StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Elements of Security System - Coursework Example

Cite this document
Summary
This paper explains the reason and how security strategy as a key element might require being updated as a perfect way of addressing security risks associated with various business environment…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Elements of Security System
Read Text Preview

Extract of sample "Elements of Security System"

Elements of Security System An understanding of each of the seven key elements of a security system is important. This paper explains the reason and how security strategy as a key element might require being updated as a perfect way of addressing security risks associated with various business environment changes. When migrating to an email system that is cloud-based, updating security strategy would be important to avoid possible risks associated with the increase concern on hosted email services due to the associated benefits.

This could be done by weighing the email services. Regardless of the outcome, the firm would be in a better position by building a strong case for both cloud-hosted email system and email strategy. Customers need to be absolutely secure when communicating or transacting online (Kairab, pg.56). In the case of installing a wireless network, updating security strategy should be done in order consider both benefits and associated security risks. Wireless networks would be of benefit due to the associated flexibility, but the network could be exposed to many security risks including those similar to wired networks.

Additional risks thus call for security strategy upgrading. Management support is however important in this case (Kairab, pg.50). The radio transmission of data makes the wireless network open to intruders, who can exploit it, destroy it, steal data, or even deny access to authorized users. The strategy upgrade should include the use of risk management processes for assess possible risks, taking necessary steps to reduce the risks, and maintaining an acceptable level of security risks. The strategy should consider the economic side of the installation and in the management of the projected risks.

Security strategy upgrade is also important during major company reorganization. Major company reorganization occurs with both economic pressure and security risks. Major reorganizations include mergers, joint venture, and downsizing among others. Companies have to reveal some of their critical secretes and information, which could pose danger to a firm’s operations or success. Security strategy upgrade is important in this case since the management structure of the firm has eventually changed.

The firm would make security changes in a way that it feels secure and stable (Kairab, pg.66). Operating in a secure way would be the best way to do it. The upgrade should consider aspect like possible uncertainties and the kind of information it needs to protect during the reorganization. New legislation affecting business processes might also require a security upgrade. The upgrade would address new security risks associated with new legislations. Some new legislation may decrease the level of protection that a firm faces from the new business environment.

New legislations could ease the changes that a security criminal could face after breaking into the firm’s secured systems or operations. Other legislations may consider a firm accountable for any of it security risks. These possibilities would require significant adjustments in the security strategy in order to fit within the new legislation (Kairab, pg.60). All these different business environments would call for an upgrade of a firm’s security strategy if the firm has to survive the respective business environment.

Works Cited Kairab, Sudhanshu. "The information Security Program and How a Security Assessment Fits In." Kairab, Sudhanshu. A Practical guide to Security Assessments. CRC Press, 2004. 45-66. Print.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Elements of Security System Coursework Example | Topics and Well Written Essays - 250 words”, n.d.)
Elements of Security System Coursework Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1625592-elements-of-security-system
(Elements of Security System Coursework Example | Topics and Well Written Essays - 250 Words)
Elements of Security System Coursework Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1625592-elements-of-security-system.
“Elements of Security System Coursework Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1625592-elements-of-security-system.
  • Cited: 0 times

CHECK THESE SAMPLES OF Elements of Security System

Penetration Testing on Operating Systems and Database Security to Ensure Reliability and Integrity

In precise, the facet of penetration testing is often regarded as 'pen testing' or 'security testing' method which tends to assess the safety of a computer network or system by testing it from the viewpoint of an attacker i.... Rather, it is regarded as the approach which significantly assures the security of a network or system in terms of protecting it from being attacked by an intruder (Brown Computer Science, 2010).... The paper "Penetration Testing on Operating Systems and Database security to Ensure Reliability and Integrity" states that database security can enable to the protection of invaluable organizational data from being accessed by unwanted individuals which can bring about massive financial difficulties....
8 Pages (2000 words) Essay

Software Development Life Cycle

The most common elements of SDLC include the system requirement study, which some scholars divide into system investigation and system analysis; designing; development, which some scholars indicate as programming; testing and maintenance.... Information system Security Officer is the individual in the organization that plays the role of ensuring the security of information transmitted through the software on the long term.... The Information Systems security Program Manager is an important role player in the SDLC project because he or she introduces an appropriate, structured methodology to help determine, assess and reduce the cases of information insecurity in the software that is made (Langer, 2012)....
3 Pages (750 words) Essay

What Elements of Security Actually Mean

Before probing into the issue of essential elements relating to security or safety, we should first get familiar with what elements of security actually mean.... elements of security mean by those rudiments or elements which have a direct relationship with our safety.... These… Let's start it with health element of security.... Health security of a person can be achieved by taking proper care, yearly medical examinations, and by having proper and balanced diet....
6 Pages (1500 words) Essay

Sea Ports and Port Security Management

The coast guards are the major unit active in the port area to maintain the security system.... maritime system consists of more than 300 sea and river ports with more than 3,700 cargo and passenger terminals.... Terrorist can use the shipping system to import weapons of mass destruction and other hazardous materials.... Ports operate in a complex mode transport system, and weak linkages between components may result higher vulnerability Large scale military deployment would require to transport equipment needed by military heavily by sea ....
4 Pages (1000 words) Assignment

Computer System Safety Standard

Software safety is provided by a complex of security measures against programs that affect a system.... It involves risk management and avoidance from injury or any kind of damages to a working system, that is, a computer system.... A system is a set of detailed or programmed processes and methods… The safety of a system will also involve protection of a system from processes that may cause it to crush. system safety generally Today, people, organizations, and companies are all technologically advancing, and information technology is a backbone of these advancements....
5 Pages (1250 words) Research Paper

Airport Policy of Alexandria International Airport

Alexandria International Airport faces security challenges that have become phenomenal globally especially with the escalating cases of terror attacks.... The need to develop policies and regulations that enhance airport security has been called for due to the increased number of… Players in the industry have suggested for the development of policies in order to bring sanity in airports that have been exposed (Kirsch & Rockwell, paras.... The primary objective of policy document entails addressing the issues related to security threats in Alexandria International airport in order to improve security (Kirsch & Rockwell, paras....
4 Pages (1000 words) Essay

A Disaster Recovery Plan

One of the most crucial elements to understand within the realm of security are the User Domain, one of seven domains in an IT infrastructure, is considered to be the domain most at risk for attack and compromise, primarily due to the inherent weakness of the human interaction element.... A business continuous system is a checkpoint of audits that ensure that all elements are covered in a plan in case of server failures or breach in privacy(Johnson,2011).... This provide a global security assessment to ensure that a global virus does not threaten the enterprise risk systems....
1 Pages (250 words) Essay

Layers of Physical Security

This paper “Layers of Physical Security” is an exploration of the elements of security at each level.... hellip; The author is sure that the concern for security is a topic of great concern, how reliable the security system depends on the planning that the involved institutions apply.... The traditional security system is continuously being improved by technology and civilization.... Since the traditional means of securing territories no longer hold, there must be an advancement in the forms of security with the utilization of technology....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us