Nobody downloaded yet

Poor Security Policies of Welco Insurance PLC - Case Study Example

Comments (0) Cite this document
Summary
The case study “Poor Security Policies of Welco Insurance PLC” explores unpleasant findings of the internal audit and its further advice to prevent security breach attacks, Implement suitable measures, management and administrative, physical and technical control…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
Poor Security Policies of Welco Insurance PLC
Read TextPreview

Extract of sample "Poor Security Policies of Welco Insurance PLC"

Download file to see previous pages Security Management is a huge challenge for many organizations as complexity and uncertainty have increased in today’s world. Organizations are well connected because of technology such as the internet. Internet access is the baseline and an indispensable primary tool in performing day to day activities in the organization. This technology also increases the risks that should be identified and necessary controls are in place to mitigate the new risks. Security Management can conflict within the organization and can pose to be a significant barrier to process and work effectively as the strategic goals are often in conflict with the security rules. Having to protect the organization’s assets and facilitating the employees to do their work is the greatest challenge that the security management faces. (Caralli, n.d)
Dealing with system technology with complex operating work environment can be expensive and can impact the business profits. The high cost involved and nonavailability of the appropriate technical resources has forced some organizations not to develop security management as one of their main core competency activities. (Caralli, n.d)
Security breaches can damage the company’s brand, reputation, trust and can impact the company’s performance. It is the responsibility of the business leaders to have good control and ensure the organization's safety. 
The NERC control systems security working group (CSSWG) has identified some susceptibility for control systems:
- Inadequate policies, guidelines and procedures with respect to control system and security.
- Inappropriate wireless communication used by the employees.
- No proper tools to detect and maintenance control systems, poor password standards.
- No proper tools available on reporting inappropriate activities or security breach through suitable control systems.
- Poorly designed control systems which fail to provide sufficient in-depth analysis, fail to restrict trusted access to control systems.
Failure to change control on software and patches. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Poor Security Policies of Welco Insurance PLC Case Study, n.d.)
Poor Security Policies of Welco Insurance PLC Case Study. Retrieved from https://studentshare.org/information-technology/1733205-case-study-security-management
(Poor Security Policies of Welco Insurance PLC Case Study)
Poor Security Policies of Welco Insurance PLC Case Study. https://studentshare.org/information-technology/1733205-case-study-security-management.
“Poor Security Policies of Welco Insurance PLC Case Study”, n.d. https://studentshare.org/information-technology/1733205-case-study-security-management.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Poor Security Policies of Welco Insurance PLC

Aviva Plc Role in the Modern Insurance Field

...to emerge as one of the leading insurance providers in both these markets. In the USA, Aviva adopted the policy of marketing its life insurance business together with its annuity insurance schemes and has also achieved considerable success in the country. (Annual Report, 2010) Evaluating the importance of each of the six PESTEL factors in Aviva plc’s expansion strategy, it can be inferred the external social, economic and legal factors of the different markets have played the most influential role. Social Factor: Population Demographics The social influences like the population’s health consciousness and perceptions of safety have facilitated the...
6 Pages(1500 words)Assignment

Public Financed Health Insurance Policies

...The hypothesis which forms the basis of this study is "PRIVATELY SPONSORED COMMUNITY EFFORTS ARE MORE ACTIVE THAN PUBLIC FINANCED PROGRAMS IN PROVIDING HEALTH INSURANCE TO THE UNINSURED POPULATION". The purpose of the study is to provide the people with a more coordinated and organized health care program and to analyze the Government policies regarding the issue. The article basically has raised a very critical question which is vital in the building of a socially civilized culture. The study has though been not utilized as it should have been for the social welfare of the deprived subjects. It only emphasizes on the monetary concerns of the Government i.e. increases in the Federal Funds directed...
6 Pages(1500 words)Book Report/Review

Computer Security Policies

..., where manual interaction is required. OBJECTIVE: To ensure security of all corporate servers to prevent intrusion or other unauthorized actions on the servers’ functions. ADDITIONAL GUIDANCE: Corporate servers operate on and through communications networks, principally the Internet. Therefore, safeguarding the integrity of the company’s and its associated software and data is critical, especially where 24x7 operation is expected. Information Security issues to be considered when implementing your policy include the following: Malicious or opportunistic damage may occur if your network safeguards fail to prevent unauthorized access to your corporate network. If the network access...
4 Pages(1000 words)Essay

Mobile Device Security Policies

... Management 9th February, Software restrictions The foremost objective of this essay is to look at how policies are put in place to restrict and protect the use of software. The administrator formulates mobile device security policy to protect all the mobile devices and other software from unauthorized access, use, disclosure, alteration, modification, deletion, destruction and removal. The purpose of these policies and restrictions is to ensure appropriate use of mobile devices and software. This is to secure sensitive and confidential information from compromise and reducing the risk of spreading viruses (Aksoy and Denardis, p 56). It mitigates any other forms of software and device abuse such as use of pornographic materials... . The...
2 Pages(500 words)Research Paper

How Poverty Affect Health Insurance among Poor in the USA

...to avail the costly healthy checkup in minimum cost and likewise after having the policy if one is not suffering from any kind of disease then he or she may considers this as a loss in his investment. Poor People get less health care: The recent survey in the USA reveals the fact that the poor people are more vulnerable to be get affected by the chronic conditions, and are not in a financial condition to get proper treatment. In most of the cases survey also proves that thee poor family in the USA are not in a position to afford the health insurance for one and all in their family which directly affecting their treatment. L’Ecluse in her analysis...
9 Pages(2250 words)Research Paper

Changes In School Security Policies

...Memorandum: Changes in School Security Policies May11, Changes in school security policies Introduction Avonte Oquendo was a 14 year old child who studied at Queen’s school in New York. He was an autistic child. This implies that he had to be monitored due to lower mental development. He was found dead after three months after he disappeared, but how did that happen? Well, he escaped from schools via the schools main door. The example of Avonte Oquendo manifests how a child could bypass the security apparatus of schools and land into danger. Reports indicate that he passed a security guard by the main door. The case raised serious...
9 Pages(2250 words)Article

Security Risk Mitigation Policies

...Security Risk Mitigation Policies It is imperative to protect the integrity, confidentiality, and availability of data from misuse by people inside or outside any facility or organization. Security policies and risk assessment aspects should be identified and characterized. In this case, there is a security issues with the wireless network connection as well as physical breach on customer’s personal data. This was due to weak access control policies within the organization. Therefore, there is need of establishing new risk management policies, which will address the two principal security breaches and...
2 Pages(500 words)Coursework

Examining Insurance Policies Part 3

...Examining Insurance Policies Part 3 Dear Sir, Following the preliminary assessment of your insurance needs that we made explaining why you might need insurance in your situation, this is a follow up letter aimed at making you understand your policy conditions. Key would be examining the need for airport premises coverage. Additionally, this letter aims at enabling you become aware of common exclusions that you should keenly look out for while also recommending endorsements that will fill up any gaps in this coverage. While Airport Liability policies may contain many different liability coverage’s, they however will not cover your...
2 Pages(500 words)Essay

Short story

1 Pages(250 words)Essay

Dead Peasant Insurance Policies

...Dead Peasant Insurance Policies Question 1 Insuring top executives in a firm is paramount. Replacing them is usually very expensive and leads to a loss of performance by the firm since they will require spending countless hours recruiting a new corporate leader for the company. It is, however, unethical to cover only the top executives of the firm while ignoring the other employees. All workers are valuable, and they should be covered. It should not be a matter of whom to cover. Question 2 A company owned insurance policy is a good idea if the company observes integrity.. When the company demands that a person seeking for a job has to use the company...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Poor Security Policies of Welco Insurance PLC for FREE!

Contact Us