Nobody downloaded yet

Security Program - Case Study Example

Comments (0) Cite this document
Summary
Security planning is one of most important risk management initiatives in modern organizations. Security planning must be seen in the context of wider organizational policies. Many aspects of security planning will be taken care of by, for example, the IT department or its equivalent…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Security Program
Read TextPreview

Extract of sample "Security Program"

Download file to see previous pages The organization under analysis is the New York public library. In this organization, security issues are taken into account as the library gather and keep personal data of users and their personal information. The New York public library consists of several branches and departments; it has regional branches and has more than 43,975,362 items. The library computerized its lending services in order to improve customer service and improve its routine work.
The security program is aimed to protect users from unauthorized access to their information and protect library from attacks. Beyond that, however, all staff-especially those who deal with personal data regularly-need to be aware of what they are allowed to do, what they are not allowed to do, what security procedures they are expected to follow, and whom to ask if they are in any doubt. There must be policies spelling out what is expected, opportunities for staff to know what those policies are and what procedures are required to implement them, and regular checks on whether the policies and procedures are being followed (Data Security and Protection 2008).
The security program was implemented 5 years ago. It is supposed that the biggest risk to security is almost always staff. The damage they do can be deliberate-stealing information about people, such as business contacts they want to use for their own purposes, for example, or trashing the database out of frustration on being demoted. More often it is un-thinking or inadvertent-giving information over the telephone to someone who shouldn't have it, leaving confidential files on their kitchen table for a neighbour to see when they are working at home, or chatting in the canteen about a user's borrowing habits where other people can overhear. Even with external threats, the accepted wisdom is that anyone trying to gain access is more likely to succeed by tricking staff into giving away vital information than by hacking straight into computer (Data Security and Protection 2008). The first line of defense is therefore to ensure that staff are aware of the possibilities and operate within a culture where information, and especially personal data, is handled carefully and responsibly. To support them, employees should take measures that make it as easy as possible for them to do the right thing. At the same time employees should not be over-anxious. Security measures must be appropriate to the threat, not 100% perfect every time. (Even government security agencies have been known to lose vital information held on laptop computers.) The kind of things the responsible person at the departmental level should be looking at include (Baschab et al 2007; The New York Public Library 2008).
In the New York public library, one area that often gives rise to concern is e-mail. Although the dangers can be exaggerated, it is important to be aware that e-mail is inherently insecure. E-mails themselves may constitute personal data if the addressee is identifiable. More importantly, if e-mail is used for sending personal data to other people, some thought should be given as to whether it should be encrypted. A special attention is given to the information department of a charity. A new computer system is introduced for holding details of telephone enquiries, which ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Program Case Study Example | Topics and Well Written Essays - 1750 words”, n.d.)
Security Program Case Study Example | Topics and Well Written Essays - 1750 words. Retrieved from https://studentshare.org/miscellaneous/1508167-security-program
(Security Program Case Study Example | Topics and Well Written Essays - 1750 Words)
Security Program Case Study Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/miscellaneous/1508167-security-program.
“Security Program Case Study Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/miscellaneous/1508167-security-program.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security Program

Technology Support System For Homeland Security Program

...? TECHNOLOGY SUPPORT SYSTEM FOR HOMELAND SECURITY Technology Support System for Homeland Security TECHNOLOGY SUPPORT SYSTEM FOR HOMELAND SECURITY Executive Summary The Department of Homeland Security or DHS was created by former U.S. President George W. Bush as a post-9/11 response to the threat of Jhadist terrorism in the United States. The DHS was thereupon mandated to mobilize and focus the vast resources of the federal, state and local governments, jointly supported by the American people. It is aimed at reducing American vulnerability, and minimizing the damage and hastening recovery in case any attack does occur (Hutton and Mydlarz, 2003). Former Senator Rudman views the department to be a needed “formulation” in spite... ...
12 Pages(3000 words)Assignment

Review and evaluation of information security program

...? Review and evaluation of information security program In this essay, it is pointed out what information security governance is in a banking software company, how it has been implemented and its purpose in the company. It details an information security policy that provides total control, hence compliance, to ensure effective information security governance. Information is a main asset for any institution and measures to ensure security of assets is of key importance. A well implemented information security governance framework should direct and control security policies that are implemented at all levels of decision making Table of Contents 1. Introduction 3 2. Information security governance and its strategy 4 3. Regulations... for...
13 Pages(3250 words)Term Paper

Social Security Program Issues

...programs offered to their citizens (Gruber and Wise). These social security programs provide health facilities, income support in case of unemployment, education facilities to the offspring and in some cases, special gifts and bonuses during national festivals etc. The facilities are generally offered to the unemployed, physically disabled due to accidents etc. and senior citizens who have retired from their jobs. History: Human beings have always faced economic uncertainties triggered by war, calamity, famine, physical disability and old age. Different traditions have been developed by human beings since ancient times to deal with the impact of such economic turmoil. The most common and...
10 Pages(2500 words)Research Paper

State of Maryland Information Security Program Survey

...? of Maryland Information Security Program Survey Introduction of Maryland is one of the s in the United s, made up of several agencies. The State of Maryland strives to promote itself as one of the best states where visitors and citizen can enjoy living, playing, studying and working within the state (About Maryland.gov , n.d) The State of Maryland has made a significant attempt to provide both visitors and citizen’s access to information that are critical for the attainment of specific objectives. In addition, the State of Maryland works with several agencies that execute various functions on its behalf. Consequently, the State of Maryland has high regard to information assets and information exchange...
3 Pages(750 words)Research Paper

Information Security Program Survey

...? Information Security Program Survey: US Department of Veterans Affairs (VA) Executive summary The United s Department of Veterans Affairs (VA) is government powered departmental system for providing services for the wellbeing of military veterans, their families, and survivors. It is the second largest department of the US Federal government and currently employs approximately 280,000 people. VA mainly runs medical facilities and benefits officers for veterans and is responsible for managing the administration programs of veterans and their dependants. As described in its website, VA is one of the world’s largest consolidated IT organizations and the department’s Office of Information...
5 Pages(1250 words)Essay

Information Security Program Survey

...? Information Security Program Survey Information Security Program Survey Introduction The National Aeronautics and Space Administration (NASA) is the United States’ agency to manage the nation’s aerospace research, aeronautics, and other civilian space programs. As per 2011 NASA strategic plan, NASA’s mission is to “drive advances in science, technology, and exploration to enhance knowledge, education, innovation, economic vitality, and stewardship of Earth”. Safety, integrity, teamwork, and excellence are the core values of this government agency. Since the NASA needs to manage highly sensitive data, information, strategic plans, and space programs, the organization pays particular attention to its information security program... . This...
4 Pages(1000 words)Essay

The Unification of Information Security Program Management and Project Management

...The breakthrough of the new technology and the aim of any organization or enterprise to achieve development and better service have pushed the unification of Information Security Program Management and Project Management. As more organizations follow the trend of the new age, more and more people are learning to navigate in the field of Information Security so that they can supply each other the competence they need. The bigger the enterprise, the larger investment is need for the protection of its assets. Project managers are expected to be competent in their job, alongside the people who form a group that will work to make sure they will not be compromising the life of the enterprise....
5 Pages(1250 words)Article

The Social Security Program

... The Social Security Program Social security is the most efficient run program in all oriented activities in the United States. It is legally established in America’s constitution as the Social Security Act in 1935. It specially deals with the monitoring process of the social welfares of its citizens. Under the Social Security sector, aspects of pension income for the retirees, unemployment and fund assistance to the physically and financially challenged; are the major programs reflected. Involvement of insurance agencies and compensation companies and how they relate the persons mentioned above is also monitored by the Social Security program. Progress of these three aspect programs has undergone stiff completion. Maintenance... and...
1 Pages(250 words)Essay

Information Security Program Survey

... This paper seeks to summarize and analyze information security concepts, and it focuses on their application at the department of health and human services. This paper analyzes how the information security programs at the department of human health supports the objectives and goals of the organization. It analyzes the scope of its implementation, that it is widely used in the organization, i.e. the people who uses it, the process of its implementation and the specific information technology in use. This paper identifies the weaknesses of the information system in use, and the costs and benefits of the program. In protecting its information data, the department involves five offices in its organization to effectively secure data... in...
3 Pages(750 words)Research Paper

Social Security Program

...Social security program The United s social welfare program has been formed both by long standing conventions and by changing budgetary and social conditions. In its initial history, the United States was a growing nation with a boundless outskirts and an overwhelmingly agrarian economy. Up to 1870, more than a large portion of the Nations mature person laborers were agriculturists. In the years that took after, then again, industry developed quickly and the economy tended undeniably to be characterized by industrialization, specialization, and urbanization. The effect was a Nation of additional workers who were subject to a proceeding stream of cash wage to accommodate themselves and...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Security Program for FREE!

Contact Us