StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information technology director security plan - Coursework Example

Cite this document
Summary
Security is not primarily a technical or technological issue but is a management issue as the incidents of lax security and bank failures due to redundancies and other management errors have increased…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful

Extract of sample "Information technology director security plan"

Security Plan Security is not primarily a technical or technological issue but is a management issue as the incidents of lax security and bank failures due to redundancies and other management errors have increased. For instance, even if a company has implemented a classy application to manage customers’ identities, management failure to follow on-board and off-board employees may lead to many backdoor security threats. The continuous redundancies are another threat that arises from poor management and endangers banks and other financial institutions.

Another example is that poor management of data access control, when the authorized person loses authorization, can lead to data insecurity. Security professionals report such security breaches to senior management staff and the HR department. If I was an information technology director, I would: Ensure the protection and management of information technology resources. Ensure access control. Write down a formal security plan with all security vulnerabilities, authorizations and the security plan.

Arrange a project team which would keep a check on security. Ensure purchase and implementation of virus protection, spam-filtering software, firewalls, updates, passwords and physical security. Keep and review regular backup of data. Data should be stored on the server or copied before making backups. A complete backup should go off the location regularly. Keep a check on network intrusion and data theft. Log serial numbers. Lock all networks and servers in a secured room. Provide cheap printers to the HR department and the security directors to take printouts of important data regularly.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information technology director security plan Coursework”, n.d.)
Information technology director security plan Coursework. Retrieved from https://studentshare.org/information-technology/1589065-information-technology-director-security-plan
(Information Technology Director Security Plan Coursework)
Information Technology Director Security Plan Coursework. https://studentshare.org/information-technology/1589065-information-technology-director-security-plan.
“Information Technology Director Security Plan Coursework”, n.d. https://studentshare.org/information-technology/1589065-information-technology-director-security-plan.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information technology director security plan

Information Security Program

This paper "Information security Program" points out what information security governance is in a banking software company, its implementation.... The paper gives an information security policy that provides total control, hence compliance, to ensure effective information security governance.... nbsp;… The company has employed staffs who have expertise skills for effective security program that cover all areas of the company....
14 Pages (3500 words) Case Study

Information Managment Challenges for Ford Motor Company

nbsp; According to the company's mission statement, “Our customers, clients, suppliers, partners, employees, and stakeholders say, without hesitation, that information technology is a critical and competitive differentiator for Ford Motor Company.... This paper, Information Managment Challenges for Ford Motor Company, will examine the challenges Ford faces by striving to create greener products, utilizing technology to create a better product and prove to consumers that the company promotes the ideals of a cleaner, healthier world....
41 Pages (10250 words) Research Paper

The Information Technology in Terms of Security for the Institution

The paper "The information technology in Terms of Security for the Institution" concerns the rubrics associated with effective organizational management is vital for the effectiveness of the medical office.... Mary's Hospital and will have 126 employees that will majorly work with the information technology perspective.... Exterior Security at the Gates For the optimal results of this strategy, the information technology officers in the medical facility should communicate with the officers guarding the gates physically....
15 Pages (3750 words) Assignment

Effectiveness Of Federal Information Security

The paper "Effectiveness Of Federal Information Security" discusses whether the risk to information technology systems in Federal Agencies and the IT industry between 2002 and 2005 has been decreased as a result of implementing the Federal Information Security Management Act of 2002.... hellip; After the computer security act of 1987, there was a strong need to formulate a standard Department of Defense (DoD) policy for security certification and accreditation federal information systems....
36 Pages (9000 words) Research Paper

Information System Security Plans

This is where the role of a security plan assumes significance.... A foolproof security plan for the nation's federal… cies and other governmental organizations can enable it to function securely and efficiently thereby giving the nation an ‘edge' over other nations.... That is, once agencies' security structures and critical information are secured, they can operate without any threats, Then, with todays rapidly changing political, economic, and importantly technical environment increasing the threat for the federal agencies, it becomes paramount for those agencies to adopt a strong security plan....
5 Pages (1250 words) Research Paper

DHS - the Office of Health Affairs

Department of Homeland Security Strategic plan Fiscal Years 2008–2013”) organizationally locates the Office of Health Affairs within the DHS as a whole.... he DHS strategic plan for the five-year period from 2008 to 2013.... Strategic goal #2 in the strategic plan is to “Protect the Nation from Dangerous Goods”.... Strategic goal #4 in the strategic plan is to “Strengthen Our Nations Preparedness and Emergency Response Capabilities”....
8 Pages (2000 words) Research Paper

Role of Computer and Information Security in Defining Current National Security Issues

"Role of Computer and Information security in Defining Current National security Issues" paper states that the use of computers and information availability has highly resulted in many national insecurity issues in many countries, hence affecting most of these countries economically and socially.... nbsp;… The global advancement of internet and computer-networking development as well as information availability plays a vital role in defining the current national security issues....
8 Pages (2000 words) Coursework

Impact of Data Security on Enterprise Information Security Planning

Primarily, data security demands all managers to develop a business data security plan also referred to as information security program.... Data Security versus Enterprise Information Security PlanningISPO (2016) hypotheses that the process of establishing a suitable organizational security plan occurs in different stages and requires appropriate utilization of organizational resources to achieve the desired outcomes.... Therefore, an organization security plan has a critical role to play in protecting data and the business value....
13 Pages (3250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us