?
I have to agree that the TKU managed to deal with the security structure of the TMS effectively. The two different ways selected by the TKU authorities to handle the TMS allowed strengthening security efforts, providing access to the system mainly by authorized personnel. It is very important for an educational institution like the TKU to have a typical hierarchical structure for its system’s management and maintenance. Although the development of an effective security program was a complicated task, the university succeeded in it. Due to the proper monitoring of events, the system was based on the use of log files, which fostered technical safeguards. Besides, the use of security and disaster training allowed for the development of the proper IT skill that was needed to conduct the key operations. The security structure of the TMS was handled effectively because both the authorization to have access to the system and viewing events in the log files are reliable methods of security.
Works Cited
Ayyagari, R., Tyks, J. “Disaster at a University: A Case Study in Information Security,” Journal of Information Technology Education: Innovations in Practice, Volume 11 (2012): 85-96.