StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Evaluate the options at the security manager disposal to respond to organizational lost - Essay Example

Cite this document
Summary
Since this issue is so widespread, no sector of the society is estranged from it. Exposure of confidential information has been cited as one of the single greatest…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Evaluate the options at the security manager disposal to respond to organizational lost
Read Text Preview

Extract of sample "Evaluate the options at the security manager disposal to respond to organizational lost"

Download file to see previous pages

The capability to access and circulate data quickly and readily sounds marvellous from a productivity viewpoint; however, this is terrifying from a security perspective. Numerous studies have demonstrated that employees can equally do damage. This essay will mainly focus on the threats, dangers and risks that organizations are exposed to in the arena of Information Technology, approaches that managers can adopt to reduce them. The paper explores the implication of data theft for an organization within the financial sector with a bias towards insider threats.

The key danger facing organizations emanates mainly from information technology; other hazards may include negligent workers, unsatisfied employees, data theft, documents and improper disposal of data (Blackwell 2009, p.8). In response to security threats to organization’s data, organizations have implemented diverse tools to mitigate and contain those threats through approaches such as passwords, encryption, firewalls, access-control lists, network traffic monitoring, system audits, and patch management.

However, despite this arsenal, organizations cannot entirely impede the flow of proprietary data, confidential information, and trade secrets. An organization can frequently detect or control when an outsider (or a non-employee within the organization) attempts to access organizational data, either physically or electronically, and as such, the organization can be able to lessen the threat posed by an outsider stealing organization property. Nevertheless, the “thief” who can be considered harder to discover and who can render the most damage is the insider or employees who have legitimate access.

Insiders embody authorized users with genuine access to corporate networks, data, and applications. Insiders include, but are not limited to, board members, employees, executives, business managers, IT consultants, contractors, and outsourcers. Specialists who

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Evaluate the options at the security manager disposal to respond to Essay”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1613508-evaluate-the-options-at-the-security-manager-disposal-to-respond-to-organizational-lost
(Evaluate the Options at the Security Manager Disposal to Respond to Essay)
https://studentshare.org/miscellaneous/1613508-evaluate-the-options-at-the-security-manager-disposal-to-respond-to-organizational-lost.
“Evaluate the Options at the Security Manager Disposal to Respond to Essay”, n.d. https://studentshare.org/miscellaneous/1613508-evaluate-the-options-at-the-security-manager-disposal-to-respond-to-organizational-lost.
  • Cited: 0 times

CHECK THESE SAMPLES OF Evaluate the options at the security manager disposal to respond to organizational lost

Strategic Management of the Eden Project

The Eden Project is located at Bodelva, in Cornwall, on the south-west coast of England, and is built in an old china clay mining pit with exhausted natural resources.... The reconstructed site represents a vivid combination of house plants, crops and landscapes to communicate its story in a "Living Theatre of Plants and People" (www....
16 Pages (4000 words) Essay

Disaster Recovery Planning for NIST

According to Herman Mehling, "A disaster recovery plan is a bit like car insurance; you don't realize its value until you're in an accident" (Mehling, 2007).... This was the common state of affairs in every organization a few years back.... Most companies felt disaster recovery was an unnecessary investment because the management felt that they were safe from physical disasters....
8 Pages (2000 words) Essay

Risk assessment

Product design and manufacture for societal impact includes personnel health, operational safety, security of personnel and systems, and work ethics.... The procedure enables complete a risk assessment on a consultancy basis.... The procedure addresses the following issues with regard to SHE performance: products,… rvices, processes and production operation; subcontracting and purchasing activities; off site processes including delivery, installation and servicing; change management (product or process introduction and modifications); legal obligation compliance; and risk quantification A risk based approach has been adopted for the development of a system for managing health, safety, and environmental risks....
11 Pages (2750 words) Essay

Are States the Worst Perpetrators of Terror

The definition of crime by… State crime is given several descriptions such as delinquency, governmental crime, lawlessness, illegality, misconduct, official deviance, human rights violation, and crimes State crime is treated as a response or a consequence to the incidence of threats to national security, insurgent violence or a phenomenon that is endemic to the transitional and the third world countries (Ross 2000, p3).... This paper will critically evaluate state crimes in light of its seriousness in various occasions....
12 Pages (3000 words) Essay

Value Chain Analysis for Battery Manufacturing Business

Risk in an organizational concept may be defined as a negative and in rare cases positive deviation from the expected outcome due to uncertainty effects on objectives of the… It is a critical issue in management and must be dealt with effectively and competently otherwise, it might be the of a company's downfall.... As a manager of the battery manufacturing company, Bart Erry Ltd, I would employ risk management and assessment for evaluation of risks in order to take remedial actions in line with achieving these benefits and minimising loss of value to hazards and uncertainties....
7 Pages (1750 words) Essay

The Role of Resources Manager on the Business

The resources, which are required by the in the implementation of the… The buildings ought to be designed with regard to the state-of-the-art designs in order to attract many clients of the day spa business. The resource manager must ensure that the day For instance, it is the onus of the management to ensure that services are offered on demand.... The other role of the resource manager is to strive to attain maximum sales volume and continuous increase in the cash flow....
22 Pages (5500 words) Essay

Strategy Formation and Development of a Contemporary Business Organizations

” Strategic management facilitates a clear and precise understanding of the external environment and helps the organizations and managers in devising appropriate plans to combat such external forces and thereby protect their organizational goals and objectives.... Organizations often use strategic analysis as a tool for conceptualizing its competitive environment as well as the resources at its disposal which could be used for framing adequate policies and measures in order to fulfill its long term strategic visions and goals....
12 Pages (3000 words) Coursework

Potential Emergencies Caused by Small Fires in the Workplace

… The paper "Potential Emergencies Caused by Small Fires in the Workplace" is a good example of a term paper on social science.... nbsp;In Australia, cases of small fire emergencies have been witnessed for many years.... Small fire emergencies can be tackled with immediate responses that involve many activities, resources, and stakeholder inputs (Leonard, 1998)....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us