StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information Security System Management for Swift Courier Company - Capstone Project Example

Cite this document
Summary
From the paper "Information Security System Management for Swift Courier Company" it is clear that it is important for a company to evaluate its position and systematically come up with methods that are meant to help in improving and achieving the company’s targets…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Information Security System Management for Swift Courier Company
Read Text Preview

Extract of sample "Information Security System Management for Swift Courier Company"

Download file to see previous pages

The company interfaces with other international couriers to a great extent. It has been providing services that are specifically aimed at filling the existing gap between freight carriers and national packages, as well as unpredictable and local delivery services. Collectively, the company management team has at least 50 years of experience in areas like transportation planning, logistics, operations, routing, as well as managing mail/postage delivery. They together ensure that clients receive services that creative, professional, and practical.

The company’s operations managers ensure that they are always close to the customers. They are also available for any issue requiring immediate attention.The reason for Request for the Proposal is to outline the possible ways of addressing the major security requirements of the best information security program that can meet the company’s security needs. Swift Courier needs to ensure the confidentiality, integrity, and availability of its data and information. The lack of confidentiality of data/information could result in the stealing of credit card numbers belonging to customers leading to legal implications as well as the loss of the company’s goodwill.

This could consequently lead to loss of customers in the future especially international clients given that the company interfaces with other international couriers. Lack of data integrity on the other hand may lead to the planting of virus software like Trojan horse that would allow intruders to access the company’s secrets information, which may in turn lead to loss of data and information and hence deteriorated availability of data and information. The security program would enhance the company IT department’s steps to mitigate information security risks like the loss of data.

Swift Courier comprises various departments as depicted in its organizational chart in section 1.1.2 (Chandler, 1962). This project proposal can however focus on one department, which is the Information Technology (IT) department. In this regard, the proposal is based on the department’s contingency plan, security policies, risk assessment, and security awareness. Swift Courier’s main requirements are in the areas of contingency planning, risk management, security policies, security staffing, and security awareness.

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information security management (small mail company) smaller to Aramex Essay”, n.d.)
Information security management (small mail company) smaller to Aramex Essay. Retrieved from https://studentshare.org/information-technology/1687823-information-security-management-small-mail-company-smaller-to-aramex-mail-company-in-uae
(Information Security Management (small Mail Company) Smaller to Aramex Essay)
Information Security Management (small Mail Company) Smaller to Aramex Essay. https://studentshare.org/information-technology/1687823-information-security-management-small-mail-company-smaller-to-aramex-mail-company-in-uae.
“Information Security Management (small Mail Company) Smaller to Aramex Essay”, n.d. https://studentshare.org/information-technology/1687823-information-security-management-small-mail-company-smaller-to-aramex-mail-company-in-uae.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security System Management for Swift Courier Company

E-Business Systems and Marketing - Reebok

In this study we study how this feature is being exploited by many online stores including Reebok, a global sports and fitness company with a heritage dating back to 1895.... It's the delivery of targeted qualified traffic to the company's virtual storefront.... This can be achieved by search engine optimization, pay per clicks, or advertisements that draw people to the company's site.... Once they are there it is the job and responsibility of the company to deliver its Unique Selling Proposition (USP)....
12 Pages (3000 words) Essay

IPad's Security Breach

As the text has it, controversy hit Apple's iPad or more specifically the iPad's cellular network, AT&T as a security research company, Goatse Security pointed out a flaw in the security system.... The Computer Security Firm understands that integrity in every corporate aspect is achieved through hard work and honest introspection of the client's security system.... Lockheed Martin is a global security and technology company.... Hackers stole certain data from the company and used it to gain access to the employee remote networks by using the hacked "SecurID" electronic keys....
5 Pages (1250 words) Research Paper

Association of Phoenix Employees

We are encouraging the management to act upon the recommendations submitted by HREG since implementation of the changes would bolster the morale and production of the employees and workers in the company.... Thus, the company remains competitive in the local and global market.... … With the continuous work in PTC, attendance and absences recording and tracking pose a problem to the management.... Modification in the system would save time both for the management and employees....
8 Pages (2000 words) Assignment

The Management of Global Trade Distribution

FedEx has developed the fleet and service base that has built a strong reputation of the company.... Furthermore, the company is also directly impacted by the varying regulations from country to country.... The management of a broad portfolio is conducted under related brand names segregated on the functional basis (Diffen, n.... For example, FedEx launched SenseAware in different market upon receiving security clearance from the respective countries' and related organisations (Leung, 2011)....
5 Pages (1250 words) Assignment

Changes in Transportation Methodologies Associated with the Contemporary Movement of Goods

Due to increasing concerns over sustainability in relation to current transportation policies and initiatives, this business report will identify several advantages and disadvantages associated with modal shift, outsourcing various transportation operations… It would appear, as an additional recommendation for company X, that the firm should actively consider all of the risks associated with both in-house transportation and third-party carriers and then determine whether shifting risk management to outsourced carriers is a more appropriate strategic objective Because the majority of company X products are produced within regions of the EU in which land-based transport eliminates the necessity for moving products via water or airway freight, there would be significant disadvantages to changing the current method of moving goods via land transport....
20 Pages (5000 words) Essay

Networks, Telecommunications and Computing

Users could forward the text to individuals whose number is not within the company database.... This means that potential suits could be posed by the company against the marketers.... Being able to track if the coupon is forward benefits the café because it allows the company to track the effectiveness of the ad campaign itself and determine what segments of the population like specific products.... This makes the company more accessible, to individuals who participate in this virtual world....
6 Pages (1500 words) Research Paper

Intrusion Detection System

Generally, there are basic things to consider when choosing a security system for a facility.... In addition, the appropriate security system should be able to detect any attempt to intrude and alert the security team.... For instance, attackers broke into one major company dealing with software development and accessed their source cord which was for a product that was in the development stage.... This code was later released into the internet and was hence a major blow to the company (Crosbie & Spafford, 1995)....
11 Pages (2750 words) Report

The Security Systems Basis for Design in Gold Storage Facility

The security system's basis for design is an important phase in cold storage facilities.... TO BE PROTECTED LEVEL OF PROTECTION Gold Very High company information/ records/ files Very High Equipment High Employees High Facilities High Website Very High Gold is kept in the strong room for safekeeping.... The same goes for records and files of the company and the company website....
10 Pages (2500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us