Security Risk Mitigation Policies - Coursework Example

Comments (0) Cite this document
It is imperative to protect the integrity, confidentiality, and availability of data from misuse by people inside or outside any facility or organization. Security policies and risk assessment aspects should be identified and characterized. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Security Risk Mitigation Policies
Read TextPreview

Extract of sample "Security Risk Mitigation Policies"

Security Risk Mitigation Policies It is imperative to protect the integrity, confidentiality, and availability of data from misuse by people inside or outside any facility or organization. Security policies and risk assessment aspects should be identified and characterized. In this case, there is a security issues with the wireless network connection as well as physical breach on customer’s personal data. This was due to weak access control policies within the organization. Therefore, there is need of establishing new risk management policies, which will address the two principal security breaches and mitigate the risks.
Despite the fact that the wireless networking provides numerous advantages, it is also coupled with various security threats which can alter an organization’s overall security profile. In the case of the wireless network bridge, there is need for effective management to the threats linked with wireless technology. Thorough and sound assessment of the risk provided in the environment should be done in order to develop a plan to mitigate it. A framework to assist the managers to fully understand and assess the threats associated with the utilization of a wireless technology should be implemented. Some of the actions that should be adopted in countering this kind of threat in the organization are as follows.
The first option should involve different methods for making it more intricate to intercept and locate the wireless signals. This way, hackers will have a hard time locating the organization’s signal. Additionally, the other principal option will involve utilization of encryption in order to preserve confidentiality even when the wireless signal gets intercepted (Choi et al., 2008).
It will also be imperative for the organization to utilize signal-hiding techniques so as to properly intercept wireless transmissions. This is because for any attacker to successfully intrude into a wireless network, they will first need to locate and identify the wireless network. This will be achieved by utilizing numerous steps that will make it extremely difficult to locate the organizations wireless access point. Therefore, the company should include some of the easiest as well as least costly methods which include turning off the service set identifier (SSID) which broadcasts by wireless access points. This will not only make it hard for hackers to have no access, but also, it will make it hard for them to access the company’s servers and download sensitive and personal materials. Moreover, assigning cryptic names to the SSIDs will also make it hard to access the organizations data. Additionally, reducing the organization’s signal will provide requisite coverage. By incorporating these aspects into the company’s wireless network, it will provide the necessary security to properly run the dairy operations in a secure manner (Choi et al., 2008).
The other major issue was the physical breach into the organizations data due to unauthorized access. Therefore, the best way to deal with such an issue is by establishing Key aspects of information security. This will include limiting access of information to exclusively authorized entities. This way the people that will have access to the information will be provided with different usernames and passwords that will change every eight hours. Prevention of unauthorized changes to the data, as well as, corruption of proprietary data should be crucial. The company should focus on guaranteeing that only authorized individuals will have apposite access to critical systems and information (IPA, 2000). Additionally, sensitive data should only be transmitted or shared with intended parties. By implementing the above discussed policies, the company will be able to prevent any further breaches into their system.
Choi, M et al. (2008). Wireless Network Security: Vulnerabilities, Threats and Countermeasures. International Journal of Multimedia and Ubiquitous Engineering, 3(3), 77-86
IPA. (2000). Countermeasures against Unauthorized Access. Retrieved from Read More
Cite this document
  • APA
  • MLA
(“Security Risk Mitigation Policies Coursework Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from
(Security Risk Mitigation Policies Coursework Example | Topics and Well Written Essays - 500 Words)
“Security Risk Mitigation Policies Coursework Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security Risk Mitigation Policies

Mitigation and risk reduction (case)

...? Mitigation of Earthquakes: Impediments to Disaster Prevention in Mega Cities (College Mitigation of Earthquakes: Impediments to Disaster Prevention in Mega Cities Rampant growth of population and subsequent drifts to urbanization led to the emergence of mega cities especially in developing countries. According to Wenzel (2006), statistical reports state that mega cities constitute world’s 20% of the population. This immense population concentration and thereby the formation of dense mega cities have raised great difficulties in the effective risk management. Despite the wide range of techniques initiated since the Lisbon earthquake, the increased population density in mega cities has...
3 Pages(750 words)Essay

Mitigation and risk reduction

...? Mitigation and Risk Reduction (Japan) of School Mitigation and Risk Reduction Introduction Disasters canstrike virtually anywhere and anytime. Many factors can contribute to a disaster from being something manageable to something much worse if the concerned authorities fail to take mitigation measures. A changed climate, high population density, poverty, illiteracy, inadequate preparations and building communities in unstable land (such as on steep hillsides) can greatly contribute to a disaster made worse. Most disasters are due to natural calamities such as earthquakes, typhoons, landslides, forest fires, volcanic eruptions, droughts, floods and pest infestations (locust, rats, worms, etc.) can cause massive destruction if one... is not...
2 Pages(500 words)Essay

Mitigation and Risk Reduction

... MITIGATION AND RISK REDUCTION Introduction Mankind has battled the elements of Nature since time immemorial and devised ways to mitigate the risks of occurrence, frequency and magnitude of those natural risks such as flooding, drought, pestilence (rats, insects, locusts, mites, etc.) with the use of scientific technology. Man-made risks have likewise increased due to Man's activities, inadvertent or not, such as clearing of forests, massive agriculture, big housing projects and over-exploitation of the natural resources. This paper discusses some of the relevant issues connected with mitigation and...
4 Pages(1000 words)Case Study

Risk Analysis and Hazard Mitigation

...? Risk Analysis and Hazard Mitigation Insert Risk management is essential for any particular project or business due to the various probable risks and contingency risks as well. In fundamental nature, risk management is an anticipation of likely challenges, which demands an objective assessment of the environment that the project is set to be implemented. The core goal of risk management involves scheduling, budgeting and executing the project responsibly concerning the environment. Risk tackling entails identifying the risks involved, evaluating them and putting a monitor in place to...
4 Pages(1000 words)Essay

Computer Security Policies

...the organization introduces the real (and likely) risk of incompatible data formats; hence, this practice is prohibited as well as use of pirated software. Office software is usually expected to work with other attached peripherals, e.g. fax, scanner, modem, printers, etc. However, and especially with older equipment, the drivers may be obsolete and only operate with certain software etc. Help Desk Personnel will ensure updates are available on a regular basis. ISO/IEC FDIS 17799:2005 REFERENCE(s): 12.01.01 Security requirements analysis and specification POLICY: Securing Servers GOAL: Servers and their associated systems are to be secured using a...
4 Pages(1000 words)Essay

Risk Mitigation and Planning

...Risk Mitigation and Planning Introduction Mitigation planning is an important process for s as well as communities to identify policies, activities as well as tools to implement mitigation actions. Based on research, mitigation is any sustained action which is taken in order to reduce or eliminate long-term risk to life as well as property from a hazardous event. This paper was done in order to discuss mitigation, prevention, preparedness, response, as well as recovery. It also aims to compare response planning, business continuity, and business impact analysis. In order to support the discussion,...
8 Pages(2000 words)Essay

Information security risk assessment and mitigation strategies development

...Information security risk assessment and mitigation strategies development The importance of information technology cannot be denied nowadays. This proposal concerns the study of information security risk assessment and mitigation strategies development. The suggested risk assessment strategy is proposed as a universal paradigm of potential risk occurrence measurement and is positioned as a universal principle relevant to any organization. Introduction Currently, information technologies play a crucial role in the life and activities of any organization. Every company in the modern world is subjected...
5 Pages(1250 words)Thesis Proposal

Mobile Device Security Policies

... Management 9th February, Software restrictions The foremost objective of this essay is to look at how policies are put in place to restrict and protect the use of software. The administrator formulates mobile device security policy to protect all the mobile devices and other software from unauthorized access, use, disclosure, alteration, modification, deletion, destruction and removal. The purpose of these policies and restrictions is to ensure appropriate use of mobile devices and software. This is to secure sensitive and confidential information from compromise and reducing the risk of spreading viruses (Aksoy and Denardis, p 56). It mitigates any other forms of software and device abuse such as use of pornographic materials... . The...
2 Pages(500 words)Research Paper

Risk Management model for Mitigation

...Risk Management model for Mitigation The art of records management is a crucial element in determining the performance of bigcompanies and businesses. It is important for a business establish effective records management for it to run and achieve its mandates smoothly. According to Rush and Vednere (2014), there are five main risks that present themselves in an organization’s records management system. They include: Legal risks These arise from possible or pending legal actions such as non-public laws violation or previous fines. Regulatory risks These might arise from inability to provide state or federal agencies with proper records for examination,...
2 Pages(500 words)Essay


...Mitigation and Risk Reduction Mitigation and Risk Reduction Strengths and Issues Related to Current Border Security Measures The vocalization of international and other forms of terrorism across different countries as a core issue in the United States security policy after the 9/11 terror attacks has resulted in a rethink in policies while including bureaucratic shifts that have demonstrated a rethink of the part played by borders in the country’s security policy. The securitization of terrorism has been represented through distinguishing terrorism as a...
3 Pages(750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Security Risk Mitigation Policies for FREE!

Contact Us