Improve and maintain effective security management

Assignment Help Management Information Sys
Reference no: EM13749323

Thesis: The best tools to improve and maintain effective security management operations do not necessarily involve the latest, most expensive commercial products or overly-complex systems; instead, they are rooted in solid understanding of all hardware and software, having the right tools on hand at the right time, taking account of the large role of ‘human error' in security failures, having a plan in place in the event of security failure, and having fully-prepared employees.

Body

I. While there is clearly a place for the ‘latest and best' security solutions in the form of sophisticated commercial and open source software, as well as (for example) highly-automated configurations, the most important element of effective security is knowledge of the systems in place.

A. There must be clear, written, universally-distribution security policies (examples of failures in this area can go here).
B. must be a complete inventory of all hardware and software, including cabling layouts and device locations, including documentation.
C. A simple and comprehensible organization, addressing and subnetting map.

II. There must be full awareness of actions to take and procedures to follow in the event of a security issue (breach, etc.).

A. Well-established troubleshooting guidelines built into training.
B. Well-established and universally-understood backup and restoration procedures.
C. A clear emergency ‘continuity-of-operations' and recovery strategy in the event of a major ‘hack,' disruption, etc. (case study, example here of failures in the past).
D. Heavy focus on training, individual skill, resourcefulness, etc., with an eye to what motivates and de-motivates employees in the area of security compliance; focus on the role of management in setting the tone, of employee psychology, of concepts of reward and punishment for security compliance/transgressions.

III. There must be continual, comprehensive assessment of hardware and software vulnerabilities and the merits of alternatives (i.e. new products and services).

A. While new hardware and software solutions can be attractive, and in many cases offer genuine advantages, the strength of ‘off the shelf' solutions--combined with the strategies noted above--is often underestimated.
B. Value is located most often in products and services (and the companies that offer them) with proven track records, a good ‘word of mouth' reputation, a dedication to innovation and ‘staying ahead of the game.'
C. ‘Flash' and style should not obscure the value of some open source security contenders that, properly ‘tweaked,' provide enormous financial savings and reliability when blended with the training safeguards noted above.

Reference no: EM13749323

Questions Cloud

What is the significance of the neolithic revolution : What is the significance of the Neolithic Revolution to the development of human civilization? Mediterranean polytheism allowed humans to attribute misfortune to:
Define what initiated the change : What you wrote was well written but also very general. Your opening paragraph was essentially a copy and paste of the assignment which does not provide me any details on your chosen organization.
What is the expected annual dividend growth rate after year : Modern Development, Inc. paid a dividend of $5.00 per share on its common stock yesterday.  Dividends are expected to grow at a constant rate of 10% for the next two years, at which point the dividends will begin to grow at a constant rate indefinite..
The average monthly risk-free rate : Calculate 60 months of returns for the S&P 500 index, Apple and Exxon. (Please compute simple monthly returns not continuously compounded returns.) Use June 2010 to May 2015. Note this means you need price data for May 2010. On the answer sheet repor..
Improve and maintain effective security management : The best tools to improve and maintain effective security management operations do not necessarily involve the latest, most expensive commercial products or overly-complex systems
Describe the nature conservancys : Describe what Grieder means by "the stark, cruel choice the economic system poses between the present and the future"...ie., what is he referring to? Briefly describe the Nature Conservancy's
Calculate overtime pay by multiplying ot : As supervisor for a retail company, you supervise six people in your location. Calculate overtime pay by multiplying OT hours x regular pay x 1.5
Write a paper on postwar demobilization toward great power : Write a paper on Postwar Demobilization toward Great Power Status.
Advancement affect the ability to collect data : How does technological advancement affect the ability to collect data? Provide examples. Does this advancement increase the chance for errors? Explain.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Description of system development life cycle

Description of System Development Life Cycle - Discuss a scenario in which you might choose one implementation type above the others.

  Should the cio or cto report to the company president

Contact at least three people at your school or a nearby company who use information systems. List the systems, the position titles of the users, and the business functions that the systems support.

  Explain about operations and supply chain management

The answer to Operations and supply chain management - Operations and supply chain management

  Organizations responses to security threatshow should

organizations responses to security threatshow should organizations respond to security threats? use at least 200 words

  Important information about technology impact papercould

important information about technology impact papercould you please assist me with this assignmenttechnology impact

  Integrated software application for patient records mgmt

Assume that you have been asked to procure a new integrated software application for patient records management.

  Smart chips company value chain managementin competitive

smart chips company value chain managementin competitive industries most of the time companies must look within and

  Explain about employee training and development

Employee Training and Development - FranSystems Proving cutting-edge technology solutions with a "human touch" and Building business through relationships and partnerships

  Information technology and its impact on societywhat uses

information technology and its impact on societywhat uses of information technology might be considered improper

  Determine benefits realized by consumers

Mobile Computing and Social Networks - Determine benefits realized by consumers because of the ability to gain access to their own data via mobile applications.

  Solution to supply chain management questionneed help

solution to supply chain management questionneed help writing a paper involving the requirments technology benefits

  Explain supply chain risk mitigation

Supply Chain Risk Mitigation and What factors (risks) can potentially disrupt a supply chain, and how

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd