maurice kabeireho | Capella University (original) (raw)

Uploads

Papers by maurice kabeireho

Research paper thumbnail of Innovating IT System Life Cycle Management

Abstract Software System development life cycle management involves all process, procedures and ... more Abstract
Software System development life cycle management involves all process, procedures and policies as well as any activities in developing information systems through a multistep of processes that include requirements investigation, planning, modelling, going all the way to the systems development, testing, implementation, maintenance, and up to the end of a system’s life and eventual migration to a new system. Along the way, the process involves using a number of tools, and procedures as well as a set of skilled personnel such as architects, analysts, programmers, testers and users who work together to create the millions of lines of custom-written codes that drive today’s complex systems. Also the process involves a constant monitoring and process improvements so as to enable the producing organization keep within the required regulations and producing in line with the customer’s expectations. It is thus a rigorous process that involves uses of the industry best practices and requires specialized skills to achieve its goals. This paper thus sets out to explain the various management stages and processes that the system undergoes throughout its life cycle, including the servicing and process improvement processes as well as migration to the new system.

Research paper thumbnail of Implementing IT Governance: An IT Security Perspective

Abstract Considering today’s increased threats to the IT infrastructure that come from both withi... more Abstract
Considering today’s increased threats to the IT infrastructure that come from both within and outside the network, network and security administrators with support from top management are tasked with an uphill role of keeping secure the information and data as well as the entire IT infrastructure on which they are housed. An attack that would lead to a security breach can cause the organization very devastating circumstances that could include but not limited to disruptions in business operations that can lead to poor productivity and reduced profitability, but also most important is that it can lead to loss of customer satisfaction, poor image as well as loos of reputation all of which can be very costly to the organization. This paper therefore, gives a brief background of information security, navigates through the current security trends and looks at the steps that organizations, both regulatory and non-regulatory mid-size firms, can take to ensure that their information systems and the data they store are safe and secure from malicious attacks. The paper looks at the various steps of risk and security assessment, walks through the risk management processes, current challenges and limitations before tackling the solutions and future direction of IT information security.

Research paper thumbnail of Implementing IT Governance: An IT security Perspective

Abstract Considering today’s increased threats to the IT infrastructure that come from both with... more Abstract
Considering today’s increased threats to the IT infrastructure that come from both within and outside the network, network and security administrators with support from top management are tasked with an uphill role of keeping secure the information and data as well as the entire IT infrastructure on which they are housed. An attack that would lead to a security breach can cause the organization very devastating circumstances that could include but not limited to disruptions in business operations that can lead to poor productivity and reduced profitability, but also most important is that it can lead to loss of customer satisfaction, poor image as well as loos of reputation all of which can be very costly to the organization. This paper therefore, gives a brief background of information security, navigates through the current security trends and looks at the steps that organizations, both regulatory and non-regulatory mid-size firms, can take to ensure that their information systems and the data they store are safe and secure from malicious attacks. The paper looks at the various steps of risk and security assessment, walks through the risk management processes, current challenges and limitations before tackling the solutions and future direction of IT information security.

Research paper thumbnail of A Post Implementation and Evaluation Report (PIER)

Research paper thumbnail of Public Key Cryptography and Information Security: A Literature Review

Information is a valuable asset and must be kept confidential, have integrity and be available in... more Information is a valuable asset and must be kept confidential, have integrity and be available in order to be worth its name and be credible. Therefore in a bid to ensure this, strong mathematical algorithms, that involve the use of a pair of keys which are different from one another (public and private) like the ones that are used by RSA and CISCO to mention but a few, are employed and used in the processes of data encryption and decryption. This system of using two keys, one public and the other private that are different but mathematically related, to secure information has given rise to the concept of Public Key Cryptography; a concept that attempts to use key management in ensuring the security of information and data against hacker's attacks while both in storage and moving over the internet from one place to another. This paper thus, sets out to analyze the working of the public key cryptography and find ways in which it can be improved to give better information security.

Research paper thumbnail of Innovating IT System Life Cycle Management

Abstract Software System development life cycle management involves all process, procedures and ... more Abstract
Software System development life cycle management involves all process, procedures and policies as well as any activities in developing information systems through a multistep of processes that include requirements investigation, planning, modelling, going all the way to the systems development, testing, implementation, maintenance, and up to the end of a system’s life and eventual migration to a new system. Along the way, the process involves using a number of tools, and procedures as well as a set of skilled personnel such as architects, analysts, programmers, testers and users who work together to create the millions of lines of custom-written codes that drive today’s complex systems. Also the process involves a constant monitoring and process improvements so as to enable the producing organization keep within the required regulations and producing in line with the customer’s expectations. It is thus a rigorous process that involves uses of the industry best practices and requires specialized skills to achieve its goals. This paper thus sets out to explain the various management stages and processes that the system undergoes throughout its life cycle, including the servicing and process improvement processes as well as migration to the new system.

Research paper thumbnail of Implementing IT Governance: An IT Security Perspective

Abstract Considering today’s increased threats to the IT infrastructure that come from both withi... more Abstract
Considering today’s increased threats to the IT infrastructure that come from both within and outside the network, network and security administrators with support from top management are tasked with an uphill role of keeping secure the information and data as well as the entire IT infrastructure on which they are housed. An attack that would lead to a security breach can cause the organization very devastating circumstances that could include but not limited to disruptions in business operations that can lead to poor productivity and reduced profitability, but also most important is that it can lead to loss of customer satisfaction, poor image as well as loos of reputation all of which can be very costly to the organization. This paper therefore, gives a brief background of information security, navigates through the current security trends and looks at the steps that organizations, both regulatory and non-regulatory mid-size firms, can take to ensure that their information systems and the data they store are safe and secure from malicious attacks. The paper looks at the various steps of risk and security assessment, walks through the risk management processes, current challenges and limitations before tackling the solutions and future direction of IT information security.

Research paper thumbnail of Implementing IT Governance: An IT security Perspective

Abstract Considering today’s increased threats to the IT infrastructure that come from both with... more Abstract
Considering today’s increased threats to the IT infrastructure that come from both within and outside the network, network and security administrators with support from top management are tasked with an uphill role of keeping secure the information and data as well as the entire IT infrastructure on which they are housed. An attack that would lead to a security breach can cause the organization very devastating circumstances that could include but not limited to disruptions in business operations that can lead to poor productivity and reduced profitability, but also most important is that it can lead to loss of customer satisfaction, poor image as well as loos of reputation all of which can be very costly to the organization. This paper therefore, gives a brief background of information security, navigates through the current security trends and looks at the steps that organizations, both regulatory and non-regulatory mid-size firms, can take to ensure that their information systems and the data they store are safe and secure from malicious attacks. The paper looks at the various steps of risk and security assessment, walks through the risk management processes, current challenges and limitations before tackling the solutions and future direction of IT information security.

Research paper thumbnail of A Post Implementation and Evaluation Report (PIER)

Research paper thumbnail of Public Key Cryptography and Information Security: A Literature Review

Information is a valuable asset and must be kept confidential, have integrity and be available in... more Information is a valuable asset and must be kept confidential, have integrity and be available in order to be worth its name and be credible. Therefore in a bid to ensure this, strong mathematical algorithms, that involve the use of a pair of keys which are different from one another (public and private) like the ones that are used by RSA and CISCO to mention but a few, are employed and used in the processes of data encryption and decryption. This system of using two keys, one public and the other private that are different but mathematically related, to secure information has given rise to the concept of Public Key Cryptography; a concept that attempts to use key management in ensuring the security of information and data against hacker's attacks while both in storage and moving over the internet from one place to another. This paper thus, sets out to analyze the working of the public key cryptography and find ways in which it can be improved to give better information security.