StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Security Planning - Essay Example

Cite this document
Summary
The essay “Information Security Planning” focuses on information security, which is about taking care of business continuity which involves media backup operation, monitoring of incidents, classifying information and suitably providing access to this information to members of the company…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Information Security Planning
Read Text Preview

Extract of sample "Information Security Planning"

The company needs to be prepared to combat virus attacks, ingress of unsolicited visitors and possible attacks by competitors on the company's information bank. To provide a safe and working repository of information, it is essential that the company has a well-planned security policy in place. 2. The information security should be compliant to IS 17799 standards. This would bring about periodic security audits and would also ensure that there is a clear security policy in line with the objectives of the company. 3. To ensure that there are a well-defined acceptance criterion and milestones for every security measure and that this adhered to.

And that these criteria and the milestones are in line with the cost and budgeting dictated by the management of the company and to develop a comprehensive information security education policy. 4. To ensure that the company is in a state of readiness to combat potential disasters. Prevention and identification of crime, fraud, and theft in the workplace by ensuring both physical and logical security. A security review or audit is done to identify the existing security, the degree of protection needed, locate the weaknesses in the system and recommend security steps that are needed.

This should also throw out information that has to be secured. Out of the list of jobs that need to be done for the security betterment a priority list is to be made in order of importance for security and the tentative cost for effecting the same. Priorities are laid down based on the company objectives and policies that are critical to company targets. In some of the locations, virus attacks could be frequent and these need to be countered on a priority basis maybe because they are eating out on the productive time of the employees of the company and data get lost.

In some cases, it might be that the data is getting out of the company through physical means in the form of CDs or flash drives. 3Establish the feasibility of implementing.A comprehensive list of jobs that has to be carried out and their feasibility in the company needs to be established and accordingly, the 'what-is-possible' list is produced.4Identify whether the planned actions will fit into the budget.Based on the priority and the feasibility list the plan is further fine-tuned with another constraint namely, the budget.

If the budge should allow then the needed actions may be done, else they get pruned.5The need for security is to be fixed.Based on all these factors, the needs for the security are finally fixed and then the requirements are made into one single list.6Fix the responsibility for implementing.Using this list, it is important that the responsible person for each activity is fixed and the same is implemented through that specific person.7Train the people in the company and create a secure culture.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Information Security Planning Essay Example | Topics and Well Written Essays - 500 words, n.d.)
Information Security Planning Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/management/1526348-information-security-planning
(Information Security Planning Essay Example | Topics and Well Written Essays - 500 Words)
Information Security Planning Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/management/1526348-information-security-planning.
“Information Security Planning Essay Example | Topics and Well Written Essays - 500 Words”. https://studentshare.org/management/1526348-information-security-planning.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security Planning

Network Security

The Internet has become a staple of the business world today It is because of this that a company should remain continually up to date with the latest security measures.... ulnerabilities due to designs flaws,poor security management can contribute to the loss of company assets… With the dramatic growth in network reliance also comes the opportunity for illegal and malicious activity.... The Internet has become a staple of the business world today It is because of this that a company should remain continually up to date with the latest security measures....
3 Pages (750 words) Case Study

Information Security Program Survey

information security Program Survey (Name) (University) (Date) information security Program Survey Introduction The National Aeronautics and Space Administration (NASA) is the United States' agency to manage the nation's aerospace research, aeronautics, and other civilian space programs.... Since the NASA needs to manage highly sensitive data, information, strategic plans, and space programs, the organization pays particular attention to its information security program....
4 Pages (1000 words) Essay

Systematic Security Management

rivacy, authentication and authorization are to make sure the integrity, availability and security of the system.... It is like, letting the users as well as general public access the same information but by changing its context and usage subjectively, it may have different meaning to different… Rights on changing the information are provided only to the user having authentic means to reach the information and proper authorized identity which is disclosed to the information cluster by the user and information is updated by user. ...
5 Pages (1250 words) Essay

The Automobile Industry

The paper 'The Automobile Industry' presents the leading industrial activities in this modern world.... Starting out only as far back as the second half of the nineteenth century, with its roots in the developed world of Europe and the United States of America, the automobile has progressed.... hellip; In the present world, the consequences of globalization have led to extreme competition in most industrial segments including the automobile industry....
7 Pages (1750 words) Case Study

Evaluate the options at the security manager disposal to respond to organizational lost

Exposure of confidential information has been cited as one of the single greatest… The present attitude toward electronic data revolves around the notion that all employees ought to be able to gain access the information from anywhere and share it with colleagues, vendors, and The capability to access and circulate data quickly and readily sounds marvellous from a productivity viewpoint; however, this is terrifying from a security perspective.... In response to security threats to organization's data, organizations have implemented diverse tools to mitigate and contain those threats through approaches such as passwords, encryption, firewalls, access-control lists, network traffic monitoring, system audits, and patch management....
11 Pages (2750 words) Essay

Internet Security: Privacy and Confidentiality

This paper “Internet security: Privacy and Confidentiality” is an attempt to analyze the present concerns regarding privacy and confidentiality issues as applicable to human resource departments in organizations and government offices which use Web-based applications.... Recent developments in the field of encryption of data and other forms of securing privacy of information are also discussed.... rdquo; Till the 1990s, human resource functions were entirely based on paper-based documented means of communication and storage of information on the staff and personnel of the organization concerned....
20 Pages (5000 words) Research Paper

Data Mart Company Information Security Policy

The paper "Data Mart Company information security Policy " describes that DM Company will not install filters meant to regulate access to emails, chat rooms, instant messaging and websites basing on contents alone unless the content in question is illegal like the child pornography sites.... As per The National Institute of Standards and Publication, the management should define three categories of security policies namely system-specific security policy, issue-specific security policy and enterprise information security policy....
21 Pages (5250 words) Case Study

Impact of Data Security on Enterprise Information Security Planning

… Impact of Data Security on Enterprise Information Security Planning Executive SummaryAdvancement in technology affects each and every sector of life including information security of a given business firm.... Technology influences the way organization Impact of Data Security on Enterprise Information Security Planning Executive SummaryAdvancement in technology affects each and every sector of life including information security of a given business firm....
13 Pages (3250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us