Verified Document

Security Policy And Risk Strategy Essay

An IP San is a fiber optic channel that can provide secure real time data to each location. Where, software and security applications can be adapted to the current system that is being used. The Snap Lock is: a security software that can be used to provide an effective way for each location to retrieve, update and change information. Support for why these procedures and products are the optimal approach for this organization

The reason why these different procedures and products were selected was: to reduce the overall risk exposure of the company's external threats. The current system that is being used by MMC increases risks dramatically, by having a number of different systems, where financial information is stored. If any one of these systems is vulnerable, there is the possibility that you could see a major security breach. To reduce these risks requires limiting the number of locations to two. You would then, use fiber optics and other high speed protocols to deliver the data to each location. The IP San was chosen, because it can effectively adapt to the current system that is being used, it works with a variety of financial programs and it offers secure connections. ("IP San, " 2010) You would then, use the Snap Lock security software as an added layer of safety against possible breaches. This system would work more effectively, because it would create a virtual fortress around the company's it infrastructure. ("Snap Lock Compliance and Snap Lock Enterprise Software," 2010)

High level architectural and design details for how and where these procedures and products will be implemented within the organization

The way that the above mentioned tools will be implemented into the company's it infrastructure is through: a system of creating one integrated structure and then implementing the different pieces into the one protocol. This will be accomplished by establishing the new protocol independently of the current system. Then, as you are integrating the pieces for the current system into the new protocol, you will be training and updating the staff about the new system. This will allow for sufficient...

The use of a single it protocol that can streamline all data / information; has shown to be cost effective and can increase the overall security of the system. At which point, you are taking this new protocol and are constantly testing it for vulnerabilities. This will ensure that the company is able to adapt to the different changes that are occurring in the world of it security. Once, management and various it personnel are aware of these issues, the risks dramatically decrease for each breach. This is supported by information from the Department of Homeland Security, which found that those companies who are not testing their system and looking for various weaknesses; could be the most vulnerable to these different issues because of their false sense of security. (Mason, 2010)
Clearly, MMC needs to implement a new security risk protocol. This is because the current system that is being utilized; has a number of locations that are storing all of their customers personal financial information. As a result, the chances increase exponentially of hackers being able to successfully breach the system. To prevent such instances, requires that the company implement one it protocol that will be in at two locations. This will provide increased amounts of security, by ensuring that all information is provide via high speed fiber optics network. You would then, implement Secure Lock to provide an added layer of protection. If the company can implement such a system, they will dramatically reduce risks, by facing these issues.

Bibliography

IP San (2010). Retrieved May 27, 2010 from Net App website: http://www.netapp.com/us/products/protocols/ip-san/ip-san.html

Snap Lock Compliance and Snap Lock Enterprise Software. (2010). Retrieved May 27, 2010 from Net App website: http://www.netapp.com/us/products/protection-software/snaplock.html

Mason, J. (2010). How to Bullet Proof Your DR Plan. Retrieved May 27, 2010 from Net App website: http://www.netapp.com/us/communities/tech-ontap/tot-data-recovery-plan-0908.html

Sources used in this document:
Bibliography

IP San (2010). Retrieved May 27, 2010 from Net App website: http://www.netapp.com/us/products/protocols/ip-san/ip-san.html

Snap Lock Compliance and Snap Lock Enterprise Software. (2010). Retrieved May 27, 2010 from Net App website: http://www.netapp.com/us/products/protection-software/snaplock.html

Mason, J. (2010). How to Bullet Proof Your DR Plan. Retrieved May 27, 2010 from Net App website: http://www.netapp.com/us/communities/tech-ontap/tot-data-recovery-plan-0908.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Policy Document: Global Distributions, Inc. The
Words: 1891 Length: 7 Document Type: White Paper

Security Policy Document: Global Distributions, Inc. The purpose of this document is to establish key security parameters and guidelines for Global Distributions, Inc. (GDI) in order to protect the interests of the company and its clients. Scope These policies apply to all operations managed by GDI, including interactions and interfaces with client companies that are managed by GDI. All communication networks, database systems, and servers full under the purview of this policy. Policies Definition of

Security Policy: The Information Security Environment Is
Words: 1208 Length: 4 Document Type: Essay

Security Policy: The information security environment is evolving because organizations of different sizes usually experience a steady stream of data security threats. Small and large business owners as well as IT managers are kept awake with various things like malware, hacking, botnets, and worms. These managers and business owners are usually concerned whether the network is safe and strong enough to repel attacks. Many organizations are plagued and tend to

Security Management Defining an Effective
Words: 3174 Length: 12 Document Type: Research Paper

The reality is however that legacy systems pose the greatest potential risk to any enterprise, as these platforms are anachronistic in terms of security support, lack many common safeguards, and don't have the necessary Application Programmer Interfaces (APIs) to scale globally as a secured platform (Gupta, Roth, 2007). Legacy systems were designed in an era where single authentication for an entire enterprise system was sufficient enough, and the concept

Security Management Security Measures Risk Management
Words: 1552 Length: 5 Document Type: Essay

Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is

Social Security Company Network Security Policy This
Words: 1451 Length: 5 Document Type: Term Paper

Social Security Company Network Security Policy This paper is intended to address the importance of having a written and enforceable Computer Network Security Policy for The Financial Group, an accounting corporation. The company's accounting systems comprise three major elements: a Web-based front-end server, a back-end database, and business-logic applications. OS-level console access is used for system administration. Accountants access the system with Web browsers using HTTP only and are authenticated via the

Security for Networks With Internet Access
Words: 4420 Length: 12 Document Type: Term Paper

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now