Elements of Security System - Coursework Example

Comments (0) Cite this document
This paper explains the reason and how security strategy as a key element might require being updated as a perfect way of addressing security risks associated with various business environment…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful
Elements of Security System
Read TextPreview

Extract of sample "Elements of Security System"

Elements of Security System An understanding of each of the seven key elements of a security system is important. This paper explains the reason and how security strategy as a key element might require being updated as a perfect way of addressing security risks associated with various business environment changes. When migrating to an email system that is cloud-based, updating security strategy would be important to avoid possible risks associated with the increase concern on hosted email services due to the associated benefits. This could be done by weighing the email services. Regardless of the outcome, the firm would be in a better position by building a strong case for both cloud-hosted email system and email strategy. Customers need to be absolutely secure when communicating or transacting online (Kairab, pg.56).
In the case of installing a wireless network, updating security strategy should be done in order consider both benefits and associated security risks. Wireless networks would be of benefit due to the associated flexibility, but the network could be exposed to many security risks including those similar to wired networks. Additional risks thus call for security strategy upgrading. Management support is however important in this case (Kairab, pg.50). The radio transmission of data makes the wireless network open to intruders, who can exploit it, destroy it, steal data, or even deny access to authorized users. The strategy upgrade should include the use of risk management processes for assess possible risks, taking necessary steps to reduce the risks, and maintaining an acceptable level of security risks. The strategy should consider the economic side of the installation and in the management of the projected risks.
Security strategy upgrade is also important during major company reorganization. Major company reorganization occurs with both economic pressure and security risks. Major reorganizations include mergers, joint venture, and downsizing among others. Companies have to reveal some of their critical secretes and information, which could pose danger to a firm’s operations or success. Security strategy upgrade is important in this case since the management structure of the firm has eventually changed. The firm would make security changes in a way that it feels secure and stable (Kairab, pg.66). Operating in a secure way would be the best way to do it. The upgrade should consider aspect like possible uncertainties and the kind of information it needs to protect during the reorganization.
New legislation affecting business processes might also require a security upgrade. The upgrade would address new security risks associated with new legislations. Some new legislation may decrease the level of protection that a firm faces from the new business environment. New legislations could ease the changes that a security criminal could face after breaking into the firm’s secured systems or operations. Other legislations may consider a firm accountable for any of it security risks. These possibilities would require significant adjustments in the security strategy in order to fit within the new legislation (Kairab, pg.60). All these different business environments would call for an upgrade of a firm’s security strategy if the firm has to survive the respective business environment.
Works Cited
Kairab, Sudhanshu. "The information Security Program and How a Security Assessment Fits In." Kairab, Sudhanshu. A Practical guide to Security Assessments. CRC Press, 2004. 45-66. Print. Read More
Cite this document
  • APA
  • MLA
(“Elements of Security System Coursework Example | Topics and Well Written Essays - 250 words”, n.d.)
Elements of Security System Coursework Example | Topics and Well Written Essays - 250 words. Retrieved from
(Elements of Security System Coursework Example | Topics and Well Written Essays - 250 Words)
Elements of Security System Coursework Example | Topics and Well Written Essays - 250 Words.
“Elements of Security System Coursework Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Elements of Security System

Elements of Computer Security

...?Running Head: Elements of Computer Security Elements of Computer Security [Institute’s Elements of Computer Security Without any doubts, the key purpose of any computer security system is to ensure that its users and stakeholders could be a part of a safe and reliable computing environment. With the increasing usage of computers and their ever-increasing role in human lives, computer security has become an area of great concern for organizations, institutions and even individuals (Gollmann, 2011). This paper is an attempt to explore the key elements of computer...
3 Pages(750 words)Research Paper

The Social Security System

...? The Social Security System School The Social Security System History of the Social Security System In the year 1934, the Committee on Economic Security (CES) was created by the President Franklin D. Roosevelt. Roosevelt assigned the CES the responsibility of exploring the feasibility of a system of economic security that would provide the disabled and the elderly people with income. The government and the family members were the caretakers of the people who were not unable to work. Roosevelt felt the requirement of a national system. Therefore, the CES submitted their...
6 Pages(1500 words)Research Paper

Elements of the Legal System

...?The Element of the Legal System Criminal Courts The primary function of a criminal court in the society is that it resolves disputes. At the center of very judicial court system, self-resolving dispute by force is not acceptable so those parties that cannot settle their disputes may bring them to the court for resolution. This fundamental structure of judicial system promotes peace and order in the society. Adversarial vs. Consensual Model. Adversarial model is the most common model. It is also known as combat model or the adversary system model. Under this kind of model both the prosecutor and the defense attorney battle it out by strongly challenging...
5 Pages(1250 words)Essay

Computer system Network Security

...can also be supported with regaular locking of your PC, not opening attachment mails if you are not expecting any mail. Platform security systems ensure that each device is available to perform its intended function and doesn't become the network's single point of failure. The isolation of different nodes will make sure than the ill effect of one particular node will not effect the other. The network security plan should include antivirus checking and host-based intrusion detection and alert system. To meet with endpoint compliance, ensure that security policies check user devices for required security software. Computer or Network...
5 Pages(1250 words)Essay

Information and System Security

...Information and System Security Information security means protecting information and information systems from un ized access, use, disclosure,disruption, modification, or destruction. The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information...
2 Pages(500 words)Essay

Information System Security

...1. Chapter 1 Introduction 2. Research Objectives 2. Chapter 2. Review of Related Literature 2 Security Model 2 1. Management 2 2. Organisation Structure 2.1.3. Critical Infrastructure 2.2. Risk Management 2.2.1. Methods Used in Risk Management 2.2.2. Integration of the Risk Management System into the SDLC 2.2.3. Tree Based Methods 2.2.4. SEI Risk Management Paradigm 2.2.5. Evolution of Risk Management 2.2.6. Risk Management Frameworks 2.3. Threats to Security 2.3.1. Malicious Individuals 2.3.2. Malicious Code 2.3.3. DDOS Attack 2.3.4. Password attack 2.4. Security Solutions 2.4.1. Firewalls 2.4.2. IDS (Intrusion Detection Software) 2.4.3. Virus Scanners 2.4.4....
56 Pages(14000 words)Essay

System Security

...___________ Grade _____________ d: 2008-12-21 System Security System security over the last twenty years has gone through a tremendous series of ups and downs where the focus of providing security is to minimize uncertainty by measuring the probability of a threat event. Initially the secure and financial data were not on the internet directly so at that time the most common threat to a computer system or to a land environment was the virus attack. Criminal minded geniuses were designing the virus to destroy a system partially or completely. This provided an edge to the antivirus companies to scan,...
2 Pages(500 words)Essay

Information system security

..., two main types of data errors might arise. The first type is the collection error and the second type is the corruption error. In case of the collection errors, the possibilities of defect arise during the collection process. Common examples are recording of the redundant data due to mistaken efforts of the collector. The second type of error might appear due to certain faults within the storage or the execution process of the data20. As a corrective measure, organizations do need to implement the concepts of risk assessment and risk management with the prime intention of identifying the chances of occurrences of such hampering facts. As a result, these two aspects form the necessary elements of the information...
12 Pages(3000 words)Research Paper

What is System Security

..., an audit record is also a technique that is used to detect any form of intrusion into the system (Kovacich, 2003). Normally standard operating systems come with accounting software pre-installed that collect all information of all the activities that are performed by the users in a particular computer. This information is carefully audited to detect any form of intrusion into the system Avoine, Junod, & Oechslin, 2007). Conclusion With computing being an integral element in modern day operations, emphasis have turned to computer system security. The level of system security is being highlighted given...
11 Pages(2500 words)Term Paper

Home Security alarm system

...Home Security Alarm Design Summary: This report presents a design for a home security alarm system. We are required to design our logic circuit using BOOELEAN algebra, and we use His theory to design 4 alarm systems, such as; burglar, water, fire and system. Student decided to design our finish design is a super simple where we only have to use 2 gates such as OR gates and AND gates to do our circuit. Lastly we use our circuit diagram to demonstrate the operation of our circuit to the supervisor. This design are easier to construct and understandable. Technical Introduction: Our group is presented with a home security alarm...
3 Pages(750 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Elements of Security System for FREE!

Contact Us