StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Best Practices - Case Study Example

Cite this document
Summary
From the paper "Security Best Practices" it is clear that the information located on the NIST document is extremely helpful to organizations that use information systems in their dealings, and the fourth student did a marvelous job of explaining this…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Security Best Practices
Read Text Preview

Extract of sample "Security Best Practices"

The paper will discuss security best practices for these three topics mentioned above. It will also comment on papers that other students have written regarding this topic.
Information Security Officer
The first thing that every security program should do is establish the existence of the Information Security Officer (Putvinski 1). Relying on the size of a person’s security environment, this could be a current worker who has the accessibility to take on further duties or a full-time worker. Apart from the time element, a firm must clearly define the prospects of the Information Security Officer and determine whether a worker is capable of filling the role (Putvinski 1).
Vendor Management
A firm is only as strong and tough as its weakest link, and when the organization works with third-party contributors their information security collapse can become the organization’s issue. Organizations should ensure that they document which vendors get confidential information, in addition to how this information, is taken care of when in the position of the vendor (Putvinski 1). The lack of authoritarian vendor guidelines could raise the risk of releasing a client’s private information.
Physical Security
Documents do not storm out of the organization on their own. Having strict rules regarding who can physically access the offices, as well as how they gain entry, might decrease the possibility that an unauthorized person is present illegally to take information (Putvinski 1). The next step is to make sure that an organization documents how physical information is kept and destroyed.
Comments on Papers
Student 1
The issues discussed in student 1’s paper slightly resemble the findings in my paper. Student one talked about security issues about protecting information systems by incorporating security policies. Such a topic is extremely wide in the IT field, and I feel that the student could have explained further the types of policies that could be implemented to secure our information systems.
Student 2
The second student’s paper was extremely educative. The student focused on the diverse fields of security best practices touching over every security part that information systems involved. The paper also mentions some of the issues that I discussed in my paper such as physical security, vendor management, and information security officers. Such a paper would be extremely helpful to someone who, in particular, wants a summary of the findings on security best practices. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Homework Case Study Example | Topics and Well Written Essays - 500 words - 1”, n.d.)
Homework Case Study Example | Topics and Well Written Essays - 500 words - 1. Retrieved from https://studentshare.org/information-technology/1605963-homework
(Homework Case Study Example | Topics and Well Written Essays - 500 Words - 1)
Homework Case Study Example | Topics and Well Written Essays - 500 Words - 1. https://studentshare.org/information-technology/1605963-homework.
“Homework Case Study Example | Topics and Well Written Essays - 500 Words - 1”, n.d. https://studentshare.org/information-technology/1605963-homework.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Best Practices

Database security Questions

DATABASE security QUESTIONS Database security Questions Author Author Affiliation Date Q.... 1 As a new Database Administrator, the first thing that you should do is developing a Database security Plan As a new database administrator, the primary thing which we should do is to secure it from illegal and wrong access.... Yet, the security of the database is considered just a sub-module of the entire computer security analysis....
3 Pages (750 words) Essay

Network Security Best Practices

From the paper "Network Security Best Practices" it is clear that Regular maintenance of a network is vital to its security.... Based on the best practices for a secure network listed above, a company should then review and update its security policy.... The document should never be considered complete, as threats are continually adapting, and in this way, so should the security policy.... When it comes to securing your network, reliability and fail-proof security are vitally important....
8 Pages (2000 words) Essay

Homeland Security: Community Threat Assessment

Biometrics such as face recognition or iris scans can serve to discourage false identities and uncover deceptive practices.... The author states that it is important that state and local police have the capability to create and maintain computer records on all contacts with law enforcement....
6 Pages (1500 words) Assignment

Wireless Security Best Practices Guide for Business

The security policy has the following important specifications to follow for the best benefit.... Keeping this in mind every organization is in search of a good security policy to be jotted down which when followed keeps the company in safe hands.... This paper is all about the security policy which Every company in today's world is run on wireless network technology.... As it is defined in RFC 2196, the IETS's site security Handbook, a security policy is a formal set of rules through which people who are given access to organization's technology and information assets must abide to....
9 Pages (2250 words) Essay

Security Best Practices

I have noticed that all of these organizations have developed their own information Security Best Practices or guidelines;.... These organizations have developed information security frameworks, security architectures, information security laws, information Security Best Practices In order to find out the best practices of the information security, I have visited and explored the websites of Microsoft, Oracle, Cisco, IBM and Intel.... I have noticed that all of these organizations have developed their own information Security Best Practices or guidelines; moreover, some of these guidelines are same in all organizations whereas the others are specific to the equipment or technology, they have developed....
1 Pages (250 words) Case Study

Security awareness

The goal of the campaign is to ensure reinforcement of Security Best Practices.... Threats from inside the company continue to be the main source of information security breaches, and therefore effective security awareness.... Threats have continued to emerge from within the company due to inadequate awareness on issues targeting security among the workers in the company.... Organizing a security awareness campaign Dell is an American private Company with headquarters in Texas....
1 Pages (250 words) Article

Logical Fallacies; Argument Structure

In the advertisement, Microsoft employs an appeal to fear by claiming that tables may have turned when it comes to matters of Security Best Practices.... In addition, Microsoft attempts to sell strategies it considers the best in enhancing cyber security.... It offers structural analysis to develop transformational security programs that would be effective for corporations. ... he advertisement is comprehensive and explains the reason cyber security is a concern to many organizations....
2 Pages (500 words) Assignment

Microsoft Windows 7 Security Best Practices and Vulnerabilities

The basic objective of this research is to discuss the best practices and vulnerabilities of Microsoft Windows 7 operating system.... This paper has discussed the best practices of the Windows 7 Operating System and also some vulnerabilities of this system.... The basic objective of this research is to discuss the best practices and vulnerabilities of Microsoft Windows 7 operating system.... It has two sections: the first section has elaborated a number of the best features in Windows 7 OS....
11 Pages (2750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us