This website uses cookies to ensure you have the best experience. Learn more

Understand Security Essay

1491 words - 6 pages

Understanding Security
Introduction .
Security management and systems have often been perceived as a non –productive expensive capital overhead by the stakeholders of companies and a hindrance to employees.
The purpose of this assignment is to, Identify what is seen as the main purpose of security management and discuss what is meant by the statement ‘security measures must be commensurate with the threat’.

Discussion.
Judgements on risk are made by almost all of us on a daily basis, this may be something as simple as crossing the road, subconsciously we adopt a thought process, how fast is the traffic moving? Is it wet? What is the distance needed to travel to safety? Once this ...view middle of the document...

In today’s climate where unemployment is at record highs and crime rates are at potentially the highest levels seen, we can no longer rely on, a drastically reduced local Police force or private guarding companies.
Therefore it has become more cost effective for organisations to manage the risk of security sensitive areas by the implementation of measures internally.
To successfully script a Security Management plan it is important to follow the phases below:
1. Planning and Strategy : How will it be written and who will view and be required to finance
2. Assessment: How the business organisation critical assets are defined and mitigation to the risks developed and the rationale behind the thought processes
3. Design: Details the design intent and details a cost effective way to provide the best security solution to mitigate understood risks.
4. Implementation and Review: Compliance checks to ensure that the project systems are implemented as per design intent and review for effectiveness.
Security management plan outlines the standards that a company or organisation and its employees are expected to willingly adopt. In addition the security management procedures must take into account, the type of business, the country that the organisation is operating in and any international /local regulatory body additional requirements.
Security Management processes from organisation to organisation will differ and be tailored to suit however the basic guidelines for identifying critical business assets are carried out in the form of an initial risk assessment and threat analysis. From the results of this assessment and analysis the security management recommendations and proposals will start to form the basis of the security management policy and procedures. The primary concern of a security management process lays with the protection of company assets that have been identified in the risk assessment of course this will include premises , Plant , Information and money however it is important to note that it shall encompass employees that can suffer injury. Security for any organisation has diverse implications and more importantly employers can face prosecution from their failure to protect their employees from the risk of harm which could result in adverse publicity and law suits. This follows the implementation of the health and safety at work legislation where it identifies the legal requirement of an employer to protect its employees against workplace violence. The security management procedures therefore are written to protect the organisation against such events and additionally it lends itself to sound financial sense and good management practice.
From the results of the Risk analysis and threat assessment the first principle of security is addressed which is the balance of measures appropriate to risk. Post the risk analysis completion an exercise in risk reduction is conducted; this is where the general methods of reducing the risk...

Other Papers Like Understand Security

Global Security Policy - Week 5 - Cmgt-400

969 words - 4 pages ; Richburg, 2011). Establishing a security awareness and education program can help counteract security issues and gain employee support. If the employees understand how important it is to security customer and company data, they may follow security policies and procedures. Companies should train employees during new-hire orientations, and have continuous training annually to remain compliant with laws and organizational procedures. Cyber Security

It Audit Guide Essay

4838 words - 20 pages IT [pic] Australian Government Department of Defence Information System Audit Guide VERSION 11.1 January 2012 Table of Contents 1. Introduction to Accreditation 4 2. The Information System Audit – Checklist 7 2.1. What is an Information System Audit? 7 2.2. Why is an Information System Certification needed? 7 2.3. Assessing an Information System’s Security Risks 7

A Security Risk Management Approach for E Commerce.Pdf

2235 words - 9 pages of this paper the model will be used to analyze potential security vulnerabilities to an The Emerald Research Register for this journal is available at http://www.emeraldinsight.com/researchregister organisation's information systems at a high level. Before using the VSM, it is essential to understand the dynamics of its applicability and a diagrammatic representation is shown at Figure 1. The VSM consists of five subsystems, or functions

The Importance of Measuring Enterprise Impact

561 words - 3 pages Preventing Security Breaches: Collaborative Summary Towyna Robertson BIS/221 March 22, 2015 Stefan Bund Preventing security breaches is not as easy as people would think due to the fact that it is so much easier to share information. There are many potential threats that occur with computers and technology as a whole.  In order to prevent certain breaches in security you must first recognize and understand the different types of threats

Hospital and Healthcare Security

1854 words - 8 pages the “patient’s rights” these have to be respected and the security personnel should be educated to understand these rights and follow the rules. Some types of patients are more vulnerable that others like pediatric patients and psychiatric patients. Security personnel may assist to constraint psychiatric patients or dangerous ones. In health care facilities security personnel will have contact with all visitors, vendors, employees and suppliers

Human Security

1956 words - 8 pages AN ESSSY ON THE POSSIBILITIES AND LIMITATIONS PRESENTED BY THE NEW LIBERAL APPROACH OF HUMAN SECURITY By ANON INTRODUCTION 1. ‘Human Security’ is an emerging paradigm which is used to understand contemporary security issues that affect the individual rather than the state. The notion of ‘National Security’ where the perceived threat came from another state intending to attack other states borders is being re-viewed. “Ideally

Income After Retirement

1789 words - 8 pages of their needs. Even though Social Security going bankrupt may be because the current economy is down right now, people should still think further and ask if Social Security was set up to fail years ago. We cannot solely rely on Social Security to meet our financial needs after retirement because Social Security may decrease its payments or diminish completely because they are paying out more than they are taking in. To understand how Social

Cyber Security: Physical and Digital Security Measures

3505 words - 15 pages physical and digital security measures and a firm grasp of the concept of cyber security, it will be possible to understand the steps that are necessary in an organization in order to ensure that situations such as those that occurred in 2014 are less likely to occur. By working to ensure that any digitized system is secure, or as secure as possible, an organization is able to not only work to increase its overall competitive advantage, but decrease

It Progression

380 words - 2 pages . Passwords minimum requirements are another area that is commonly attacked. Easley guessed or common passwords pose a huge security risk to any network. Solution: Ensure passwords are a mixture of upper case and lowercase letters, numbers, and special characters as well as implementing a stringent policy of changing passwords on a periodic basis will help secure the network security. Making sure that personnel understand and avoid what easy

Eco 405-Strayer

1185 words - 5 pages are going to spend their benefits, creating economic stability and growth. Social Security has many faces that Americans do not understand; supporting recipients is just a small piece in the larger picture. At the present time, approximately 57 million families are guaranteed Social Security benefits. These benefits are paid each and every month without interruption. These benefits are secure, meaning the current economic situation does not

Build a Web Applications and Security Development Life Cycle Plan

2026 words - 9 pages ........................................................................................................................... 1-3 Phase Overview Training – the initial (and an ongoing phase) of the SDL process, training is conducted throughout the SDL to understand security basics and the latest developments in security and privacy. Requirements – The requirements phase is where consideration of foundational security and privacy issues analysis as to how to align quality and regulatory requirements with costs and business needs is defined. Design – The design

Related Essays

Top 10 Laws Of Security Essay

1706 words - 7 pages Abstract It is very important to realize and understand the laws of security, by which all sectors in an enterprise or government can empower security within their perimeters. The higher understanding of this laws, the better security implementation is realized. These laws can be applied in each business field or any business environment. Such laws can be implemented in any degree of simplicity or complexity. Therefore, it is important to

Security Goals And Objectives Essay

805 words - 4 pages continuously hindered and easily undermined by flaws in design, weak or non-existent passwords, social engineering and associated risks (Lacey, 2010). A successful security organization will be able to assess and understand the risks and vulnerabilities within an organization in order to adequately to protect sensitive information that, if revealed to competitors or to other countries, could very well compromise the overall integrity of the

Essay.Designing.A.Security.Strategy

874 words - 4 pages business objectives for the next three years (Loveland, 2009). The first step in designing a security strategy is to understand the company network design and current state of the security environment. The best way to plan and execute a security strategy successfully is to breaking down the process of network security design into steps as following (Oppenheimer, 2010). Analyze security risks, Identify network assets, Develop a security plan

The Future Of Social Security Essay

908 words - 4 pages count on the government to support them when they retire. In this essay we will begin to understand why social security is not a valid retirement option. One will also learn how social security will decline in reliability and the options that the United States government has to possibly fix the problem, if it is fixable at all. Finally individuals will begin to understand how that they can ensure a healthy retirement without depending on social