Improve and maintain effective security management

Assignment Help Management Information Sys
Reference no: EM13749323

Thesis: The best tools to improve and maintain effective security management operations do not necessarily involve the latest, most expensive commercial products or overly-complex systems; instead, they are rooted in solid understanding of all hardware and software, having the right tools on hand at the right time, taking account of the large role of ‘human error' in security failures, having a plan in place in the event of security failure, and having fully-prepared employees.

Body

I. While there is clearly a place for the ‘latest and best' security solutions in the form of sophisticated commercial and open source software, as well as (for example) highly-automated configurations, the most important element of effective security is knowledge of the systems in place.

A. There must be clear, written, universally-distribution security policies (examples of failures in this area can go here).
B. must be a complete inventory of all hardware and software, including cabling layouts and device locations, including documentation.
C. A simple and comprehensible organization, addressing and subnetting map.

II. There must be full awareness of actions to take and procedures to follow in the event of a security issue (breach, etc.).

A. Well-established troubleshooting guidelines built into training.
B. Well-established and universally-understood backup and restoration procedures.
C. A clear emergency ‘continuity-of-operations' and recovery strategy in the event of a major ‘hack,' disruption, etc. (case study, example here of failures in the past).
D. Heavy focus on training, individual skill, resourcefulness, etc., with an eye to what motivates and de-motivates employees in the area of security compliance; focus on the role of management in setting the tone, of employee psychology, of concepts of reward and punishment for security compliance/transgressions.

III. There must be continual, comprehensive assessment of hardware and software vulnerabilities and the merits of alternatives (i.e. new products and services).

A. While new hardware and software solutions can be attractive, and in many cases offer genuine advantages, the strength of ‘off the shelf' solutions--combined with the strategies noted above--is often underestimated.
B. Value is located most often in products and services (and the companies that offer them) with proven track records, a good ‘word of mouth' reputation, a dedication to innovation and ‘staying ahead of the game.'
C. ‘Flash' and style should not obscure the value of some open source security contenders that, properly ‘tweaked,' provide enormous financial savings and reliability when blended with the training safeguards noted above.

Reference no: EM13749323

Questions Cloud

What is the significance of the neolithic revolution : What is the significance of the Neolithic Revolution to the development of human civilization? Mediterranean polytheism allowed humans to attribute misfortune to:
Define what initiated the change : What you wrote was well written but also very general. Your opening paragraph was essentially a copy and paste of the assignment which does not provide me any details on your chosen organization.
What is the expected annual dividend growth rate after year : Modern Development, Inc. paid a dividend of $5.00 per share on its common stock yesterday.  Dividends are expected to grow at a constant rate of 10% for the next two years, at which point the dividends will begin to grow at a constant rate indefinite..
The average monthly risk-free rate : Calculate 60 months of returns for the S&P 500 index, Apple and Exxon. (Please compute simple monthly returns not continuously compounded returns.) Use June 2010 to May 2015. Note this means you need price data for May 2010. On the answer sheet repor..
Improve and maintain effective security management : The best tools to improve and maintain effective security management operations do not necessarily involve the latest, most expensive commercial products or overly-complex systems
Describe the nature conservancys : Describe what Grieder means by "the stark, cruel choice the economic system poses between the present and the future"...ie., what is he referring to? Briefly describe the Nature Conservancy's
Calculate overtime pay by multiplying ot : As supervisor for a retail company, you supervise six people in your location. Calculate overtime pay by multiplying OT hours x regular pay x 1.5
Write a paper on postwar demobilization toward great power : Write a paper on Postwar Demobilization toward Great Power Status.
Advancement affect the ability to collect data : How does technological advancement affect the ability to collect data? Provide examples. Does this advancement increase the chance for errors? Explain.

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  Write paper on challenging security requirements for us

Write Paper on "Challenging Security Requirements for US Government Cloud Computing Adoption," NIST Cloud Computing Public Security Working Group, NIST Cloud Computing Program

  Technology and internationalizationplease discuss the

technology and internationalizationplease discuss the followingdetermine how changes and advances in technology have

  Describe the stages of technology development

The stages of technology development in Technology Industry - Describe the stages of technology development in Technology Industry by outlining a logical road map that contributes to Industry's business goals based on current technologies,

  Question about quality control amp supply chain

question about quality control amp supply chain managementthe abc floral shop sold the following number of geraniums

  Careers in purchasing and supply chain managementbased on

careers in purchasing and supply chain managementbased on your experience or readings discuss the career possibilities

  Software selection processdescribing a software selection

software selection processdescribing a software selection process for an organization. describe the evaluation criteria

  Sales management hardware and software available for b2b

sales management hardware and software available for b2b product introductiona business-to-business b2b company has

  Determine the balanced scorecard categories

Determine the balanced scorecard categories that you believe would be appropriate for the honor society.

  The efficiency and effectiveness of different software

the efficiency and effectiveness of different software productshello i need help elaborating on the following problem

  Problem of statement of cash flows

Dingo boot company uses the direct method to prepare its statement of cash flows. the company had the following cash flows during 2014:

  Identify the real causes of a problem

Development of Problem Statement - In the development of a problem statement, what are some components you consider important when identifying the real causes of a problem?

  Question about information systems managementexplain the

question about information systems managementexplain the concept of web services. how will they effect businesses in

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd