Improve and maintain effective security management

Assignment Help Management Information Sys
Reference no: EM13749323

Thesis: The best tools to improve and maintain effective security management operations do not necessarily involve the latest, most expensive commercial products or overly-complex systems; instead, they are rooted in solid understanding of all hardware and software, having the right tools on hand at the right time, taking account of the large role of ‘human error' in security failures, having a plan in place in the event of security failure, and having fully-prepared employees.

Body

I. While there is clearly a place for the ‘latest and best' security solutions in the form of sophisticated commercial and open source software, as well as (for example) highly-automated configurations, the most important element of effective security is knowledge of the systems in place.

A. There must be clear, written, universally-distribution security policies (examples of failures in this area can go here).
B. must be a complete inventory of all hardware and software, including cabling layouts and device locations, including documentation.
C. A simple and comprehensible organization, addressing and subnetting map.

II. There must be full awareness of actions to take and procedures to follow in the event of a security issue (breach, etc.).

A. Well-established troubleshooting guidelines built into training.
B. Well-established and universally-understood backup and restoration procedures.
C. A clear emergency ‘continuity-of-operations' and recovery strategy in the event of a major ‘hack,' disruption, etc. (case study, example here of failures in the past).
D. Heavy focus on training, individual skill, resourcefulness, etc., with an eye to what motivates and de-motivates employees in the area of security compliance; focus on the role of management in setting the tone, of employee psychology, of concepts of reward and punishment for security compliance/transgressions.

III. There must be continual, comprehensive assessment of hardware and software vulnerabilities and the merits of alternatives (i.e. new products and services).

A. While new hardware and software solutions can be attractive, and in many cases offer genuine advantages, the strength of ‘off the shelf' solutions--combined with the strategies noted above--is often underestimated.
B. Value is located most often in products and services (and the companies that offer them) with proven track records, a good ‘word of mouth' reputation, a dedication to innovation and ‘staying ahead of the game.'
C. ‘Flash' and style should not obscure the value of some open source security contenders that, properly ‘tweaked,' provide enormous financial savings and reliability when blended with the training safeguards noted above.

Reference no: EM13749323

Questions Cloud

What is the significance of the neolithic revolution : What is the significance of the Neolithic Revolution to the development of human civilization? Mediterranean polytheism allowed humans to attribute misfortune to:
Define what initiated the change : What you wrote was well written but also very general. Your opening paragraph was essentially a copy and paste of the assignment which does not provide me any details on your chosen organization.
What is the expected annual dividend growth rate after year : Modern Development, Inc. paid a dividend of $5.00 per share on its common stock yesterday.  Dividends are expected to grow at a constant rate of 10% for the next two years, at which point the dividends will begin to grow at a constant rate indefinite..
The average monthly risk-free rate : Calculate 60 months of returns for the S&P 500 index, Apple and Exxon. (Please compute simple monthly returns not continuously compounded returns.) Use June 2010 to May 2015. Note this means you need price data for May 2010. On the answer sheet repor..
Improve and maintain effective security management : The best tools to improve and maintain effective security management operations do not necessarily involve the latest, most expensive commercial products or overly-complex systems
Describe the nature conservancys : Describe what Grieder means by "the stark, cruel choice the economic system poses between the present and the future"...ie., what is he referring to? Briefly describe the Nature Conservancy's
Calculate overtime pay by multiplying ot : As supervisor for a retail company, you supervise six people in your location. Calculate overtime pay by multiplying OT hours x regular pay x 1.5
Write a paper on postwar demobilization toward great power : Write a paper on Postwar Demobilization toward Great Power Status.
Advancement affect the ability to collect data : How does technological advancement affect the ability to collect data? Provide examples. Does this advancement increase the chance for errors? Explain.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Bp and how technology might be affected or involved

BP and How Technology Might Be Affected or Involved - From a technology perspective, I would like your thoughts as to how IT/IS has been affected, may be involved in current claims processes and how may be utilized for growth and recovery efforts ..

  Question about designing a databasein designing a database

question about designing a databasein designing a database management system is it important to know what sort of

  Foundations and current challenges in strategic

foundations and current challenges in strategic managementin a narrative format discuss these firms from a strategic

  Examples of logical and physical integration issues

Pick an organization that you know of or where you are/were working and provide examples of logical and physical integration issues that were faced by the organization when they broke the functional silos and moved to integrated systems.

  Write about the history of a specific stadium or arena from

write about the history of a specific stadium or arena from when the facility was being proposed until it was finally

  Importance of strong software architecturein order to build

importance of strong software architecturein order to build solid software it must have a strong foundation. this is

  Context diagram vs case diagramcompare and contrast a

context diagram vs. case diagramcompare and contrast a context diagram using data flow diagram dfd modeling and a use

  Supply chain for electric fansa supply chain for the

supply chain for electric fansa supply chain for the electric fans taking advantage of any global opportunities

  Cad technology rather than traditional drafting techniques

What kind of benefits are Marine companies achieving by using CAD technology rather than traditional drafting techniques?

  Is fraud easier on paper or in technology

Is fraud easier on paper or in technology - technology or manipulations of paper documentation?

  Cost benefits analysis for new systems

Cost Benefits Analysis for New Systems - One of the benefits made in some government IT projects

  Policy analysis paperthe paper requires two submissions the

policy analysis paperthe paper requires two submissions. the first a proposal is a very short document no more than two

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd