StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Curriculum Development Related to Information Security Policies and Procedures - Case Study Example

Cite this document
Summary
For providing improved functionality for the organization,policies and procedures must be defined.They play a vital role for an organization’s smooth functioning.In order to implement policies and procedures,group discussions are required for constructing and implementing them in a real world scenario…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Curriculum Development Related to Information Security Policies and Procedures
Read Text Preview

Extract of sample "Curriculum Development Related to Information Security Policies and Procedures"

Download file to see previous pages

For providing improved functionality for the organization, policies and procedures must be defined. They play a vital role for an organization’s smooth functioning. In order to implement policies and procedures, group discussions are required for constructing and implementing them in a real world scenario. The first requirement is to differentiate both of them. A security policy comprises in the form of a document or rules that specify the statement ‘What must be done’ in order to assure security measures in the system or the network.

Whereas, procedures are associated with the rules and practices that are implemented in order to impose the rule. For instance, in a network security scenario, where there is a requirement for preventing the wireless network, anonymous access must be blocked. Likewise, the security policy document will define ‘What needs to be done’ to block anonymous access for a wireless network. Whereas, the procedures will define the practices and rules that needs to be followed in order to block the anonymous access ("Curriculum development related to information security policies and procedures ").

After differentiating both the security policies and procedures, these two are associated with development and administration in an organization. The term security in terms of development and administration is more like a management issue rather than a technical issue in an organization. The justification is to utilize and classify employees of an organization efficiently. Moreover, from the management perspective, discussions take place for describing various vulnerabilities and threats along with the creation of policies and procedures that may contribute for the achievement of organization goals.

After the discussions and alignment of policies and procedures to contribute for organization’s success, the development process is initiated at a high level, and afterwards implemented at lower levels within an organization. The conclusion reflects the development of policies and procedures, requirement of an approval from concerned personnel and then implementing them smoothly for the employees ("Curriculum development related to information security policies and procedures "). On the other hand, initiation of these security policies is easy and not expensive, but the implementation is the most difficult aspect.

If the development and administration do not comply effectively, or fails to establish awareness between employees related to the policies and procedures, the disadvantages may affect inadequately for the organization. For instance, an attack from a social engineering website such as ‘Facebook’, ‘twitter’, or ‘MySpace’ may extract sensitive information from senior or trusted employees of an organization. If the policies and procedures were understood or implemented properly, employees will be well aware of not providing any credentials or they will verify authorization before providing information on the sites.

Moreover, privacy and trust is a debatable topic that is also referred as identity theft. A good definition of identity theft is available in network dictionary that states as, “Identity theft is a crime in which an imposter obtains key pieces of personal information, such as Social Security or driver’s license numbers, in order to impersonate someone else. The information can be used to obtain credit, merchandise, and services in the name of the victim, or to provide the thief with false credentials”.

Many organizations have suffered security breaches initiated from a social networking site. There is a requirement for creating awareness between employees by developing policies and procedures related to the attacks associated with social engineering sites along with coping up these attacks. There is a requirement of identifying critical information systems within the organization. All the users must be

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Curriculum Development Related to Information Security Policies and Case Study”, n.d.)
Retrieved from https://studentshare.org/information-technology/1419321-curriculum-development-related-to-information
(Curriculum Development Related to Information Security Policies and Case Study)
https://studentshare.org/information-technology/1419321-curriculum-development-related-to-information.
“Curriculum Development Related to Information Security Policies and Case Study”, n.d. https://studentshare.org/information-technology/1419321-curriculum-development-related-to-information.
  • Cited: 0 times

CHECK THESE SAMPLES OF Curriculum Development Related to Information Security Policies and Procedures

Illegal Software Use

The latest study reveals that a number of security breaches come by known hackers.... In this regard the CEO Robert Holleyman, president BSA says, “It can be a security issue.... ?? Furthermore, he states that there is a major cultural problem that leads towards using pirated software and other security breaches.... However, in any organization the security lapse can also happen due to mismanagement of its software and licensing....
5 Pages (1250 words) Essay

Healty Care Informatics

This could lead to breach of privacy and other information security related hazards.... Health Care Informatics is the study relating to the application of information Technology to Health Care information.... Quantum leaps in technological advancements, research in the area of application of information technology to health care and increasing evidence in the lack of the human brain to incorporate all the sensitive issues is leading to the burgeoning of Health Care Informatics across the globe....
4 Pages (1000 words) Essay

Managing Health and Safety

The theoretical foundation for security is to determine every possible loss event and in order to plan, develop, implement, enforce, and maintain systems, policies, and procedures.... This paper is used to critically evaluate the current procedures for an investigation.... If an emergency or a safety need does arise, it is detrimental that systems and policies are in place.... This can be accomplished by identifying what is missing or inadequate, using legal requirements and policies/guidelines as means of measurement, and based on findings, come up with recommendations....
14 Pages (3500 words) Dissertation

What is science and how to teach to children

This is due to the fact that it is the public who regulates both the policies and the money enabling contemporary science and medicine to advance and that which an individual does not comprehend, he tends to withdraw or deny support towards.... The development from basic to applied science then being practical technologies, and, in medical science, from cellular to clinical study to useful disease cures and preventions, is based upon an educated public (Pober and Neuhauser 2001)....
50 Pages (12500 words) Thesis

The role of educators to promote human rights and social justice

The aim of this paper “The role of educators to promote human rights and social justice” is to examine social justice and education by focusing on the integration of human rights in curricula, policies, and practices of secondary schools.... The aim of this dissertation is to examine social justice and education by focusing on the integration of human rights in curricula, policies, and practices of secondary schools.... Teaching about human rights entails transmitting information and ideas on human rights and promoting attitudes and values that support such rights....
24 Pages (6000 words) Essay

Database Security Controls

The research paper will also provide the perspective on how companies are keeping secure the diverse data and all the steps and policies that companies need to take in consideration in the new era of cybercrimes.... However, we can see that with all the changes and innovations, the risk on security of the databases is a new challenge and constant concern for everybody in our time.... This paper also outlines the damage, the breach in the security in database can cause....
12 Pages (3000 words) Literature review

Situated Learning, a Workplace Experience

eclarative knowledge, also known as propositional knowledge is that knowledge that is inclusive of state-able facts, information, assertions, concepts, and propositions (Harris, Et al.... This report "Situated Learning, a Workplace Experience" discusses the Finance Department office in a large public-owned company as a learning environment that indicates that it is reasonably supportive of learning, but still has a fair way to go in providing opportunities in accounting areas....
11 Pages (2750 words) Report

Motivation of Women to Become Successful Leaders in Education

Most early theories of education essentially followed a male approach, the main purpose of which was the development of the individual as well as the civil society, but with no specific gender perspective.... This report "Motivation of Women to Become Successful Leaders in Education" discusses education, particularly school education, which has traditionally been considered as a feminine profession since the basic purpose of education is to develop a sense of care for society....
12 Pages (3000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us