Preview

Importance of Security Planning

Better Essays
Open Document
Open Document
959 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Importance of Security Planning
Importance of Security Plans
William Kepke
DeVry University
SEC 440
10 / 08 / 12

There are several possible threats that can affect the integrity of any organizational network. Many of these threats can come internally from the users of the system. Internal attacks can be intentional, accidental, or simple human error. Some examples of accidental infection can come from a user opening an email containing a virus, installing new software, altering desktop configuration, visiting precarious web sites, leaving the area of their desktop without logging out of their account, or simply losing or leaving their personal wireless device unattended. Organizations should have specific policies covering each of these topics defined within their security plan document. Also, standard operating procedures should be available for technicians to follow whether performing day to day tasks, or responding to an incident. It is a fact that emails are commonly used to perform what is known as social engineering. According to Dictionary.com, the aim of social engineering is to trick people into revealing passwords or other information that compromises a target systems security. Because of this fact, organizations must create a user policy strictly dedicated to email use conducted within their network. Employees must understand that any communication created through email should follow the same considerations as correspondence containing an official corporate letterhead. It must also be made aware that any email composed and sent through an organizational email server falls under the responsibility of the company. This means that the company may be held liable for the actions and contents of the email. Although emails follow many of the same rules as postal mail, voice mail, or faxes, there are some significant differences which must be considered regarding the security of information. The route that an email takes can be somewhat unpredictable, meaning that it



References: Easttom, C. (2006). Network defense and countermeasures: principles and practices. Upper Saddle River, NJ: Pearson Prentice Hall. Greene, S. S. (2006). Security policies and procedures: principles and practices. Upper Saddle River, NJ: Pearson Prentice Hall. Social Engineering. Retrieved October 5, 2012, from http://dictionary.reference.com/browse/social+engineering?s=t

You May Also Find These Documents Helpful

  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    To develop network security strategies that will ensure that the organization's network is protected from both internal and external security risks. A summary of the steps I can take to mitigate the risk in the following areas: Denial-of-Service attacks (DoS), Distributed Denial-of-Service attacks (DDoS), Masquerading and IP Spoofing, Smurf attacks, Land.c attacks, Man-in-the-Middle attacks.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has to have antivirus and malware protection installed on them. Express strict access control polices and standards. And mandate annual security awareness training for all employees…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The user domain is the employees who access the organization network and IT infrastructure. There should be a policy in place that defines what the employee can do inside the organization. A employee handbook would be beneficial and should list all of the guidelines and procedures. Many smack threats can be avoided by the lack of knowledge and security violations. Reminders like emails and periodic meetings can help employees be more aware about threats and technology updates. If there is a security violation the employee should be under watch and have a meeting with their supervisor. Employee’s daily usage should also be supervised periodically to…

    • 347 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    User domain is essentially the people who access the information system. User domains tend to receive risk due to the user’s carelessness due to lack of awareness, not caring for policies, and security violations. These can easily be rectified with training. Conduct security awareness training, display security posters around the office, and send email reminders to keep the policies fresh in the employee’s mind. Another common threat is caused by employee misuse of the system. Employees might insert USB drives, or download photos music and videos. These items might contain virus’s which in turn damages the system. The USB ports should be disabled and content filtering and antivirus scanning should be enabled.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    The Company reserves and intends to exercise the right to review, audit, intercept, access, disclose, and use all messages created, received, or sent over its e-mail system for any purpose. The contents of e-mail may be disclosed and used by the company to protect its rights and/or property without the permission of the employee, in the company’s discretion.…

    • 696 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Leg 500 Assignment 1

    • 939 Words
    • 4 Pages

    Emails are something that’s getting sent on a daily basis all day every day. With having to set up email accounts, which ask for your social security numbers are basically your fingerprint, is an open door for people to find out any information they want to about you. Typically, some companies use company email addresses for memos that need to get to employees or company executives or any personal emails that need to be shared. With company emails come company email policies that will explain why the emails were provided and what is not acceptable content to pass through email. In the Michael A. Smyth v. The Pillsbury Company case, Mr. Smith and another employee were terminated for exchanging emails that made threats to sales managers and made rude comments about certain company events. Mr. Smith sued the Pillsbury Company for violating public policy by committing a tort known as “invasion of privacy”. In the policy, Pillsbury stated that all employee emails were going to remain confidential and privileged including plaintiff. On these grounds, Smith thought he had a case against the Pillsbury Company, but as the defendant (Pillsbury) pointed out, the company wants to keep their employees safe so the frequent email checks to ensure that…

    • 939 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Universal Protection Agency is a 20 person firm specializing in providing safety and security. Only 8 of the 20 employees will be working on Mr. Smith’s protection plan due to other clientele requiring the services of the other employees. Our staff consists of individuals with various skills and/or talents. Each of our employees have received Masters Degrees in their areas of expertise and have years of experience in providing protection to individuals, families, organizations, and communities. We provide Central Intelligence Agency (CIA) like security as many of our employees are former CIA agents or from other law enforcement agencies. Government officials, sports entertainers, and famous people frequently hire us to provide security for their home, business, or travel.…

    • 1852 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Having the proper security measures is very critical when running a business. It can be very expensive for an organization to keep an updated security system but in the end, it is well worth the money. No manager should want to even take the risk of letting hackers or viruses into the organizations information system. To fully understand why it is critical to have security measures, you first need to understand the different threats a network can face. Having a good secure network can prevent things such as malware, social engineering attacks, spam, and phishing. All of these can be very dangerous and damaging to your network. As a manager it is also very important to have a thorough security policy that states the precautions and also the steps to take in case of a security breach. When choosing security controls for your business you must consider three things; what security controls does your business need to safeguard the information systems, the safety and protection that security controls should provide, and existing security controls and how they have been implemented.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    A security policy defines limitations on individual behavior or system performance and details activities that are permitted, controlled or prohibited within the company. In order for policies to be effectual, senior management must endorse them, they must be communicated to all employees, undergo recurring reviews, and be assessed for usefulness. A security program encompasses all of the required pieces necessary to successfully protect a business. It should include policies, requirements, standards and procedures. Security plans should be operative at all levels of a corporation to be effective. Management should communicate a formal explanation of what is acceptable by all employees. Management should also clearly dictate what the consequences of noncompliance are. Organizations can use the ISO-27002:2005 as an outline to create a security policy.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Throughout our lives there are many obstacles we have to face, some may shape us and some may scar us years onward. My story is a common one that countless people have faced that got in the form of disguise that isn’t always pretty. Approximately ten years ago when I was a regular third grader, when life seemed to be rosy and full of fairytales, that nothing can be worse than not having your favorite meal at lunch, I had a theatre performance that changed my life.…

    • 723 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Death with Dignity

    • 1291 Words
    • 6 Pages

    Physician assisted suicide has long been a topic of debate. Those who are in favor and…

    • 1291 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Security is one of the most important things on the network, the staff needs to practice on the field of security in the network, as they need to learn and awareness on the dangers of network security, You must deal with their recommended, for example, they should not open e-mail facilities, except in the case of trust and find out the source of the sender. They must also training on how to recognize and identify the hackers, phishing attempts, there several ways Prowler are used, for example, asks the user name and password of the sites that show like areal sites .…

    • 914 Words
    • 4 Pages
    Good Essays