Verified Document

Insecurity Managing Issues Of Information Insecurity The Essay

¶ … Insecurity Managing Issues of Information Insecurity

The field of Information Technology is unique among professional disciplines due to its high-paced atmosphere. The quick change of technology, particularly within the context of systems design and electronic information data-basing means that management in this field must be prepared to acclimate to security demands, practice obstacles and end-user needs all while implementing a system that conforms to the particular needs of the firm in question. Technological advance is creating a highly integrated standard for operational usage, particularly in achieving a balance between security imperatives and freedom of usage. Indeed, this concern is at the center of the discussion here, which considers how best to pursue a business IT strategy in the face of so many options.

As the discussion here will note, there is a general emphasis on employing certain 'best practice' strategies in implementing Information Technology security strategies. The background to our case discussion denotes that this approach is often a consequence of a rather problematic attitude. Namely, the use of 'best practice' IT security strategies will not always occur because of the company's confidence in the selected approach but will often be employed because deferment to industry standard practices can help to diminish culpability for system failures or vulnerabilities. This underscores the decision made here to pursue a security strategy that combines the most appropriate elements of Best Practice with elements of...

Here, the article by Microsoft TechNet (2011) offers a useful first step, and one that combines the two approaches. Here, the article reports, "in order to effectively secure your network environment, you must first become familiar with all of its components. Assessing your infrastructure involves not only identifying all assets and security issues, but also monitoring the quality of your overall security program. To determine your specific network security needs, you should consider several issues. First, you need to be sure that your IT staff has the necessary executive support to run a successful security program. If you find yourself on the same page with management on how to proceed, you should focus on establishing a process to identify and analyze security risks on an ongoing basis. Without such a plan in place, you run the risk of initiating projects that are not solving your largest security problems." (Microsoft TechNet, p. 1)
And certainly, few small or medium businesses (SMBs) can afford to implement a major IT overhaul only to witness failure. This is why there is a distinct need to conduct the step above, recommended as a phase in the Best Practice strategy but also implying that said strategy is not mutually exclusive from steps reflecting a Best Fit approach. Here, scanning the network environment and the environment attendant to the organization's culture can help key decision-makers to identify areas of potential difficulty,…

Sources used in this document:
Works Cited:

Microsoft TechNet. (2011) Enterprise security best practices. Microsoft. Retrieved December 2, 2011, from http://technet.microsoft.com/en-us/library/dd277328.aspx

Phifer, L. (2011) 5 best practices for securing remote access. E-security Planet. Retrieved December 2, 2011, from http://www.esecurityplanet.com/views/article.php/3937121/5-Best-Practices-for-Securing-Remote-Access.htm

Venafi. (2011) 2011 IT security best practices. Retrieved December 2, 2011, from http://www.venafi.com/Collateral_Library/Venafi-Top-Five-Best-Practices-and-Failures.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Information Systems Outsourcing Advantage and Risks There
Words: 2721 Length: 10 Document Type: Research Paper

Information Systems Outsourcing Advantage and Risks There appears to be some confusion and trepidation about the use of outsourcing for Information Systems in today's organizations. While some advocate for the use of IS outsourcing still others state claims that it is not an effective or efficient organizational practice. The objective of the research contained in this study is to determine the effectiveness and efficiency of information systems outsourcing practices. The significance of the

Managing the Relationship Between Customer and E-Banking
Words: 2867 Length: 8 Document Type: Essay

Managing the Relationship Between Customer and E-Banking Banking E banking or the Electronic banking is an Electronic method of money transfer or the EFT. This is a means whereby, an individual transfers money directly from different accounts by use of an Electronic system. This service allows clients to make use of computers or electronic gadgets to access the accounts information and conduct the various transactions involved. The service is beneficial for customers

Management Theories and Philosophies Royalco
Words: 4436 Length: 16 Document Type: Term Paper

Individuals work half a day, or weekly based on the sharing arrangements. Split and sharing of the jobs leads to the organizations benefit, as talented individuals who are unable to work on a fulltime basis get an employment chance. Although adjustment problems occur, the arrangement of a proper schedule is required. III. Telecommuting also known as the flexiplace, is a working condition that allows the least portion of the scheduled

Security Programs Implementation of Information Security Programs
Words: 1415 Length: 4 Document Type: Essay

Security Programs Implementation of Information Security Programs Information Security Programs are significantly growing with the present reforms in the United States agencies, due to the insecurity involved in the handling of data in most corporate infrastructure systems. Cases such as independent hackers accessing company databases and computerized systems, computer service attacks, malicious software such as viruses that attack the operating systems and many other issues are among the many issues experienced

Pharmacy Information Security Information Security in Pharmacies
Words: 2962 Length: 10 Document Type: Essay

Pharmacy Information Security Information Security in Pharmacies Information security is vital in many firms especially pharmacies and other sensitive fields. Security officers are, therefore, necessary to ensure both physical and logical safety. The Information Security Officer/Manager (ISO) will have different duties such as managing the information security functions in according to the firm's established guidelines and provisions/policies, providing reports to the firm's management at reasonable intervals, establishing and ensuring implementation of information

Management Development Process Has Been
Words: 4207 Length: 16 Document Type: Term Paper

Previously the element of interest and personal motivation were found missing, the technical capabilities of the employees have never been a matter of debate, however the personal and mental capacities and limitations are either ignored or not respected which resulted in the poor performance of the organization. Apparently, the rise in the demands pertaining to the particpation of the employees and the industrial democracy has also distorted the professional

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now