Nobody downloaded yet

Security Plan - Essay Example

Comments (0) Cite this document
Summary
SECURITY PLAN Introduction A security plan is process through which an individual or organization formulates policies that can be used to ensure availability security. Before coming up with a security plan a risk has to be identified, for instance a school can decide to come up with a security plan in order to protect property like computers…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Security Plan
Read TextPreview

Extract of sample "Security Plan"

Download file to see previous pages This plan was not meant for specifics but rather the whole fraternity (Maiwald & Sieglein, 2002). The plan outlined different elements that were important in ensuring its success and efficiency. Regulations on the usage of the computers were formulated. This plan was also geared towards promoting confidentiality in its operating systems. Different individuals were therefore given different responsibilities that would help in ensuring that security is promoted. Responsibility of users North Carolina agricultural and technical state university decided to share responsibilities of ensuring security. Privacy of one’s information or an organization can easily be intruded through hacking therefore, the technology department appealed to all users of computers to be vigilant and ensure that this vice is not promoted. One of the duties of account holders is to ensure that they maintain privacy by not letting others aware of their account detail. Some people do not think it is very important to keep account information secret; they therefore carelessly display information about their accounts (North Carolina Agricultural and Technical State University, 2008 ) When accessing account users were advised not to go for those that anyone can access, different methods can be applied to ensure security of one’s account. A password is vital it does not mean having a password guarantees one security. They are those accounts with complicated password that cannot be easily accessed. Try to mix different characters in a password for instance use of letters and numbers. Through this method, it will be hard for anyone with ill motives to access your account. This method cannot only be applied in a school situation but also financial institutions. Institutions can take this method so that cases of fraud can be reduced. Banks for instance, use this method when providing ATM cards to their clients; this promotes security to a client’s bank account. Phone holders use this strategy in protecting their information. When formulating this password, users were advised to use figures they can easily remember even after a long period. Remembering your password is important because, it will reduce issues like blocking of an account. Forgetting ones account can lead to great loses, for instance a student using an account for saving his documents will lose his information because he is not to access his account. In a bank situation, clients who forget their ATM pin numbers are force to apply for other cards. This leads to great delays and additional costs that would otherwise be avoided if the password were mastered. Computer users are to ensure that they do not access accounts that do not belong to them and logging off after every session is important. This will ensure that the next user will not be able to access your information. Working or accessing an account in a public place can sometimes is tricky but users are to be careful about those around them and ensure that they are not intruding their privacy. Some students can decide to access their account while in a public place like the field; they should ensure that, when doing this their privacy is guaranteed. Users were further advised to be vigilant and ensure that actions that lead to insecurity are reported to ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Plan Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Security Plan Essay Example | Topics and Well Written Essays - 2000 words. Retrieved from https://studentshare.org/law/1434952-security-plan
(Security Plan Essay Example | Topics and Well Written Essays - 2000 Words)
Security Plan Essay Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/law/1434952-security-plan.
“Security Plan Essay Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/law/1434952-security-plan.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security Plan

Security Plan

...? Security Plan Table of Contents Security Plan Table of Contents 2 Introduction 3 Objectives 3 Scope 4 Physical Threat To Organization’s Information Holdings 4 Theft 4 Sabotage 5 Human Mistakes 5 Environmental Distraction 5 Human Threats To Organization’s Information Holdings 6 Computer Fraud 6 Hacking 6 Human Errors 7 Unauthorized Access 7 Information Destruction By Dissatisfied Employees 7 Electronic Threats To Organization’s Information Holdings 8 Organization’s Actual Threat For Information Holdings 9 Security Plan 9 Physical Countermeasures 10 Electronic Countermeasures 12 Human Countermeasures 15 Information...
17 Pages(4250 words)Essay

Information Security Plan

...? Information Security Plan October 9, Information Security Plan INTRODUCTION: Computer audit entails safeguarding the company’s holdings. The research delves on the information security risks. The research delves on the on implementing programmes that will reduce or eliminate information security threats in an Australian company setting. Information Security Plan’s safeguarding of company assets policy ensures the Australian company’s business continuity. BODY: a) Identification and description of the organisation’s physical holdings (property) that may be at risk As recently appointed head of a...
12 Pages(3000 words)Essay

Network Security Plan

...? Network Security Plan 22 November Lecturers The network infrastructure in every is used to send particularly vital information. The infrastructure is vulnerable to threats like eavesdropping, tapping of network cable and impersonation. These threats can lead to organizations losing their credibility on maintaining security of their clients’ data. Security plans are to help companies identify threats in their network infrastructure. The plan states some of the precautionary measures proposed to provide corrective measures to the network when an infiltration like eaves dropping occurs. The physical security will involve securing network cables and servers from intruders. The intruders might originate from within the organization... or from...
10 Pages(2500 words)Term Paper

IT - Security Plan

...?STAGE 5: SECURITY PLAN Stage 5: Security Plan Affiliation Table of Contents Purpose 3 Scope 4 Target Application Identification and Description 5 Security Issues: 5 Target Application 6 Plan Owner Contact Information 7 Enterprise Architecture/Infrastructure That Supports the Application 7 Organizational Roles and Responsibilities 10 Director or CEO of the Organization: 10 Incident Response Point of Contact: 10 Security Plan Owner: 10 End User: 11 Security Requirements 11 Security Solutions 12 Security Controls 13 Plan Maintenance 14 Plan Approval 14 Well-Health Executive 15 References 15 Elemental Cyber Security, Inc. (2011). Elemental Security and Information Security Policy. Retrieved December 20, 2011, from http... ...
7 Pages(1750 words)Case Study

Security plan

...Running head: Security plan for batteries + business Security Plan for Batteries + Business Affiliation December 2009 Table of ContentsTable of Contents 2 Abstract/Executive Summery 5 1- Business Background 6 2- Scope 6 3- Security Plan responsible person 7 3.1 Batteries+ IT Security Officer 7 3.2 Batteries+ IT Security Manager 8 3.3 Notification 8 4- Unit Plans 8 4.1 Requirements 8 4.2 Mandatory Topics 9 4.2.1 Plan Title 9 4.2.2 Plan Scope 9 4.2.3 Responsible Personnel 9 4.2.4 Host and User Identification 10 4.2.6 Management Responsibility 10 4.2.7...
15 Pages(3750 words)Essay

Enterprise security plan

...Enterprise Security Plan al Affiliation) The paper is a preparation of MEMATECH Solutions Limited security plan proposal. The proposal covers and discusses the ten areas of ISCBK (Information Security Common Body of Knowledge) that incorporates the various groups of information security. It also touches on the success principles and the information security. In addition, the proposal outlines the planning guidelines towards the aims, security policies, and standard taxonomy. The set policies and guidelines comply with rules and standards of HIPAA security. Consequently,...
5 Pages(1250 words)Research Paper

World Cup Security Plan

...World Cup Security Plan Brazil will host the FIFA World Cup in 12 cities in June and the tour nt is expected to attract both local and foreign fans as well as security threats. To this end, the government will invest $855 million and 57,000 troops towards security for the duration of the tournament (Trevisani 1). In total, the security plan will include 100,000 police officers and buying new non-lethal weaponry. Traditionally, urban policing is known to be complicated by the competing of police forces in Brazil and, unavoidably, this will compromise the quality of the security offered and potentially keep ticket-paying...
2 Pages(500 words)Essay

Industrial Security Plan

...Industrial Security Plan al Affiliation) Introduction An industrial safety plan is a set of procedures set forth to protect workers in an industrial setting. Security officers carry out industrial safety plan implementation. In addition, they have responsibilities and roles pertaining to safety inspections, safety training, policy development, and compliance with OSHA, which stands for Federal Occupational Safety & Health Administration. Implementing and developing safety policies aids employers reduce accident-related expenses and avert losses due to a decrease in productivity. The safety officer determines what policies and procedures needed and...
7 Pages(1750 words)Assignment

Organization of Security Plan

...ORGANIZATION OF SECURITY PLAN School Affiliation: Every organization, be it private or government-owned, has its goals, objectives and obligations it seeks to achieve. However, this process of achieving such plans is not always seamless as threats and vulnerabilities pop up along the way. When such an organization is tasked with ensuring a nation’s security, any infiltration on its systems could be disastrous to the citizens. Cyber-security has become an important part of every organization catalyzed by the ever-rising cases of attacks by hackers whose intention is to jeopardize operations for various reasons. While the aims of such activities are...
3 Pages(750 words)Essay

Analysis of Security Plan

...Analysis of Security Plan Executive Summary Concerning the upcoming transition to Electronic Health Record (EHR) system, it is necessary to implement security measures to ensure that all processes flow seamlessly. This is necessary to maintain confidentiality, data integrity and prevent loss of data. The proposed security measures discussed include physical security of hardware, data security, confidentiality, access, disaster recovery, backups, business continuity planning, appointment of chief security officer, employee training methods, and institution of penalties for violating policies. Proposed...
2 Pages(500 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Security Plan for FREE!

Contact Us