StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Security Program - Case Study Example

Cite this document
Summary
Security planning is one of most important risk management initiatives in modern organizations. Security planning must be seen in the context of wider organizational policies. Many aspects of security planning will be taken care of by, for example, the IT department or its equivalent…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Security Program
Read Text Preview

Extract of sample "Security Program"

Download file to see previous pages

The organization under analysis is the New York public library. In this organization, security issues are taken into account as the library gather and keep personal data of users and their personal information. The New York public library consists of several branches and departments; it has regional branches and has more than 43,975,362 items. The library computerized its lending services in order to improve customer service and improve its routine work. The security program is aimed to protect users from unauthorized access to their information and protect library from attacks.

Beyond that, however, all staff-especially those who deal with personal data regularly-need to be aware of what they are allowed to do, what they are not allowed to do, what security procedures they are expected to follow, and whom to ask if they are in any doubt. There must be policies spelling out what is expected, opportunities for staff to know what those policies are and what procedures are required to implement them, and regular checks on whether the policies and procedures are being followed (Data Security and Protection 2008).

The security program was implemented 5 years ago. It is supposed that the biggest risk to security is almost always staff. The damage they do can be deliberate-stealing information about people, such as business contacts they want to use for their own purposes, for example, or trashing the database out of frustration on being demoted. More often it is un-thinking or inadvertent-giving information over the telephone to someone who shouldn't have it, leaving confidential files on their kitchen table for a neighbour to see when they are working at home, or chatting in the canteen about a user's borrowing habits where other people can overhear.

Even with external threats, the accepted wisdom is that anyone trying to gain access is more likely to succeed by tricking staff into giving away vital information than by hacking straight into computer (Data Security and Protection 2008). The first line of defense is therefore to ensure that staff are aware of the possibilities and operate within a culture where information, and especially personal data, is handled carefully and responsibly. To support them, employees should take measures that make it as easy as possible for them to do the right thing.

At the same time employees should not be over-anxious. Security measures must be appropriate to the threat, not 100% perfect every time. (Even government security agencies have been known to lose vital information held on laptop computers.) The kind of things the responsible person at the departmental level should be looking at include (Baschab et al 2007; The New York Public Library 2008). In the New York public library, one area that often gives rise to concern is e-mail. Although the dangers can be exaggerated, it is important to be aware that e-mail is inherently insecure.

E-mails themselves may constitute personal data if the addressee is identifiable. More importantly, if e-mail is used for sending personal data to other people, some thought should be given as to whether it should be encrypted. A special attention is given to the information department of a charity. A new computer system is introduced for holding details of telephone enquiries, which

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Program Case Study Example | Topics and Well Written Essays - 1750 words”, n.d.)
Security Program Case Study Example | Topics and Well Written Essays - 1750 words. Retrieved from https://studentshare.org/miscellaneous/1508167-security-program
(Security Program Case Study Example | Topics and Well Written Essays - 1750 Words)
Security Program Case Study Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/miscellaneous/1508167-security-program.
“Security Program Case Study Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/miscellaneous/1508167-security-program.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Program

State of Maryland Information Security Program Survey

State of Maryland Information Security Program Survey Name Institution Introduction State of Maryland is one of the States in the United States, made up of several agencies.... of Maryland Information Security Program Survey Introduction of Maryland is one of the s in the United s, made up of several agencies.... The accomplishment of the objectives of the State of Maryland fits into the information Security Program, which recognizes the role of information systems in streamlining various processes....
3 Pages (750 words) Research Paper

The US Department of Veterans Affairs

Information Security Program Survey: US Department of Veterans Affairs (VA) Executive summary The United States Department of Veterans Affairs (VA) is government powered departmental system for providing services for the wellbeing of military veterans, their families, and survivors.... Recently, the VA has implemented the Continuous Readiness in Information Security Program (CRISP) to enhance the privacy of information about Veterans and their families.... This information Security Program greatly fits the VA's FY 2010-2014 strategic plan because this program notably contributes to value optimization and stakeholder satisfaction....
4 Pages (1000 words) Essay

The Unification of Information Security Program Management and Project Management

The breakthrough of the new technology and the aim of any organization or enterprise to achieve development and better service have pushed the unification of Information Security Program Management and Project Management.... In light of the mentioned union, his paper will discuss the risks brought about by the new technology, the tasks to be dealt with in developing the Enterprise Information Security Program, and the adherence to executing risk management.... The unification of Information Security Program Management and Project Management comes with new security threats/risks that must be addressed accordingly....
5 Pages (1250 words) Article

Information Security Program Development

This paper "Information Security Program Development" discusses information itself as an asset most important to an organization.... hellip; Teams can be developed from separate functions of the organization that can judge the data and sees what kind of security is required according to the expertise and technologies available.... It is the fundamental requirement and business deeply depends on knowledge and information no matter how big or small a company is or what its information requirements are, all information or raw data lies in the organizations' computer system which is highly pruned to being violated and misused if proper security measures are not adopted....
9 Pages (2250 words) Case Study

Social Security Program

When Roosevelt came to power he created the New Deal which established the social Security Program and a number of other programs to offer temporary relief.... nbsp;  Social security is a program that had its origins in the 1930s.... The author states that we need to do something about social security before it bankrupts the country.... Because of its increasing costs, I would not try to ensure the future of social security....
1 Pages (250 words) Assignment

The Social Security Program

This essay talks about the most efficient run program in all state oriented activities in the United States - social Security Program which It is legally established in America's constitution as the Social Security Act in 1935 and deals with the monitoring process of social welfares of its citizens.... hellip; A major lead in the implementation of the Pension Social Security Program is that it provides additional funds to cater for other essential needs being monitored by the federal government for the sake of its citizens....
1 Pages (250 words) Essay

Social Security Program

The effect Social Security Program The United s social welfare program has been formed both by long standing conventions and by changing budgetary and social conditions.... social Security Program.... Current structure The Office of the Chief Actuary (OCACT) arranges and coordinates a system of actuarial gauges and examines relating to the SSA-managed retirement, survivors and handicap protection programs and supplemental security pay program and to anticipated changes in these projects....
2 Pages (500 words) Essay

Social Security Program in Britain, France and Germany

This literature review "Social Security Program in Britain, France and Germany" determines how the three states fund this program, the types of benefits offered, the challenges they face respectively and the differences and similarities of the program in each of the mentioned three countries.... hellip; A social welfare system is designed and implemented the program, a given state takes to help and provide for the needy people and families.... ince the major elements of social security are the same in the three countries, the main objective will be to determine how the three states to fund this program, the types of benefits offered, the challenges they face respectively and the differences and similarities of the program in each of the mentioned three countries....
8 Pages (2000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us