Monday, June 17, 2019

Security Plan Essay Example | Topics and Well Written Essays - 4250 words

Security jut out - Essay ExampleHacking6Human Errors7Unauthorized Access7Information Destruction By Dissatisfied Employees7Electronic Threats To Organizations Information Holdings8Organizations Actual Threat For Information Holdings9Security Plan9Physical Countermeasures10Electronic Countermeasures12Human Countermeasures15Information Security cultivation And Awareness Program16Updating The Education And Awareness Program18Measures Used To Test The Efficacy Of Plan19Conclusion and Recommendations20References21Bibliography24IntroductionWith the rapid return in information system and exceptional development of internet, the information security has become a critical issue for every organization. Information is acknowledged as an important monetary asset for organizations, thus, it needs to be secured consequently. In present days, organizations are becoming greatly dependent on information system which all the way manages serious portion of organizations fundamental activities. The role of technology has transformed from a validation tool to the center of main business (Aoufi, 2011). As the technology has improved, mountain have also become more aware regarding possible threats for information theft, cybercrime and other fraudulent activities. Thus, there is a need to prove the information security system in every organization by identifying and removing potential threats. ObjectivesObjectives The objective of this study is to identify and describe the risks of organizations information holdings with respect to somatogenic, compassionate and electronic threats. The study also illuminates a security plan for physical, human and electronic counter measures for reducing the information threats of a business organization fixed in an Australian city. Besides, there is need for adequate pedagogy and awareness program for minimizing risks in the information system. A comprehensive information security education and awareness plan is developed in this paper whic h base help to enhance the information security. Scope The scope of information security is to support the safety, maneuver and administration of organizations valuable information. This study covers the areas such as known threats for organizations security and several countermeasures which can help tidy sum to gain insight about maintaining strong information system in organization. Furthermore, the study describes the methods for developing education and training to employees for increasing knowledge and skill to vacate security problems. Physical Threat To Organizations Information Holdings In this digital information age, physical threats can have significant impact on the information holdings of organizations. Thus, physical threats need adequate attention besides other cyber threats. The scope of physical threat is much inclusive compared to other threats in harm of financial loss. Physical threat can arise at any form and at any time. An organization can face the follow ing physical threats for their information holdings (Bidgoli, 2006). Theft Theft is regarded as one of most common risks for organizations information holdings. Digital information can be physically stolen by people who come from security and Information Technology (IT) background. Outsiders might break or sneak into any organizations network and steal information. Insiders also can enter into a theatrical role of organization for accessing information which they have no right to access or they may abuse access rights which are part of their tasks. Furthermore, physical assaults against rational security can simply be executed by experts (Lindstrom, 2003). Sabotage Sabotage is fairly similar to theft. Sabotage is intentional detriment of information holdi

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.