StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security consultant - Essay Example

Cite this document
Summary
With the advent of computer networks and robust IT resources, the prevalence of malicious network activities such as hacking presents significant risks to the operational integrity of a company. A secured company network is that which has instituted a set of procedures to…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
Security consultant
Read Text Preview

Extract of sample "Security consultant"

Network Risk Assessment Describe the purpose of a risk assessment, risk scope and identify critical areas for an assessment. With the advent of computer networks and robust IT resources, the prevalence of malicious network activities such as hacking presents significant risks to the operational integrity of a company. A secured company network is that which has instituted a set of procedures to safeguard the fundamental networking infrastructure from misuse, disclosure of critical information, or simply access by unauthorized persons.

Risk assessment is a proactive network security measure that serves to identify risks, threats, and vulnerabilities that could endanger the integrity of company’s operations. Secondly, this assessment forms the basis upon which these risks, threats, and vulnerabilities are prioritized in accordance with criticality. Remediation of the identified risks and vulnerabilities can then be effectively budgeted. Also, it is from this risk assessment that compliancy with new IT security laws and regulations can be achieved to avoid legal issues.

Essentially, a properly conducted risk assessment offers a basis through which the company may roll out a set of procedures aimed at protecting company’s assets, which for this case include hardware, software, and critical information. The scope describes what is covered and what is not covered in the assessment by identification of the needs to be protected, sensitivity of the information protected, and the extent of the protection. Defining the scope of network security assessment is important as it forms the basis of understanding the budget and level of security defined by the policies of the company.

Understandably, the scope is a factor of criticality of information that a company has or seeks to protect from damage, manipulation, or malicious disclosure to the public. Areas covered include type of operating systems in used in the computers, access control permissions, port scanning, wireless leakage, firewall testing, intrusion detection testing, and service pack levels. A thorough assessment of these areas identifies the loopholes through which company’s critical information may be compromised.

The aim is to proactively protect these areas from malicious attacks or access. Select risk assessment methodology and give your rationale behind the one you chose.OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a commonly used methodology for strategic assessment and planning of network security risks. The OCTAVE methodology is a technique used to analyze a company’s information security requirements. OCTAVE Allegro is the latest development and is widely used by the CERT Division.

While older versions, which are OCTAVE and OCTAVE-S, are in operation, OCTAVE Allegro is the most preferred for the following reasons: First, OCTAVE Allegro is a self-directed approach in the sense that it allows small teams of a company’s human resource across business units and IT to collaborate in addressing the security needs of the company. Generally, a successful business risk assessment methodology should allow for maximum collaboration. Secondly, the approach is flexible as it can be tailored to the company’s specific risk environment, security and resiliency goals, and skill level.

Lastly, the evolved nature of OCTAVE transforms a company to an operational risk-based perception of security and addresses technology in business setup. OCTAVE can be modified easily and, in conjunction with the aforementioned benefits, can be employed as the fundamental risk-assessment component or rather process for the rest of the other approaches.ReferenceViolino, B. (2010). IT risks assessment frameworks: real-world experience. Retrieved from: http://www.csoonline.com/article/2125140/metrics-budgets/it-risk-assessment-frameworks--real-world-experience.html

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security consultant Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Security consultant Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1662137-security-consultant
(Security Consultant Essay Example | Topics and Well Written Essays - 500 Words)
Security Consultant Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1662137-security-consultant.
“Security Consultant Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1662137-security-consultant.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security consultant

Potential Liability on Cross-site Scripting

(Case Information)Recommendation on the immediate handling of the XSS threat to LIB The first and foremost action recommended is to employ a full-time security consultant and fix responsibilities inclusive of the XSS threat to LIB.... The operations manager, program development manager, and network operations manager must continue to maintain vigilance in security matters and report unusual occurrences to the security department/consultant.... The high-level management personalities of diverse disciplines, howsoever trustworthy, cannot digress from their own responsibilities to justifiably oversee such crucial and important functional branches as online security....
2 Pages (500 words) Essay

Web Services Security

This requires new security demands and solutions.... Most importantly, the web security vendors have to agree to a standard.... Most web services have the security packages in-built while Microsoft also allows free downloads.... Data breach resulting from weak security practices can result in facing lawsuits from the federal and state agencies.... There are too many web services security vendors but they have to advertise their messages in the right manner (Rowan)....
4 Pages (1000 words) Essay

Memo for the American corpration

I have herein provided you with the basic information that is MEMO From Chief security consultant To The Chief Executive Officer 07 November 2008 RE Engaging Safeharbor Company's products and servicesThis is in reference to the company's plan to open up a branch in UK shortly.... As your Chief security consultant, I am concerned mainly about the exportation of live customer data to UK.... businesses that work in the nations critical infrastructure, as reported by a key UK IT security Defense… In line with this, I visited the SafeHarbor website to help the company find a solution to this new challenge....
2 Pages (500 words) Essay

Providing Reliable Security Services to the Company

All issues related to data security need to be addressed in disaster recovery plans in Computer Sciences and Information Technology Being designer distributions' security consultant, it is my legal obligation to provide reliable security services to the company.... Data security is integral for an IT based company.... Data security is integral for an IT based company.... All issues related to data security need to be addressed in disaster recovery plans in order to provide considerable security to the data stored in the computers....
2 Pages (500 words) Essay

Why I Want to Return to School

I currently work as a security consultant and am placed in the middle management in the organization structure.... I am optimistic that this degree will acquaint me with the necessary skills to help me become a subject matter expert in the security career field in the near future....
2 Pages (500 words) Essay

Media - A Fine Line Between Reporting the News and Creating the News

security consultant faces charges after blackmail complaint.... News reporting has always been structured and reported through the information that has been biased with the intention of creating agreeability (Brian 27).... As the… It is hard for viewers to analyze the original content and the source hence there is a fine line (Broderick & Darren 1)....
1 Pages (250 words) Research Paper

Comparison Critique

The news programs now show investigative television series that touch on the daily issues affecting the American people such as crime, sexual… These full-length news programs offer insight to the viewers of the vices that happen behind the scenes and speak for the “unheard voices” as well....
4 Pages (1000 words) Essay

Source Code Analysis

Software security is an important requirement for any business organization particularly the ones dealing with software development.... … By getting to understand and tabling the advantages of the technology as a component of a wholesome software security approach, IT experts can make a convincing case, which leads to an organizations wide acceptance and adoption.... Balancing Between Speed and security in App Development The demand for top-notch applications is increasing for business organizations in the world....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us