Studyspark Study Document

Security Program Network Risk Assessment Term Paper

Pages:7 (1927 words)

Sources:3

Subject:Crime

Topic:Security Breach

Document Type:Term Paper

Document:#81310452


Tracking normal activity patterns of users is essential to enable abnormal activity to be flagged. Also, unintentional user errors such as logging onto unsecure websites and opening up potentially infected documents must be flagged. Sending an email from an odd-looking address and seeing if employees open the email is one way to gage the relative wariness of employees. If employees open up the email, it staff can include a message warning them that this is just the kind of message employees should delete.

Creating 'backdoor' threats and viruses to attack a system, and see if it is vulnerable is one potential 'fire drill' that can be used by the organization to assess potential areas that can be compromised. General assessments of the knowledge of non-it and it staff of proper security procedures and the areas which can pose new threats are also essential.

Simple systematic procedures, such as requiring employees to change their passwords on a regular basis, and having passwords screened for complexity, must be built into the system, as well as more complex tests of efficacy. To ensure that these measures are working requires formal audits, but also a self-critical attitude on the part of staff members in both technologically-related and non-technologically related jobs.

Q7. Keeping the information security program functioning and improving over time

Monitoring and quality testing must continue, but it must shift, change, and improve with the evolving security environment. Maintaining a high level of education on the part of the security staff is essential, through retraining and also continuing the staff's education. Staff must receive constant exposure to the subject of new security threats by attending conferences and in-house training. Having a strong HR program to encourage top it graduates to join the security team is also essential. Proper financing for the it department to maintain its high-quality efforts is a vital.

A high level of technological literacy is desirable amongst all staff members. As well as being kept abreast of how to protect their departments and their own security, there should be a close relationship between it and other departments. Other employees should feel comfortable going to it staff to discuss potential security compromises.

Compromises to security can be injurious for the company and for staff members on a personal level. Incorporating a briefing regarding the need for high-level security into orientation and having 'retraining days' at the company makes security a natural part of standard operating procedures, not something that is only of concern when there is a breach. Employees…


Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Risk Assessment

Pages: 12 (3324 words) Sources: 5 Subject: Business - Management Document: #83620272

Chief Information Security Officer-Level Risk Assessment The objective of this work in writing is to examine Chief Information Security Officer-Level Risk Assessment. Specifically, the scenario in this study is securing information for the local Emergency Management Agency in an Alabama County. The Director of Emergency Management in this County has tasked the Chief Information Security Officer with setting out a plan for information security of the Department's networking and computing systems. Information

Studyspark Study Document

Risk Assessment Program

Pages: 13 (3310 words) Sources: 15 Subject: Business Document: #26242682

Risk Assessment Program Over the last several years, many small and medium sized businesses have been turning to cloud computing as a way of storing, retrieving and accessing vital information. This is when a third party provider will offer firms with these services at a fraction of the cost of traditional IT departments. Moreover, there is unlimited storage capacity and firms can readily protect themselves against vulnerabilities at a particular site.

Studyspark Study Document

Risk Assessment Report of the

Pages: 9 (2612 words) Sources: 12 Subject: Business - Management Document: #83412184

Functional description The Public Health Informatics and Technology Program's IT system was developed by the Office of Surveillance, Epidemiology, and Laboratory Services (OSELS).The CDC division response for its deployment and maintenance is the Division of Informatics Research and Development (DIRD) whose role is to advance the frontiers of public health informatics by means of appropriate research and development. The DIRD division is to collaborate with the other members of the CDC

Studyspark Study Document

Risk Assessment for Gfi Group, Inc. Gfi

Pages: 7 (2070 words) Sources: 1 Subject: Education - Computers Document: #97622454

Risk Assessment for GFI Group, Inc. (GFI) RISK ASSESSMENT Company Network, Interconnection, and Communication Environment When it comes to the company network, GFI Group, Inc. (GFI) operates as a dealer brokerage company, which was discovered in the U.S. It is in network with over the counter (OTC) related securities and derivative products. The company mostly offers market data brokerage services, and analytics software merchandises to commercial and investment banks, insurance corporations, large businesses

Studyspark Study Document

Security for Networks With Internet Access

Pages: 12 (4420 words) Sources: 10 Subject: Education - Computers Document: #31313380

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Studyspark Study Document

Risk Assessment in the Past

Pages: 15 (5965 words) Sources: 1+ Subject: Business - Management Document: #33631090

It is also quite possible to use the file system's security characteristics or features in order to protect accessibility to the device management application itself. Then unauthorized users will not be in a position to read the application file, and they will not be able to run the application and have to attempt to guess a legitimate logon password in each of the step providing an extra layer of

Join thousands of other students and

"spark your studies".