Preview

Security Monitoring Activities

Better Essays
Open Document
Open Document
1074 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Monitoring Activities
This paper will describe the security monitoring activities that should be implemented and carried out in an organization on both internal and e-commerce applications. Managing risk is very crucial and plays an integral part in an organization especially to those that considers data as one of their asset. In this time and age, good risk management is the basis in achieving good business and attaining the company’s goals high ROI (Return On Investment). Security monitoring is associated and linked to other project management process to make sure that risk are identified, handled and effective patch up strategy is in place and ready to carry out. (Cooper, et.al, 2005) Generally in technology, security monitoring plays an integral part of implementation as outlined through risk management for both internal activities that includes payroll, human resources, accounting and inventory; and external activities that includes sales and marketing.
Monitoring Process Monitoring process should be implemented as part of a routinely tasks. Risk can be prioritized based on the outcome and the effectiveness of action that needs to be carried out. The process of monitoring security plays an important function in any organization’s computer use both internally and externally. Security monitoring is used by companies to set boundaries for usage and screen the contents that is being transmitted both to-and-from the company. The process of continuous security monitoring across the enterprise has grown its efforts based on the security authorization process and include the post-authorization period. The objective of the monitoring process is to determine if security controls in the system stays effective over period f time in the light of uncertainties and events that happens within and as well as the environmental aspects in which the system operates.
Internal IT Security monitoring for internal aspects of the organization like payroll, human resources, accounting and



References: Cooper, D., Grey, S., Raymond, G., and Walker, P. (2005) Monitoring and Review. Project Risk Management Guidelines: Managing Risk in Large Projects and Complex Procurements. Greenstein, M. & Vasarhelyi, M. (2002) Risk of Insecure Systems. Electronic Commerce: Security, Risk Management. 2e. Ch. 7 Harris, S. (2010) Information Security and Risk Management. All-In-One CISSP Exam Guide. 5e. Ch. 3

You May Also Find These Documents Helpful

  • Good Essays

    Global’s risk management approach was a key factor in the success of their efforts to protecting their client’s information assets. By utilizing risk management strategies Global was able to detect vulnerabilities where there were the most likelihood of threat and implement controls to detect and/or prevent breaches of the security controls. The risk management process ensured Global addressed security measures at all levels of the…

    • 515 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    References: 267. Beijtlich, R. (n.d.). The Practice of Network Security Monitoring: understanding incident detection and response. [Books24x7 Version.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Satisfactory Essays

    Testing and monitoring security controls can come in different factors. Monitoring security is by far important because you need to know what’s going on before you can announce it. Networking abuse is by far the biggest baseline anomaly. For employees who have access to the internet, the network can be used to stream media, to access social websites and to download unauthorized software or free software which has vulnerabilities a long with that.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Statistics Lab week 6

    • 3844 Words
    • 14 Pages

    Use of the Internet has resulted in recognition that information technology security is of major importance to our society. This concern seems relatively new in healthcare, but information technology security is a well established domain. A large body of knowledge exists that can be applied to protect healthcare information. A general understanding of security can be obtained by understanding: 1. Security Components 2.…

    • 3844 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Proj595 Risk Paper

    • 1690 Words
    • 7 Pages

    Cited: Cooper, D. F., Grey, S., Raymond, G., & Walker, P. (2005). Project Risk Management Guidelines:…

    • 1690 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Security has become increasingly complex, and is an important consideration when building, upgrading, and maintaining the hardware, software, and infrastructure of an information technology department. Security contains many aspects. Physical security, virtual security, data integrity, accountability, business continuity, and auditing are among topics that address different security aspects and concerns. Security must be addressed not only regarding internal users and issues, but must also be resolved from external threats that are presented when connecting an organization’s network to the Internet and various external customers, vendors, and outside agencies. This paper will distinguish between internal and external threats to the physical locations where resources are located, as well as the virtual resources that are accessible electronically from inside or outside of the organization. Strategies that are used to protect the physical and virtual resources will also be presented, as well as how those threats are defined and distinguished. As the capabilities and complexity of information technology systems have progressed, security has evolved into a specialized information technology field of study. The importance of building and maintaining the proper security controls can have a direct correlation to the success or failure of an organization.…

    • 1833 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Risk is a major part of any investment. The major drive behind investment is to gain profit. If there was no risk on a project that had a 20% return on it then everyone would be investing. The amount of risk a project faces comes down to the nature, scope of works, market need, and future predictions. The more investigation of the preliminaries and exploration of all options will generally see more risks becoming assessed and contingency plans in place. A risk analysis can be used across all areas of this development and broken down to smallest of details. We will only be exploring the major aspects relating to the financial returns in this analysis that may have a major impact on LSC Projects return if they were to occur.…

    • 2912 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Monitoring System

    • 1749 Words
    • 7 Pages

    This system is just use when theres a client who wants to purchase an item…

    • 1749 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    example

    • 257 Words
    • 2 Pages

    The Senior Network Security Engineer is an IT professional with responsibility for designing, implementing and supporting network security solutions for the organization. In collaboration with members of the Architecture and Engineering, Systems Administration, Database Administration, IT Development and Application Support teams, the Senior Network Security Engineer will implement practical solutions to secure the bank's internal and external network infrastructure.…

    • 257 Words
    • 2 Pages
    Good Essays