This website uses cookies to ensure you have the best experience. Learn more

Implementing Security Strategies Essay

839 words - 3 pages

This paper will discuss implementing security strategies at Solar Sail, legal ethical, and liability considerations. How MRP securities have impacted Solar Sail security and recommendations for a better management plan. Each day at Solar Sail there was a priority to take care of, and priority management was not given attention causing issues within the IT department. The issues ranged from LAN to website security loss. To recover from this loss implementing a security strategy in order to keep everything running smoothly is ideal.Security implementation begins with "organization, tactical, strategic, operational planning" (Whitman & Mattord p27), and the top-down management ladder. The organization part begins with the CEO of Solar Sail, he/she is responsible of coming up with a long term plan for the IT department consisting of multiple tasks that will be shared among employees regarding the problematic issues. Such issues are the LAN, error rate, and website security. The CEO would have a meeting with the heads of the company including the IT department and express the concern, expected goals, and tentatively how to achieve them.Next the CIO will use strategies plans made by the CEO for the IT department and make sure they are carried out by planning a meeting and sitting down with the department and going over the plans made by the CEO and taking in any changing concerns. From there, the IT department can express concerns and changes on the organization plans in general. In the step the tentative steps came become more realistic on future goals.Next, the CISO can sit down with the security IT department and go over with them implementation plans regarding the website security issues. What strategies can be taken to ensure proper precaution are taken in case there is another website break in and future planning for the fiscal year to improve security measure all around Solar Sail. Here the plans are becoming more realistic and being set into motion for the IT department and employees are getting involved.Next the Security Manager would take the plans and orders given by the CISO into consideration and use tactical planning. Tactical planning is putting the plans approved by the department to action. Security manager would be in charge of making up tasks for each employee in their perspective department and work with a time limit to achieve a security issue patch.Finally, the Security Administrator will make sure the plans that have been assigned and approved by the manager are being put to use as...

Find Another Essay On Implementing Security Strategies

Operations Management and Quality: Pars Food Ltd

1312 words - 5 pages implementing, supporting, and driving factors to help Pars Food Ltd communicate, identify competitive advantage and differentiation, to meet long term aims, and strategies (Dumovic, Knowles, 2008). Background Literature To accomplish competitive advantage, and differentiation three elements are crucial; stating the strategies and practicalities, focusing on knowledge based behaviour, and improving the customer relationship management.(Slater and

Strategies for BYOD Success Essay

859 words - 4 pages Companies often consider implementing BYOD in their organizations but fear the challenges that they will experience. These fears are sometimes brought about by the IT team within the organizations as it is believed by many that BYOD is a tragedy waiting to happen as they consider the security issues, policies, possible data loss and network bottlenecks. However with careful planning and implementing the right strategies this endeavor can be a

The IT Department and Virtualization

994 words - 4 pages Introduction Virtualization has become an essential service that the IT department has offered to Access strategies internal users as a service. The result of this initiative has been a cost saving. As a result of the success, the company has mandated this approach to be adopted for our remote offices. However, our business need for expansion has resulted in the need for adopting new security strategies to protect our virtual infrastructure

Soboat Technology Inc.: Information Sercurity Plan

2272 words - 10 pages Sobota will utilize the following tips to help develop goals for their network security plan: • Focus on return on value rather than return on investment • Never assume that network attacks are coming from outsiders • Work with others to develop and roll out security strategies • Finding the right balance between security and usability Corporate Assets Sobota will achieve and maintain appropriate protection of their assets and ensure that

Globalisation and Maritime Security

3774 words - 15 pages brief review of the international and states practice on political, legal and expenditure problematic on ISPS Code and related U.S regulations, especially PSI and CSI. Commercial factors in upholding maritime security regulation Expenses and Inconvenience in trading The cost of implementing ISPS Code and CSI are undeniable expensive regarding the governments have to provide an early warning system, checking, training for personnel and the ship

Security in Healthcare: How Bring Your Own Device (BYOD) violates Health Insurance Portability and Accountability Act (HIPAA)

1209 words - 5 pages BYOD can violate HIPAA security/privacy laws Lack of Confidentiality BYOD policy may not promote confidentiality and integrity, which is a major requirement in the HIPAA regulations (Health Information Privacy). Health providers should come up with strategies to follow up on and protect information they have concerning their client. 5111 Physical Security Policy ensures that the security of the devices used by patients is highly considered because

Educating Information Technology Staff

2066 words - 8 pages organizational staff and strategies used to implement training. Furthermore, methods used to transform training methods and a critique of security approaches designed to reduce and improve security risks. Educational Deployment Methods Organizations employ various methods to deploy training programs regarding information security to personnel in efforts to highlight security risks and safeguard organizational information. Based upon a special

Why is Database Security So Important?

2149 words - 9 pages recovery, and space management. Internal tests at Oracle indicate performance parity of SecureFiles with file systems – for both read and write operations (Hadock, W., & Kumar, S., 2007). The implementation of SecureFiles in the Oracle application adds a level of database security that not only assists DBA’s, but ensures a stable network environment for the entire Information Technology department within organizations. Implementing a secure

Legacy Information Systems

1794 words - 7 pages , 2013). Strategies to Modernize the Systems by Enhancing Functionality and Information Security Migration enriches and safeguards the long-standing investment in a business’s software infrastructure and efficiently diminishes the total cost of ownership (Syntel, 2008). Migration permits the revival of current business processes presenting opportunities that current and future technologies offer (Bass, 2013). For instance, by embracing modern

Water Security in Canada

1531 words - 6 pages Introduction: Government is not to blame for issues relation to the concept of water security. Water security affects our daily lives and will continue to affect everyone for many years to come. If we do not take it seriously we will all carry the burden. This essay tries to explain what exactly water security is and why those specifically in Saskatchewan should be concerned about it. Next it examines the problems related to water security

Mitigating Computer Misuse at Work

1868 words - 7 pages of an enterprise, and a majority of internal threats are relating to individual’s unsafe operation on computer. Therefore, it is necessary for organizations to optimize system security by implementing a rational measure to moderate individual’s unsafe behaviour on computer in workplace. Employees, who play a key role in security protection, need to be helped increase compliance on information security policy. This essay will discuss which is a

Similar Essays

Security In The Business Environment Essay

1919 words - 8 pages reliability of a supplier. This Security Management service management function (SMF) guides organization leaders and senior managers through issues that they should consider when developing an effective security policy and implementing it through a security program. The SMF discusses the individual and team security roles and their interrelationship with operational functions. The SMF also reviews tactics and best practices to increase staff

Cybersecurity Case Study

950 words - 4 pages . Moreover, it allowed people to communicate with each other in all over the world and to share information, documents and pictures by using mobile phone and social media such as Facebook, Twitter, YouTube, and Instagram. These things made governments, organizations and information security experts in IT thinking seriously about finding right strategies to apply the cybersecurity in order to protect networks, PCs and information from hacking, steal

National Security Policies Of Today Essay

797 words - 4 pages attacks. The act summoned for additional monitoring of computer networks, phone lines, and online browsing history within the U.S. and permitted the federal government to execute strategies to fight against global and domestic terrorism. The goal is to prevent terrorist attacks inside U.S. borders, reduce the susceptibility to terrorism, and at least reduce the damage from an attack. The Homeland Security Act of 2002 in was created in response to

Educating Information Technology Staff Essay

1318 words - 6 pages organizations. One such goal of the organization may be to reduce information security risks. Additionally, the section will identify recommendations for improvements to organizational training approaches. Positive Critique Organization face increased challenges in the protection of information and reducing risks. To assist in combating information risks organization employ various training strategies to educate employees. An organization that