Nobody downloaded yet

Organization of Security Plan - Essay Example

Comments (0) Cite this document
Summary
However, this process of achieving such plans is not always seamless as threats and vulnerabilities pop up along the way. When such an organization is tasked…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful

Extract of sample "Organization of Security Plan"

Download file to see previous pages While the aims of such activities are normally driven by the need to access information enough to compromise the market plans for a business organization, it is fatal in the case of security-related organizations such as the department of Homeland security. In this paper, the aim is to prepare a security plan providing security awareness policy for the Department of Homeland Security.
The Department of Homeland security (DHS) is tasked with ensuring that the United States and its citizens are protected against countless threats faced each day. With a workforce of over 240,000 staff, the department’s role is not limited to terrorism. Rather, any activity that seems to jeopardize the security of the American people is detected and subsequently dealt with extensively before it occurs. Cyber-security is on top of the department’s list where cases of hacking are mitigated and culprits arrested where possible. Thus, cyber-attacks are very common to the DHS, and it recently stated that this was one of the major threats the US faces (Kahan, 2014). Though sometimes, mere criminals orchestrate these cases, there is no telling at whose behest they commit such crimes.
In addition to cyber-attacks, the DHS faces the issue of terrorism where terror groups would like to exploit any lapses on the department’s part. Since the department plays an integral role in detecting and averting any acts of terrorism directed at the US, this terrorism threat is indeed a real one. The vulnerabilities include the hacking of its own websites by hackers in a bid to access the highly classified materials. Further to this, the vulnerabilities the department faces are the compromise of information by its staff. While such cases might not be common, a vulnerability cannot adequately be mitigated. The non-disclosure contracts signed do not necessarily guarantee that the information pertaining to the operations happening in the department will remain secretive.
In order to ensure ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Organization of Security Plan Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Organization of Security Plan Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1693058-organization-of-security-plan
(Organization of Security Plan Essay Example | Topics and Well Written Essays - 750 Words)
Organization of Security Plan Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1693058-organization-of-security-plan.
“Organization of Security Plan Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1693058-organization-of-security-plan.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Organization of Security Plan

Security Plan

...? Security Plan Table of Contents Security Plan Table of Contents 2 Introduction 3 Objectives 3 Scope 4 Physical Threat To Organization’s Information Holdings 4 Theft 4 Sabotage 5 Human Mistakes 5 Environmental Distraction 5 Human Threats To Organization’s Information Holdings 6 Computer Fraud 6 Hacking 6 Human Errors 7 Unauthorized Access 7 Information Destruction By Dissatisfied Employees 7 Electronic Threats To Organization’s Information Holdings 8 Organization’s Actual Threat For Information Holdings 9 Security Plan 9 Physical Countermeasures 10 Electronic...
17 Pages(4250 words)Essay

Information Security Plan

...? Information Security Plan October 9, Information Security Plan INTRODUCTION: Computer audit entails safeguarding the company’s holdings. The research delves on the information security risks. The research delves on the on implementing programmes that will reduce or eliminate information security threats in an Australian company setting. Information Security Plan’s safeguarding of company assets policy ensures the Australian company’s business continuity. BODY: a) Identification and description of the organisation’s physical holdings (property) that may be at risk As recently appointed head of a...
12 Pages(3000 words)Essay

Final Organization plan

...?Quality Improvement Plan for G.V. (Sonny) Montgomery VA Medical Center Executive Summary G.V. (Sonny) Montgomery VA Medical Center is concerned about the patient’s safety, health, and care. Over the years, the institution has been faithful to its commitment of giving the best kind of care to the elderly veterans, and make them feel that with them, they are secured of a safe healthcare experience. The goal of promoting satisfactory healthcare knowledge among the medical and non-medical teams and with the patients inspired this plan. Decreasing the rate of patient falls is the priority of the said plan, with special attention to the knowledge and skills of the healthcare providers. Through public reporting and clinical informatics... , this...
11 Pages(2750 words)Research Paper

Security Plan

...? SECURITY PLAN Introduction A security plan is process through which an individual or organization formulates policies that can be used to ensure availability security. Before coming up with a security plan a risk has to be identified, for instance a school can decide to come up with a security plan in order to protect property like computers. This report focuses on the security plan that North Carolina agricultural and state university came up with to protect the university resources especially computers in order to promote quality in...
8 Pages(2000 words)Essay

Security Risk Management Plan

...ongoing process throughout the project life, and it includes process of planning, identification, analysis and finally monitoring and control. With new risk identified with time these processes are updated. With the Rural Internet Kiosk, quite a number of risks are assessed to happens along the setting up of the whole organization and is mainly divided into four; the general management, personnel policies, insurance and general protection against fraud, terrorism and many other potential threats. The potential risk focused at the main four areas need senior management consideration because they will end up affecting the final project production, because for a organization to be...
6 Pages(1500 words)Essay

Security plan

...based System Security 15 8.1- General 15 8.2- Domain name Registration 16 8.3- Security initiatives 16 9- Data Management and Security 16 9.1 Classification 16 9.2- Security initiatives 17 10- Password Security 18 11- Internet usage Security 18 12- Security violation reporting security 18 13- Remote access Security 19 14- Physical Security 19 15- Laptop security 20 16- Generic Security management 20 16.1- General 20 16.2- Classification 21 16.3- Security initiatives 21 17- Corporate Security...
15 Pages(3750 words)Essay

Homeland Security Organization

...Homeland Security Organization The term homeland security contains various functions of dealing with the after effects of attacks through the serviceof civilian and local organizations. Global terrorism and other social evils paved the way for the implementation and strengthening of homeland security and other kinds of security measures after the issue of September 11and the hurricane Katrina in the United States. Current terrorist attacks lead one to think about the drawbacks of original homeland security. One of the most significant inadequacies of original homeland security...
1 Pages(250 words)Essay

Homeland Security Organization

...Homeland Security Organization: critical review The article “Technology, security, and individual privacy: New tools, new threats, and new public perceptions” authored by Lee S. Strickland and Laura E. Hunt, talks about the technologies which are being used for security purposes and their usage and acceptance from the point of view of people on whom they are being used. It was published on February 1st 2005 in the Journal of the American Society for Information Science and Technology, Volume 56, and Issue 3. The above mentioned article does have a clearly stated research question – “Do the people, who are being tracked by the information collection and technologies, understand and approve the use of the same?” It is being seen... that...
6 Pages(1500 words)Book Report/Review

Healthcare organization strategic plan

...Running Head: HEALTH CARE ORGANIZATION STRATEGIC PLAN Health Care Organization Strategic Plan Health Care Organization Strategic Plan Introduction In any health care facility that aims at providing health services that are invaluable to its patients, several strategic resolutions have to be adhered to in all possible means. The success of health care facilities is measured, not by the profits attained but by the number of people who attest to the quality of the healthcare service they received in the facility. Management plan Any organization that aims at being successful in its operation and not just in the health industry must have upright management strategies. These strategies include relevant measures that will result... understands...
2 Pages(500 words)Essay

Security within Your Organization

...Running Head: CIA and Security Implementation in Organizations CIA and Security Implementation in Organizations: A Research Paper goes here Professional Specialization Name of your professor Date Introduction We are living in an age of Information Technology where our reliance on Information Systems range from childhood academic activities to research works at doctorate level and from our daily life to cultural linkages and corporate functions. This heavy dependence on Information Technology and systems that use this technology has instigated serious concerns of security, privacy and authenticity among its users. CIA (Confidentiality, Integrity, and...
3 Pages(750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Organization of Security Plan for FREE!

Contact Us