Verified Document

Security Program Network Risk Assessment Term Paper

Sending an email from an odd-looking address and seeing if employees open the email is one way to gage the relative wariness of employees. If employees open up the email, it staff can include a message warning them that this is just the kind of message employees should delete. Creating 'backdoor' threats and viruses to attack a system, and see if it is vulnerable is one potential 'fire drill' that can be used by the organization to assess potential areas that can be compromised. General assessments of the knowledge of non-it and it staff of proper security procedures and the areas which can pose new threats are also essential.

Simple systematic procedures, such as requiring employees to change their passwords on a regular basis, and having passwords screened for complexity, must be built into the system, as well as more complex tests of efficacy. To ensure that these measures are working requires formal audits, but also a self-critical attitude on the part of staff members in both technologically-related and non-technologically related jobs.

Q7. Keeping the information security program functioning and improving over time

Monitoring and quality testing must continue, but it must shift, change, and improve with the evolving security...

Maintaining a high level of education on the part of the security staff is essential, through retraining and also continuing the staff's education. Staff must receive constant exposure to the subject of new security threats by attending conferences and in-house training. Having a strong HR program to encourage top it graduates to join the security team is also essential. Proper financing for the it department to maintain its high-quality efforts is a vital.
A high level of technological literacy is desirable amongst all staff members. As well as being kept abreast of how to protect their departments and their own security, there should be a close relationship between it and other departments. Other employees should feel comfortable going to it staff to discuss potential security compromises.

Compromises to security can be injurious for the company and for staff members on a personal level. Incorporating a briefing regarding the need for high-level security into orientation and having 'retraining days' at the company makes security a natural part of standard operating procedures, not something that is only of concern when there is a breach. Employees should know the risk for YGT but also for themselves, if they are not vigilant.

Cite this Document:
Copy Bibliography Citation

Related Documents

Risk Assessment
Words: 3324 Length: 12 Document Type: Case Study

Chief Information Security Officer-Level Risk Assessment The objective of this work in writing is to examine Chief Information Security Officer-Level Risk Assessment. Specifically, the scenario in this study is securing information for the local Emergency Management Agency in an Alabama County. The Director of Emergency Management in this County has tasked the Chief Information Security Officer with setting out a plan for information security of the Department's networking and computing systems. Information

Risk Assessment Report of the
Words: 2612 Length: 9 Document Type: Assessment

Functional description The Public Health Informatics and Technology Program's IT system was developed by the Office of Surveillance, Epidemiology, and Laboratory Services (OSELS).The CDC division response for its deployment and maintenance is the Division of Informatics Research and Development (DIRD) whose role is to advance the frontiers of public health informatics by means of appropriate research and development. The DIRD division is to collaborate with the other members of the CDC

Risk Assessment Program
Words: 3310 Length: 13 Document Type: Term Paper

Risk Assessment Program Over the last several years, many small and medium sized businesses have been turning to cloud computing as a way of storing, retrieving and accessing vital information. This is when a third party provider will offer firms with these services at a fraction of the cost of traditional IT departments. Moreover, there is unlimited storage capacity and firms can readily protect themselves against vulnerabilities at a particular site.

Risk Assessment for Gfi Group, Inc. Gfi
Words: 2070 Length: 7 Document Type: Essay

Risk Assessment for GFI Group, Inc. (GFI) RISK ASSESSMENT Company Network, Interconnection, and Communication Environment When it comes to the company network, GFI Group, Inc. (GFI) operates as a dealer brokerage company, which was discovered in the U.S. It is in network with over the counter (OTC) related securities and derivative products. The company mostly offers market data brokerage services, and analytics software merchandises to commercial and investment banks, insurance corporations, large businesses

Security for Networks With Internet Access
Words: 4420 Length: 12 Document Type: Term Paper

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Risk Assessment in the Past
Words: 5965 Length: 15 Document Type: Term Paper

It is also quite possible to use the file system's security characteristics or features in order to protect accessibility to the device management application itself. Then unauthorized users will not be in a position to read the application file, and they will not be able to run the application and have to attempt to guess a legitimate logon password in each of the step providing an extra layer of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now