StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Security Program - Case Study Example

Comments (0) Cite this document
Summary
Security planning is one of most important risk management initiatives in modern organizations. Security planning must be seen in the context of wider organizational policies. Many aspects of security planning will be taken care of by, for example, the IT department or its equivalent…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
Security Program
Read TextPreview

Extract of sample "Security Program"

Download file to see previous pages The organization under analysis is the New York public library. In this organization, security issues are taken into account as the library gather and keep personal data of users and their personal information. The New York public library consists of several branches and departments; it has regional branches and has more than 43,975,362 items. The library computerized its lending services in order to improve customer service and improve its routine work.
The security program is aimed to protect users from unauthorized access to their information and protect library from attacks. Beyond that, however, all staff-especially those who deal with personal data regularly-need to be aware of what they are allowed to do, what they are not allowed to do, what security procedures they are expected to follow, and whom to ask if they are in any doubt. There must be policies spelling out what is expected, opportunities for staff to know what those policies are and what procedures are required to implement them, and regular checks on whether the policies and procedures are being followed (Data Security and Protection 2008).
The security program was implemented 5 years ago. It is supposed that the biggest risk to security is almost always staff. The damage they do can be deliberate-stealing information about people, such as business contacts they want to use for their own purposes, for example, or trashing the database out of frustration on being demoted. More often it is un-thinking or inadvertent-giving information over the telephone to someone who shouldn't have it, leaving confidential files on their kitchen table for a neighbour to see when they are working at home, or chatting in the canteen about a user's borrowing habits where other people can overhear. Even with external threats, the accepted wisdom is that anyone trying to gain access is more likely to succeed by tricking staff into giving away vital information than by hacking straight into computer (Data Security and Protection 2008). The first line of defense is therefore to ensure that staff are aware of the possibilities and operate within a culture where information, and especially personal data, is handled carefully and responsibly. To support them, employees should take measures that make it as easy as possible for them to do the right thing. At the same time employees should not be over-anxious. Security measures must be appropriate to the threat, not 100% perfect every time. (Even government security agencies have been known to lose vital information held on laptop computers.) The kind of things the responsible person at the departmental level should be looking at include (Baschab et al 2007; The New York Public Library 2008).
In the New York public library, one area that often gives rise to concern is e-mail. Although the dangers can be exaggerated, it is important to be aware that e-mail is inherently insecure. E-mails themselves may constitute personal data if the addressee is identifiable. More importantly, if e-mail is used for sending personal data to other people, some thought should be given as to whether it should be encrypted. A special attention is given to the information department of a charity. A new computer system is introduced for holding details of telephone enquiries, which ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Program Case Study Example | Topics and Well Written Essays - 1750 words”, n.d.)
Security Program Case Study Example | Topics and Well Written Essays - 1750 words. Retrieved from https://studentshare.org/miscellaneous/1508167-security-program
(Security Program Case Study Example | Topics and Well Written Essays - 1750 Words)
Security Program Case Study Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/miscellaneous/1508167-security-program.
“Security Program Case Study Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/miscellaneous/1508167-security-program.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security Program

Technology Support System For Homeland Security Program

...? TECHNOLOGY SUPPORT SYSTEM FOR HOMELAND SECURITY Technology Support System for Homeland Security TECHNOLOGY SUPPORT SYSTEM FOR HOMELAND SECURITY Executive Summary The Department of Homeland Security or DHS was created by former U.S. President George W. Bush as a post-9/11 response to the threat of Jhadist terrorism in the United States. The DHS was thereupon mandated to mobilize and focus the vast resources of the federal, state and local governments, jointly supported by the American people. It is aimed at reducing American vulnerability, and minimizing the damage and hastening recovery in case any attack does occur (Hutton and Mydlarz, 2003). Former Senator Rudman views the department to be a needed “formulation” in spite...
12 Pages(3000 words)Assignment

Review and evaluation of information security program

...for information security in banking software industry and their influence on governance of the security program 4 4. Information security governance model and framework 6 5. Implementation of company’s security program, challenges and their remedies 12 6. Measuring the company’s information security program success 13 7. What is working well within the company’s security program? 14 8. What is not working well within the company’s security program? 16 9. Improvement of information security governance 17 10. conclusion 18...
13 Pages(3250 words)Term Paper

Social Security Program Issues

... programs offered to their citizens (Gruber and Wise). These social security programs provide health facilities, income support in case of unemployment, education facilities to the offspring and in some cases, special gifts and bonuses during national festivals etc. The facilities are generally offered to the unemployed, physically disabled due to accidents etc. and senior citizens who have retired from their jobs. History: Human beings have always faced economic uncertainties triggered by war, calamity, famine, physical disability and old age. Different traditions have been developed by human beings since ancient times to deal with the impact of such economic turmoil. The most common and obvious is the stocking of food and resources during...
10 Pages(2500 words)Research Paper

Information Security Program Survey

...fiscal period. The organization operates nearly 800 community based outpatient clinics and 152 medical centers. In addition, it possesses over, 300,000 desktop computers, 30,000 laptop computers, and roughly 450,000 email accounts (CRISP). Recently, the VA has implemented the Continuous Readiness in Information Security Program (CRISP) to enhance the privacy of information about Veterans and their families. This information security program greatly fits the VA’s FY 2010-2014 strategic plan because this program notably contributes to value optimization and stakeholder satisfaction. However, the organization has been performing poorly in major information...
5 Pages(1250 words)Essay

Information Security Program Survey

.... This paper will analyze NASA’s information security program focusing on aspects like strategic fit, breadth and coverage, program deficiencies or implementation issues, and stated costs and benefits. NASA Information Security Program The NASA IT Security (ITS) Division operations under the control the Chief Information Officer to manage security projects and thereby to mitigate vulnerabilities, improve obstacles to cross-center collaboration, and to provide cost effective IT security services for supporting the agency’s systems and e-Gov initiatives. The ITS Division works to ensure that IT...
4 Pages(1000 words)Essay

Information Security Program Development

...” Network Magazine, January 2003. http://www.networkmagazineindia.com/200301/cover9.shtml 2. Definition of Business Risk, HJ Ventures, http://www.hjventures.com/valuation/Business-Risk.html 3. Gabrielson, Bruce C. (1994). Information security program development. Retrieved from http://blackmagic.com/ses/bruceg/progmgt.html 4. Hisrich, R. (2002). Entrepreneurship 7th edition. Mcgraw Hill. 5. Benton, R. (2005). Case study in information security, securing the enterprise. Retrieved from http://www.sans.org/reading_room/whitepapers/casestudies/case-study-information-security-securing-enterprise_1628 6. Computer...
9 Pages(2250 words)Case Study

Social Security Program

... SOCIAL SECURITY Social security is a program that had its origins in the 1930s. This was a period of great upheaval in the United States. It was the era of the Great Depression. Millions of Americans were out of work and had no money. There were simply not enough jobs to go around. When Roosevelt came to power he created the New Deal which established the social security program and a number of other programs to offer temporary relief. It was effective at the beginning, but now is increasingly ineffective as it is unfunded and will soon bankrupt the country. Because of its increasing costs, I would not try to ensure the future of social security. It is simply too expensive and more and more people will have to use it in the future...
1 Pages(250 words)Assignment

The Social Security Program

... The Social Security Program Social security is the most efficient run program in all oriented activities in the United States. It is legally established in America’s constitution as the Social Security Act in 1935. It specially deals with the monitoring process of the social welfares of its citizens. Under the Social Security sector, aspects of pension income for the retirees, unemployment and fund assistance to the physically and financially challenged; are the major programs reflected. Involvement of insurance agencies and compensation companies and how they relate the persons mentioned above is also monitored by the Social Security program. Progress of these three aspect programs has undergone stiff completion. Maintenance...
1 Pages(250 words)Essay

Social Security Program

...Social security program The United s social welfare program has been formed both by long standing conventions and by changing budgetary and social conditions. In its initial history, the United States was a growing nation with a boundless outskirts and an overwhelmingly agrarian economy. Up to 1870, more than a large portion of the Nations mature person laborers were agriculturists. In the years that took after, then again, industry developed quickly and the economy tended undeniably to be characterized by industrialization, specialization, and urbanization. The effect was a Nation of additional workers who were subject to a proceeding stream of cash wage to accommodate themselves and their families (Livingston, 2008). Both the States...
2 Pages(500 words)Essay

Security System In Reference To Immigration

 When James Hollifield delivered this paper at the 1989 Annual Meeting of the American Political Science Association barely three months before the descend of the Berlin Wall he seemed to foretell the crisis situation which the member states of the European Union (at that time the European Community) and the United States would visage when coming to terms with the unprecedented international migration flows they experienced in the early 1990s. With the collapse of communism in Europe and the subsequent rise of irredentist and nationalist tendencies on a global scale, both Western Europe and the United States were faced with the challenge of sustained wide-scale migration flows into their territory throughout the early half of...
11 Pages(2750 words)Report

The World Food Program

However, like many organizations, the World Food Program has its own crises that have apparently affected its programs and projects in all parts of the world. These problems, which will be discussed later, limit WFPs' capacity to distribute its resources and services to distressed countries like Ethiopia. It must be noted that in recent years, food rationing was cut by one third (WFP, 2008). In September 2008, WFP published its Media Backgrounder on Ethiopia which reported that the organization targets to support 9.6 million Ethiopians as well as its funding shortage of US$ 465 million. It also recorder 567,000 metric tons shortage of food which will last until March 2009 (WFP, 2008).
Ethiopia has been among the poorest and l...
9 Pages(2250 words)Assignment

Social Security: Is It in Danger and What Should Be Done

A country that realized the importance of giving the elderly the respect and financial stability they deserve for their lifetime efforts is the United States of America. There was a need for a system that would guarantee a monthly income for retired people. The Great Recession of 1929 left a sour taste in the minds of most American citizens and created greater instability for the nation.  On August 14, 1935, the Social Security Act was passed which created the social security system under the mandate of President Franklin D. Roosevelt (Social security). In 1962 the program was expanded to include medical insurance benefits. Social security has helped bring social justice to American retirees for over 70 years. 
6 Pages(1500 words)Term Paper

The Relationship Between Security, Risk and Health in a Large Organisation

...The relationship between Security & Risk and Health & Safety in a large organisation "Assess the relationship between Security & Risk and Health & Safety in the context of a large organisation. Are they complimentary or the demands of one conflict with or inhibit the realisation of the other? Identify and discuss the implications of your assessment for the roles of the security manager". 1. Introduction The development of commercial activities worldwide has been extremely rapid; firms operating in various industrial sectors need to confront a series of challenges in order to ensure the limitation of risk related with their strategic initiatives. Within this context, the issues of security, risk, health and safety are very likely to appear...
9 Pages(2250 words)Coursework

Active Directory - Security, User, and Resource Management

Administrators make use of group policies to launch principles for desktop predilections and software. For many corporate information technology groups, concurrence with group policies to identify what software should be presented to each category of user, even without human intervention installing it on demand from a corporate server (Silberschatz, Galvin, & Gagine 2002. P. 838). The capability of the AD was introduced in the year 1999, its initial release was with the MS Windows 2000 Server Ed., additionally personalized to spread out functionality, security parameters and build up administration in MS Win Server 2003. The most recent better facilities and efficient edition of the AD are introduced in the Windows Server 2008...
6 Pages(1500 words)Report

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages(1750 words)Assignment

Role of the Police and Private Security

...Report to the Legislator - Committee on Crime and Criminal Justice Congratulations on being appointed to the Committee on Crime and Criminal Justice. As a public servant you are holding a very responsible post that covers many areas of administration including the important role of providing security to the citizens of your constituency and to those individuals who visit it. This report will provide you with a clear picture on the role of security agencies with regard to homeland security. Many of the points mentioned here may be new or already known to you, but they are provided here in any case. It is common knowledge that apart from local and organized crime within the United States, the country is now facing new forms of threats like...
8 Pages(2000 words)Case Study

Improving the Mentoring Program of Dr Hussa Al Husine

Emily's immediate supervisor deems her ‘over-enthusiasm’ as an impediment to her efficiency at work. Thus, she is recommended to lessen the time she spends for every patient.
Although she understands her supervisor’s recommendation from a business operation’s point-of-view, she is still adamant in her belief that gaining customer insights is crucial in aiding the pharmacy in better developing its line-up of medicinal offers. Carrying this burden, Emily consults her mentor in The Medical Nation, Dr Hussa Al Husine.
The mentoring session with Dr Husine happens twice a week for three weeks after Emily’s daily working period. Even without having a firm background in professional coaching, Emily thin...
10 Pages(2500 words)Coursework

Dubai Airport Security Program

...Dubai Airport Security ProgramSecurity and economic development of any nation depend greatly upon the secure activities of its aviation system and the use of globe’s airspace by the nation, its international partners and legitimate business interests. However, weak security will always expose the nation to a threat to the safety of the plane or those that uses it, passengers. Terrorists and criminals have viewed the airports and airspace in general as the target for exploitation and attack (Bjørgo, 2013, p.14). As a result of these threats, nations have concentrated on how to take drastic actions to reduce and prevent these attacks and the effect of future situations. Dubai Airports are taking measures to reduce and prevent threats...
10 Pages(2500 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Security Program for FREE!

Contact Us