StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Policy Analysis - Essay Example

Cite this document
Summary
With the current growth of information and communication technology, people need to connect to the internet to run their daily businesses locally and…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Security Policy Analysis
Read Text Preview

Extract of sample "Security Policy Analysis"

Security policy analysis Security Policy Analysis Q1.Obligations of non-IT executives and managers concerning cyber security Cyber security is a very vital issue, which should affect the daily routines of every individual and organization globally. With the current growth of information and communication technology, people need to connect to the internet to run their daily businesses locally and internationally. The growth enhances the expansion of the cyber security in most organizations. The issue compels the non-information technology executives and the managers to join the circle as the security obligated executives (SOE).

The executives are pulled into the cyber security out of obligation not by choice because of the importance of information technology internationally. The successful executives value business information and strive to improve and maintain it using latest technologies at the expense of the organizations to promote the cyber security (Van der Zwaan et al 2010)Q2.Should failure to cyber crime leads criminal charges Since lack of implementation of cyber, securities to any organization pose threats to the breach of the confidential company information and database attack.

There is legislation permitting the criminal charges against the responsible personnel’s under the federal information Security Management Act of 2002 also called E-Government Act. The incessant failure to protect the firms against cyber attack would lead to the involvement of the Government. Information is an important entity of any well-run organization and failure to protect it is a crime.Q3.why cyber crime no longer a technical issue Cyber security being an important segment of the organization to maintain and keep data safe, the IT security applications alone is not sufficient to protect the cyber attacks and threats.

The frequency of cyber crime is increasing its size and sophistication with specialized professionals involved that technology alone cannot stop cyber crime. The attacks increase because of the creation of malware by criminals to steal information, and the breaching of Firewalls to reach the organizational important data. The cyber security is no longer a technical issue because ofBreach of firewallsMalware spreadSystem Hacking The only option to cyber crime is the incorporation of the human ability to reduce the cybercrime perpetrators by gathering intelligence.

ReferencesBollen, J., Hers, S., & Van der Zwaan, B. (2010). An integrated assessment of climate change, air pollution, and energy security policy. Energy Policy, 38(8), 4021-4030.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 words - 2”, n.d.)
Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 words - 2. Retrieved from https://studentshare.org/information-technology/1692351-security-policy-analysis
(Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 Words - 2)
Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 Words - 2. https://studentshare.org/information-technology/1692351-security-policy-analysis.
“Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 Words - 2”, n.d. https://studentshare.org/information-technology/1692351-security-policy-analysis.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Policy Analysis

Fundamental Obligation of Homeland Security

policy analysis Introduction America is fighting against enemies with the intent of attacking the American nation whilst destroying people's way of live.... It is the duty and policy of Homeland Security to guide the nation as they commit themselves to achieve a more protected Homeland, which can sustain the people's way of life.... The document provided a good example of how to create public policy (Forest, 2006, p.... The statement has salient points and the powers required in turning policy into law....
4 Pages (1000 words) Essay

Security in Public Transport

This brings us to the policy commitments of the DFT in context of crime.... In view of its policy commitments, a major issue is raised in the fact that episodes of crime and disorder rarely come to the notice of crime agencies, irrespective of the fact that they are serious concerns that are beginning to shape people's choices when it comes to mode of transport and the time or situation when they avail public transport facilities.... Further, a recent survey of both users and non-users of public transport indicates that, after service and reliability, over 50 percent of respondents felt personal security should be the priority area for improvement....
4 Pages (1000 words) Essay

W5-Data Security Policy

This paper comprises the detailed analysis and recommendations regarding the improvements to our department's data security policy.... The W5-Data security policy incorporates following main points regarding the organizational data (W5-data security policy, 2009) Security risk: The data and information security risk can be illustrated as the intensity of affect on organization activities (comprising operational jobs, illustrations, or status), organization possessions, or individuals ensuing from the procedure of an business information arrangement offers the possible influence of a hazard and the probability of that intimidation occurring (Rebecca, 2007)....
5 Pages (1250 words) Essay

Stakeholder Analysis for the Democratic-Republican National Convention (DRNC)

The analysis will define the organization through explaining its main missions and vision as well as the areas that it covers… The analysis identifies the main stakeholders that will attend at the National Convention event while defining the concerns and interest they have.... It will go further to evaluate the organization through a SWOT analysis so that the Apart from presenting information on the strategy that the department will employ, it will also come up with recommendations that will assist the department as it seeks to satisfy the needs of its stakeholders....
5 Pages (1250 words) Essay

Writing a policy about Human Resources Security

However, policies on external cloud computing services as a source of human resource security have accelerated via internet based servers since External cloud computing services Policy on external cloud computing services for human resource security policy introduction Cloud computing entails loading computer data, on multiple servers, that are used regularly can be retrieved via the Internet.... Cloud Computing: Overview and Risk analysis.... analysis of computer system vulnerability....
1 Pages (250 words) Assignment

Does the US Border Control Reflect Best Practice from an International Perspective

The United States border control policy is one of the policies that has affected the operation at the border and has been a challenge to both the citizens and immigrants.... The main mission of border patrol policy in the United States is to control terrorist weapons and terrorists… The border control policy has been tightened after the 9/11 attack that led to hundreds of American citizens losing their lives.... The paper is a discussion on the impact of border control policy towards the citizens as well as its opportunities and challenges....
5 Pages (1250 words) Essay

Policy Briefing

The main mission of border patrol policy in the United States is to control terrorist weapons and terrorists themselves from entering the county as well as identifying the people who are likely to enter the county without permission or in an illegal manner.... The border control… The policy has therefore been affected to prevent entrance of weapon of mass destruction into the county (Wang, 2009). While the border control policy has changed Its main mission has remained unchanged; to prevent and detect illegal entry of people into the United States of America....
5 Pages (1250 words) Essay

A Common Foreign and Security Policy

The paper "A Common Foreign and security policy" investigates the correlation between enlargement and the challenges associated with a Common Foreign and security policy.... This essay concludes with the reasons why an enlarged EU is problematic for the creation of a fully integrated Common Foreign and security policy.... nbsp; The institutional framework of the European Union is unique and this research paper will explore the development of a Common Foreign and security policy (CFSP) in the wake of new challenges in the twenty-first century....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us