StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Assessment of Technology centric Strategies for information security in an organization - Essay Example

Cite this document
Summary
Over the past two decades, the information systems model has changed from a centralised one with limited access to a model that is distributed in terms of how information is collected, shared and made available. This change, together with improvements in computing infrastructure, has exposed new vulnerabilities that simply were not considered before…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Assessment of Technology centric Strategies for information security in an organization
Read Text Preview

Extract of sample "Assessment of Technology centric Strategies for information security in an organization"

Download file to see previous pages

It is a "best practices" strategy in that it relies on the intelligent application of techniques and technologies that exist today. The strategy recommends a balance between the protection capability and cost, performance, and operational considerations." [National Security Agency] Fahey (2004) graduated from the SANS GSEC course and uses their systematic approach to addressing risk through defense in depth. The SANS approach promulgates an efficient and cost effective methodology for improving security.

The organization for which he works already had a number of policies, each designed to address a multi-layered approach to IT security such as operations security, physical security and contingency and disaster recovery. Furthermore external security personnel routinely came to the organization to perform security audits. He was concerned that one area which had not been addressed was: "a systematic procedure designed to protect against electronic attacks from hackers. This was due in part to the false sense of security which comes from being behind a firewall and partly from a lack of experience in the information security field.

" (Fahey, 2004, p3) In putting together a Defense in Depth security policy one must consider the characteristics of one's adversary, the motivation behind an attack and the class of attack. An adversary may be anyone from a competitor to a hacker. They may be motivated by theft of intellectual property, denial of service or simply pride in bringing down a target. Classes of attack include passive or active monitoring of communications, identity theft or close-in attacks. Besides deliberate attacks there may also be inadvertent attacks on the system, such as fire, flood, power outages - and most frequently - user error.

Information Assurance is achieved when information and information systems are protected against such attacks through the application of security services such as:Availability, Integrity, Authentication, Confidentiality, and Non-Repudiation. The application of these services should be based on the Protect, Detect, and React paradigm. This means that in addition to incorporating protection mechanisms, organizations need to expect attacks and include attack detection tools and procedures that allow them to react to and recover from these attacks.

No system is perfectly secure, and it has been argued that no system needs to be. To achieve Information Assurance focus must be balanced on three elements: People, Technology and Operations."Security goals have their own contradictions because confidentiality, integrity, privacy, accountability, and recovery often conflict fundamentally. For example, accountability requires a strong audit trail and end-user authentication, which conflicts with privacy needs for user anonymity." (Sandhu 2004, page 3)Fahey's methodology for evaluating risk used the confidentiality, integrity, and availability (CIA) approach which emphasizes the importance to the organization of a particular information asset.

This approach focuses budget managers on the real threats to reputation and therefore the business' ability to survive against its competitors.Fahey focuses on 3 security risks in his article: passwords, policies and patches. Fahey's risk assessment relies heavily on SANS assessment of the top 20 risks for networks in 2003/4. This brings to light the

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Assessment of Technology centric Strategies for information security Essay”, n.d.)
Assessment of Technology centric Strategies for information security Essay. Retrieved from https://studentshare.org/miscellaneous/1501863-assessment-of-technology-centric-strategies-for-information-security-in-an-organization
(Assessment of Technology Centric Strategies for Information Security Essay)
Assessment of Technology Centric Strategies for Information Security Essay. https://studentshare.org/miscellaneous/1501863-assessment-of-technology-centric-strategies-for-information-security-in-an-organization.
“Assessment of Technology Centric Strategies for Information Security Essay”, n.d. https://studentshare.org/miscellaneous/1501863-assessment-of-technology-centric-strategies-for-information-security-in-an-organization.
  • Cited: 0 times

CHECK THESE SAMPLES OF Assessment of Technology centric Strategies for information security in an organization

Leadership and Performance Beyond Expectations

Comment on the strategies adopted by the firm.... Corporate strategies have been divided into Five Ps by Mintzberg and they are Plan, Ploy, Position, Pattern and Perspective.... While each is a separate type of strategy with its attendant qualifications, yet they are usually present in all strategies to some degree.... At best these are short term strategies aimed at specific situations....
13 Pages (3250 words) Essay

The Development Information Security

Consequently, this ever-increasing security threat has led to the development of numerous information security standards.... This security framework provides steps to establish best suited information security Management System (ISMS) for SMEs.... Moreover, it provides support for effective use of technology, central management, adaptability, flexibility, performance, interoperability and compliance on the forefront.... Standards, procedures and practices provided to larger organization easily swamp the SMEs....
25 Pages (6250 words) Essay

Information Systems Security

The paper "Information Systems security" concerns such security systems as PIN numbers, key card accesses, and passwords that could be easily stolen and hacked.... security mechanisms and governance controls have been introduced to prevent loss or theft of vital customer data.... hellip; Many public and private sector information systems have failed to meet the desired security standards and protocols defined by IT compliance rules and regulations....
8 Pages (2000 words) Essay

Evaluate the options at the security manager disposal to respond to organizational lost

The paper explores the implication of data theft for an organization within the financial sector with a bias towards insider threats.... an organization can frequently detect or control when an outsider (or a non-employee within the organization) attempts to access organizational data, either physically or electronically, and as such, the organization can be able to lessen the threat posed by an outsider stealing organization property.... In response to security threats to organization's data, organizations have implemented diverse tools to mitigate and contain those threats through approaches such as passwords, encryption, firewalls, access-control lists, network traffic monitoring, system audits, and patch management....
11 Pages (2750 words) Essay

Forensics and Security

A security assessment is a means to enhance the information technology security of an organization.... hellip; The aim of carrying out a security assessment is to determine an organization's maturity level and enable it to discover its organizational, legal as well as technical risks.... With the increased dependence on computer systems, the risk relating to information security has no doubt joined a range of risks that organizations have to manage (Landoll, 2011)....
4 Pages (1000 words) Essay

System Security Threats and Vulnerabilities

Adoption of strategies requires an assessment of needs and capabilities (An et al.... omputer security is based on the following elements: Computer security supports the organization's mission; Computer security is an integral element of management;... The paper "System security Threats and Vulnerabilities" describes that the web-based service would be achieved through distributed interactivity.... The development of service-oriented solutions requires an architecture-centric model....
8 Pages (2000 words) Assignment

The Development of Security Domains

It can be asserted that unreliable access may significantly distort stored data of an organization with respect to 'crashing', 'modification', 'disruption' and 'disclosure'.... hellip; In the present modern era 'information security Management', has been one of the most crucial factors with the help of which organizations can ensure their efficiency and effectiveness.... As an effect, 'information security Management' has been applied by SMEs for managing data for decades (Dhillon & Torkzadeh, 2006; Whitman, 2004)....
17 Pages (4250 words) Term Paper

Promoting Information Security in Banking Solutions Inc

This case study "Promoting information security in Banking Solutions Inc" focuses on the major information security issue faced by Bank Solutions Inc.... Skipping some item processing facilities poses an information security risk to both customers and the institution.... Skipping some item processing facilities poses an information security risk to both customers and the institution.... ther failures contributing to information security issues include problems regarding critical systems, business processes, alternative processing facility address as well as directions, notification listing, and procedures for public relations management....
5 Pages (1250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us