Verified Document

System Security "As A Manager, How Would Essay

¶ … System Security "As a manager, how would you plan on securing organizational data? How does security effectiveness and relative cost figure into those plans?"

The more critical aspect of any enterprise-wide security management strategy is to align system resources to the strategic initiatives and goals of an organization. Increasingly this is being accomplished through the use of role-based access and authentication privileges and process workflows that audit and evaluate use of sensitive information (Shih, Wen, 2005). The role of enterprise security management drastically changes however when ubiquitous Web Services are used for capturing, aggregating, analyzing and effectively using confidential data to make financial decisions (Phifer, 2011). The intent of this analysis is to evaluate how intrusion and intrusion detection systems can be used in the 21st century, state-of-the-art IT systems that are to a large extent Cloud-based and often have remote access points that make them particularly vulnerable (Phifer, 2011). Also included is an assessment of the types and threats from hackers and the risk they pose to confidential corporate data. Enterprise best practices dictates that a company control assets by multiple levels, authentication approaches and through architectural constraints that minimize risk while also providing agility and quickness of retrieval (Microsoft, 2011).

Enterprise System Security in the 21st Century

Intrusion and intrusion detection systems are today designed beyond the baseline of authentication technologies and the use of simple passwords. It is possible to protect information assets using biometrics in addition to a constraint-based algorithm that prompts for specific responses only a person in a given role in a company would have access to (Shih, Wen, 2005). As part of enterprise security management best practices, averting intrusion is today more focused on streamlining access for authenticated and verified professionals needing the data (Microsoft, 2011). Using Business Process Management techniques to optimize the navigation through security-based networks, companies attaining best practices in security management are able to avert the time overhead placed on users by making information and data flow more aligned to specific roles and responsibilities (Shih, Wen, 2005).
In terms of arbitrating the costs of IT security for Web-based services and applications, the proliferation of Cloud-based enterprise applications and systems has completely re-order Web security (Phifer, 2011). Many enterprises begin initially by concentrating on securing the entry points of their networks at the Virtual Private…

Sources used in this document:
References

Microsoft TechNet. (2011). Enterprise security best practices. Microsoft. Retrieved from http://technet.microsoft.com/en-us/library/dd277328.aspx

Thibodeau, P. (2011, July 18). U.S. government CIO warns of IT vendor cartel. Computerworld. Retrieved from http://www.computerworlduk.com/news/public-sector/3291866/us-government-cio-warns-of-it-vendor-cartel/

Phifer, L. (2011, July 11). 5 best practices for securing remote access. E-security Planet. Retrieved from http://www.esecurityplanet.com/views/article.php/3937121/5-Best-Practices-for-Securing-Remote-Access.htm

Shih, S.C., & Wen, H.J. (2005). E-enterprise security management life cycle. Information Management & Computer Security, 13(2), 121-134.
Venafi. (2011). 2011 IT security best practices. Retrieved from http://www.venafi.com/Collateral_Library/Venafi-Top-Five-Best-Practices-and-Failures.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Self-Assessment Coyote Systems Security
Words: 2030 Length: 7 Document Type: Thesis

The management control area of authorize processing including certification and accreditation has been defined within Coyote Systems through the use of roles-based logins and access privileges and the use of certification of role-based access to ensure security. The company has found that through the use of role-based security authentication and the defining of rights by role, the certification and accreditation audits are far more efficient in being completed, and provide

Security Manager Leadership Analysis & Assessment of
Words: 2003 Length: 7 Document Type: Essay

Security Manager Leadership Analysis & Assessment of Main Management Skills of Security Managers The role of security managers and their progression to Chief Information Security Officers (CISO) in their careers is often delineated by a very broad base of experiences, expertise, skills and the continual development of management and leadership skills. The intent of this analysis and assessment is to define the most critically important management skills for security managers, including those

System Security Every Organization Which
Words: 2884 Length: 9 Document Type: Thesis

Attacks on the system security include password theft, back doors and bugs, social engineering, protocol failures, authentication failures, Denial of Service attacks, active attacks, botnets, exponential attacks including worms and viruses, and information leakage. (Fortify Software Inc., 2008); (Fortify Software, n. d.) Servers are targets of security attacks due to the fact that servers contain valuable data and services. For instance, if a server contains personal information about employees, it

Security Implementation of
Words: 3464 Length: 10 Document Type: Capstone Project

Information System Security Plan The information security system is required to ensure the security of the business process and make the confidential data of the organization secure. The organization's management is required to analyze the appropriate system to be implemented and evaluate the service provided on the basis of their required needs. The implementation of the system requires the compliance of organizational policies with the service provider to ensure the maximum

Vivint Home Security System Security Systems Development
Words: 1496 Length: 5 Document Type: Essay

Vivint Home Security System Security Systems Development Life Cycle In the system development cycle, certain precise steps are accountable and they are all integrated into phases. As mentioned in the abstract earlier, five stages/phases are used as guidelines when developing the security system, or any other system. In the planning system, the project is reviewed to realize its applicability. In the case of Vivint home security system, the proposal of the system

Identify Main Management Skills Required a Security Manager Explain...
Words: 1822 Length: 6 Document Type: Essay

Management Skills Required for a Security Manager Management is a wide field of knowledge important to everyone at any particular point. Management is not only important to organizations or companies but also to individuals in their day-to-day activities. Individuals require management skills to manage time, finance and expenditures in daily aspects of life. Management is a necessary tool that enables one to carry out activities in an orderly and organized manner.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now