Preview

Research on Security

Powerful Essays
Open Document
Open Document
4956 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Research on Security
1. Most security plans start with infrastructure. If you were going to develop a Security plan from scratch, where would you start? Explain your answer.
To develop a security plan from scratch, there are three steps which I would consider to implement first in the plan. a) Business impact analysis (BIA) and risk assessment
The first question is to understand the impact of a loss or reduction of business functionality. I would first understand most critical assets and threats of the organization through BIA and risk assessment exercise. This will facilitate to create a plan to determine how to be most effective tactically, and achieve strategic success. b) Assess the Situation: How Will this Work?
With a snapshot business function and risk, it is time to assess the resources. This includes existing resources (personnel as well as software, etc.) and potential resources (budgeted items, management’s flexibility for unplanned spending, etc.).After identifying resources and the gaps between them, clear vision of current situation is being assessed, and company’s overall posture. As this picture develops, it becomes easy to map out how to address the gaps using those resources. In assessment phase, find out the annual business and department objectives, and ask them what they need to be successful. Then start thinking about how program can assist them in those goals. c) Get to know the family
It is important to figure out who the right people are in organization so as to approach them for executing the security system. Showing other groups how their jobs can be easier while helping to manage risk and protect the company’s assets and can effectively extend the security. For example, Human Resources department are essential because it manages the relationship between a company and its employees. So when HR department performs function such as employee misconduct, terminations, and other delicate issues will surely consider to include information security



References: 1. Book – Security Architecture Design, Deployment and Operation by King 2001 edition 2. Adrian McCullagh and William Caelli, “Non-Repudiation in the Digital Environment,” First Monday, volume 5, number 8, August 2000, http://firstmonday.org/issues/issue5_8/mccullagh/index.html. 3. http://en.wikipedia.org/wiki/Business_telephone_system 4. http://www.ehow.com/list_7191710_advantages-pabx.html 5. http://technet.microsoft.com/en-us/library/cc960627.aspx 6. http://www.giac.org/paper/gsec/247/non-repudiation-simple-understand-difficult-implement/100770 7. http://en.wikipedia.org/wiki/Computer_network 8. http://en.wikipedia.org/wiki/Network_security

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Upgrade- Establish endpoint security updates (Antivirus, Malware protection). Upgrade all desktop and laptop Operating Systems. Once all systems are running on the same system, it will be easier to set up security protocols across the board. Make sure Patch updates are being made regularly, set up a specified time frame to check for and install new patches and updates.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    3. Protect your plan, following the guidelines outlined in Chapter 17 from Cole (Management Theory and Practise 5ed)…

    • 1949 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Is 305 Week 4 Quiz

    • 415 Words
    • 2 Pages

    List four of the seven steps for a contingency plan based on the NIST 800-34 standard. Develop a BIA, develop a recovery strategy, preventive controls identified, test the plan and train individuals.…

    • 415 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    10. In order to craft back-up and recovery procedures, you need to review the IT systems, hardware, software and communications infrastructure needed to support business operations, functions and define how to maximize availability. This alignment of IT systems and components must be based on business operations , functions, and prioritizations. This prioritization is usually the result of a risk assessment and how those risks, threats, and vulnerabilities impact business operations and functions. What is the proper sequence of development and implementation for these following plans?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 4 Quiz

    • 419 Words
    • 2 Pages

    The Web server must have reliable Internet access. If Internet access fails, the customer cant access the Web server. Web server availability…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    All business needs to take action which helps them keep good position on the market. Before taken any action analysis has to be made. Answers and data which were obtained during analysis can help chose strategies, which help achieve objectives.…

    • 1210 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    A security policy defines limitations on individual behavior or system performance and details activities that are permitted, controlled or prohibited within the company. In order for policies to be effectual, senior management must endorse them, they must be communicated to all employees, undergo recurring reviews, and be assessed for usefulness. A security program encompasses all of the required pieces necessary to successfully protect a business. It should include policies, requirements, standards and procedures. Security plans should be operative at all levels of a corporation to be effective. Management should communicate a formal explanation of what is acceptable by all employees. Management should also clearly dictate what the consequences of noncompliance are. Organizations can use the ISO-27002:2005 as an outline to create a security policy.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Next we have Emotional Intelligence, which means you have to build your self-alertness, self-management, social alertness and correlation management. Emotional intelligence is critical. Know that as a leader, you are…

    • 1345 Words
    • 4 Pages
    Better Essays
  • Good Essays

    ms hall

    • 624 Words
    • 2 Pages

    Re evaluate and define your mission and goals. Establishing an innovation team or a R and D department. Teams and managers should have regular meetings with an agenda to implement your business strategy, improve communication and use critical thinking as a method to problem solving. Ineffective teams and quality assurance and improvement should be monitored regularly to address future…

    • 624 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Different scenarios demand varying strategies for the business. Of course the strategy must be re-evaluated whenever the business undergoes changes in its financial circumstances.…

    • 2680 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    If the solution involves changes to the existing business operation(s) the usual starting point is to create a model of this, identifying the current processes. Process modelling is a useful…

    • 3414 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Strategic planning

    • 4891 Words
    • 18 Pages

    George (1997) Following is the five step model to analysis effects of business plan, develop future strategic options and options to form basis of future organizational strategy. This five step model was presented.…

    • 4891 Words
    • 18 Pages
    Good Essays