We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Security Program - Case Study Example

Comments (0)
Summary
Security planning is one of most important risk management initiatives in modern organizations. Security planning must be seen in the context of wider organizational policies. Many aspects of security planning will be taken care of by, for example, the IT department or its equivalent…
Download full paper
GRAB THE BEST PAPER
Security Program
Read TextPreview

Extract of sample
Security Program

Download file to see previous pages... The organization under analysis is the New York public library. In this organization, security issues are taken into account as the library gather and keep personal data of users and their personal information. The New York public library consists of several branches and departments; it has regional branches and has more than 43,975,362 items. The library computerized its lending services in order to improve customer service and improve its routine work.
The security program is aimed to protect users from unauthorized access to their information and protect library from attacks. Beyond that, however, all staff-especially those who deal with personal data regularly-need to be aware of what they are allowed to do, what they are not allowed to do, what security procedures they are expected to follow, and whom to ask if they are in any doubt. There must be policies spelling out what is expected, opportunities for staff to know what those policies are and what procedures are required to implement them, and regular checks on whether the policies and procedures are being followed (Data Security and Protection 2008).
The security program was implemented 5 years ago. It is supposed that the biggest risk to security is almost always staff. The damage they do can be deliberate-stealing information about people, such as business contacts they want to use for their own purposes, for example, or trashing the database out of frustration on being demoted. More often it is un-thinking or inadvertent-giving information over the telephone to someone who shouldn't have it, leaving confidential files on their kitchen table for a neighbour to see when they are working at home, or chatting in the canteen about a user's borrowing habits where other people can overhear. Even with external threats, the accepted wisdom is that anyone trying to gain access is more likely to succeed by tricking staff into giving away vital information than by hacking straight into computer (Data Security and Protection 2008). The first line of defense is therefore to ensure that staff are aware of the possibilities and operate within a culture where information, and especially personal data, is handled carefully and responsibly. To support them, employees should take measures that make it as easy as possible for them to do the right thing. At the same time employees should not be over-anxious. Security measures must be appropriate to the threat, not 100% perfect every time. (Even government security agencies have been known to lose vital information held on laptop computers.) The kind of things the responsible person at the departmental level should be looking at include (Baschab et al 2007; The New York Public Library 2008).
In the New York public library, one area that often gives rise to concern is e-mail. Although the dangers can be exaggerated, it is important to be aware that e-mail is inherently insecure. E-mails themselves may constitute personal data if the addressee is identifiable. More importantly, if e-mail is used for sending personal data to other people, some thought should be given as to whether it should be encrypted. A special attention is given to the information department of a charity. A new computer system is introduced for holding details of telephone enquiries, which ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Security Policy GDI Company
Executive summary This security policy outline outlines how GDI can protect its information technology infrastructure from various threats. This policy documents underscore the fact that information technology form the core of GDI’s success, which justify why this security policy documents concerns itself with protecting various part of the information technology assets.
12 Pages(3000 words)Case Study
Social Security Program Issues
The term social security refers to the system of providing financial, medical and other aids to an individual to protect him from unprecedented crisis situation. In the present civilized world, social security has become an integral part of the activities which a state carries out for the welfare of its citizens.
10 Pages(2500 words)Research Paper
Computer Network Security
From this paper, it is clear that network security appliances are implemented for providing three fundamental functions i.e. prevention, detection, and correction. Some of the most commonly adopted security appliances are Firewalls and Intrusion Detection Systems. Reports and surveys recorded by many organizations indicate a substantial rise.
5 Pages(1250 words)Case Study
Security A+ policy Document Project
Similarly, these physical and indefinable assets must be protected from upcoming threats to Global Distribution, Inc. and Global Distribution, Inc. employees. As a result, the information security policy for Global Distribution, Inc.is a serious business function that must be incorporated within the business operations covering all aspects of Global Distribution, Inc.
9 Pages(2250 words)Case Study
Future State Of Social Security As A Government Program
A brief history of the American social security program will be included in the paper because it is important to understand the company history before we delve deeper into what has caused the financial problems of this particular welfare system. Social Security has been an integral part of the American welfare structure for many decades now. 
4 Pages(1000 words)Case Study
Security
In the daily experience, people expect their lives to be safer, smoother, and easier due to computer technologies which if considered in the context of history, are a fairly recent phenomenon. It has contributed to the rapid expansion of data sets, new information, great incredible knowledge acquisition and hopefully, the enhancement of human wisdom.
6 Pages(1500 words)Case Study
Information security in a real-world business or government agency - Research Paper/ Case Study
The case will first discuss the implementation of CISP (Cardholder Information Security program) by CardSystems to ensure the security of the cardholder information during the processing and storage by
12 Pages(3000 words)Case Study
It security
The company has employee strength of about 500 including IT workgroup of 112 personnel. Given that DechTech Solutions is an IT company, most of its processes and functions are automated
3 Pages(750 words)Case Study
Counter Terrorism and Security Management
Consequently, Homeland security programs are being offered at the institutions of higher learning and various public and private training institutions. Since the September 11 terrorist
5 Pages(1250 words)Case Study
Project #3: Sample Cyber Security Profile (System Security Plan):
There are three types of security controls namely operational security controls, management security controls and technical countermeasures or safeguards. All the three work together in an organization’s information system to ensure that the
12 Pages(3000 words)Case Study
Let us find you another Case Study on topic Security Program for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us