Preview

A CAREER AS AN INFORMATION SECURITY MANAGER

Better Essays
Open Document
Open Document
1356 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
A CAREER AS AN INFORMATION SECURITY MANAGER
A CAREER AS AN INFORMATION SECURITY MANAGER

BY

HECTOR CEDANO

Submitted to Ms. Cowling in partial fulfillment of the requirements for
Crim 231
Mon. Wed. Fri. 1:00
November 18, 2008

There are many fulfilling careers in Criminal Justice but the one I chose was the career of an Information security manager. First Information security is the protection of information and information systems from unauthorized access. The three main objectives of Information Security are protecting the confidentiality, the integrity and availability of the information. The way that technology is a main part of everyone’s life so it is important to have information security to protect the technology from being missed used. Organizations such as governments, military, financial institutions, hospitals, and private businesses store a lot of sensitive information about employees, customers, products, research, and financial operations. Protection of the information is top priority to be successful in any field. Effective Information Security uses security products, technologies, policies and procedures. Just using these tools does not guarantee that all problems will be solved or will provide an effective Information Security. With Information Security there is a tradeoff between security and usability. The more security you have the less usability is possible and the more usability then there is less security and there for the system has a higher chance of getting corrupted. The goal of an Information Security Manager is to provide an appropriate level of security and use. The position of Information Security Manager is a high-level security position, who reports to the Chief Information Security Officer. There is a need to have advanced technical skill, as well as management abilities. The Information Security Manager controls the Information Security Group, which includes staff, technology, projects, and incident response. There are many

You May Also Find These Documents Helpful

  • Better Essays

    There are several things a manager has to consider when running a business. He or she must ensure that the company does what it needs to meet the needs of the customer, the employees, and protect all personal information. One way is to ensure that there are proper security measures to protect all data by making sure the employees are trained and understand the security protocols. Another way is by using the Systems Development Life Cycle (SDLC) method to help maintain the systems they have or need to conduct business. Businesses that follow the steps in the SDLC method and maintain a good information security system will keep the trust of its customers ensuring it remains profitable.…

    • 2427 Words
    • 7 Pages
    Better Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Having the proper security measures is very critical when running a business. It can be very expensive for an organization to keep an updated security system but in the end, it is well worth the money. No manager should want to even take the risk of letting hackers or viruses into the organizations information system. To fully understand why it is critical to have security measures, you first need to understand the different threats a network can face. Having a good secure network can prevent things such as malware, social engineering attacks, spam, and phishing. All of these can be very dangerous and damaging to your network. As a manager it is also very important to have a thorough security policy that states the precautions and also the steps to take in case of a security breach. When choosing security controls for your business you must consider three things; what security controls does your business need to safeguard the information systems, the safety and protection that security controls should provide, and existing security controls and how they have been implemented.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Security Breach at Tjx

    • 288 Words
    • 2 Pages

    Assignment 3 requires you to critically review the assigned case study and write a report…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The advancement of technology is affecting everyone in their everyday lives whether we want to accept it or not. The criminal justice system is no stranger to this; it has created more work for them and in order for them to keep pace with criminals they have to continue to evolve and stay current with the progress of technology. Technology changes from one day to the next and in order to fight and prevent crime the criminal justice system must stay current with the many changes of…

    • 849 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The historical development of private security in the United States has changed drastically over the centuries. The need for private security has grown as well. There are many gaps and areas for intrusion within the current public law enforcement system, almost mandating the necessity for private security. As the need and expectations for the private security grows, so will the qualifications for these positions. Understanding the history of the industry development creates a way to learn from the past, and make necessary changes for the future. Private security is the backbone of the American culture, and will continually evolve to prevent and protect society from any type of potential harm.…

    • 1277 Words
    • 6 Pages
    Better Essays
  • Good Essays

    When a problem occurs, it is the responsibility of the computer security manager to carefully take the required steps to identify and resolve the security issues.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Better Essays

    In what ways could the new terminology and knowledge be applied to a career in the criminal justice system?…

    • 1206 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Unit 5 Assignment 5

    • 514 Words
    • 2 Pages

    ensuring awareness of information security threats and concerns, and the necessary steps to mitigate those threats; and…

    • 514 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In the following paper I will be showing you some careers in the Criminal justice field, their job description, requirements, and some other information needed to make up your mind and decide what career you want to do for the rest of your life. These are three of the many careers you can follow.…

    • 634 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The crossing point between components of the criminal justice system and criminal justice connections with surrounding society is constantly changing. For this assignment I will evaluate the past, present, and future trends. In addition I will discuss the recent and future trends and contemporary issues affecting the criminal justice system, and the value of the criminal justice system in a changing society. For instance there has been a trend in new technology that is used by criminals that the criminal justice system has to act in accordance with and combat.…

    • 1025 Words
    • 5 Pages
    Good Essays
  • Good Essays

    There are many components that make the Criminal Justice System of what it is today. Before this module I had no idea the process it takes to go from receiving the call at the 911 dispatcher and to get to the level at the Courts with the Judge and make a decision for the criminal, I will go over a small summary on it, in this essay. Thanks to this module I was able to understand the different duties of The Criminal Justice System, such as the dispatcher, police officer, police supervisor, detective, district and defense attorney, court judge, parole and probation officer, etc. I will go over some of these…

    • 934 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Criminal justice leaders need to interact and develop relationships with the communities and people directly affected by their actions and look and to find ways in dealing with crime and finding roots causes of why those people are involved in crime. By developing understanding and gathering information by the people and communities directly affected by criminal justice they can provide accurate way to solve those…

    • 612 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    In this document, I will describe and provide information about my intended career, Criminal Justice. I will research the coursework required to achieve a degree on this career.I will investigate all the necessary information needed to begin the Criminal Justice career andsuccessfully achieve a degree.…

    • 2619 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    What is the role of a criminal justice professional? There are numerous amounts of roles that a criminal justice practitioner plays. Depending on which section of the criminal justice system you are certified in, your studies ensures your specialty in your career field. In this particular essay, we will focus on the key social issues contributing to the service of the criminal justice practitioners, the role of the criminal justice professionals serving needs, and how the key social issues impact the role of the criminal justice professionals along with examples.…

    • 1194 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Responsibilities of Information Security Administrator include the management and supervision of use of security measures to protect data, and conduct of personnel in relation to the protection of data. Information Security Administrator responsible for defining security frameworks for existing and new systems. He is responsible for system security planning, developing, and implementing security policies across multiple platforms; ensures successful implementation and maintenance of the defined standards; ensures compliance of IT Security Policies; provides support in security management and security architect standards and documentations; manages and supports networking and security services in LAN, WAN and Internet network infrastructure; manages…

    • 301 Words
    • 2 Pages
    Good Essays