Preview

Security Plan

Powerful Essays
Open Document
Open Document
3805 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Plan
Introduction

The purpose of this security plan is to elicit the potential threats to an organisation physical and electronic information holdings. Organisations in general are starting to take information security more sincerely due to the proliferation of mobile services, VPN connections, terrorism and natural disasters. We must however acknowledge that this very technology advancement is regarded as efficient but is also leading to a higher level of security risks. These risks must be mitigated to ensure the confidentiality, integrity, and availability of information assets. (The SANS Institute. 2007)

The security team would like to report the following threats to the organisations physical and electronic information holdings discovered during an in-depth analysis of the current security structure within the organisation.
Physical Threats

Physical security is generally overlooked on an information security plan. The presence of a guard at the entrance of a building, magnetic access cards and identity badges provides an illusion that their information assets are physically secure. (The SANS Institute. 2007) A report from Justin Kallhoff explains that the highest priority of physical security is human safety and in the event of an incident, the priority should be to ensure all human beings are safe prior to initiating other incident responses. (Justin Kallhoff.2007)

The below tabular representation briefly describes some of the threats to an organisations information asset.

Security Threat Security Threat Description
Humans Behaviour If someone accidentally unplugs or turns off the wrong device, a hacker/cracker executes an exploit and unexpectedly crashes a server, an employee steals a device. The most common threat is users in an organisation especially contractors including cleaning staff.
Obvious Threats Fires, floods, and natural disasters are obvious threats to physical security; however, every company is vulnerable to these kinds

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    There are quite a few vulnerabilities that can affect organizations productivity. These vulnerabilities can be environmental, utilities & service, criminal behavior, equipment failure, and information security issues. To protect the organization against loss of productivity and data loss we have created an assessment of the potential danger each category of threat presents. We created a worksheet (located on the last page of this document) listing each type of vulnerability and ranked the probability and severity of each of the threats. Using a probability and severity legend that had one…

    • 2036 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    The diverse associations and understandings of the word security is confusing to the public as well as those who are public safety professionals such as law enforcement officers, firefighters, medics, emergency managers, et al. As an example, when a homeowner states they have “security” at their home, what they likely mean is they have installed a fire and burglary alarm system. However, the term security may just as well mean that the homeowner has installed high security locks on their doors and windows. Still to another homeowner, the installation of motion activated exterior lighting may mean that the homeowner has installed security at their…

    • 3449 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Disaster Recovery Plan

    • 1491 Words
    • 6 Pages

    Security and control within an organization is a continuing concern. It is preferable, from an economic and business strategy perspective, to concentrate on activities that have the effect of reducing the possibility of disaster occurrence, rather than concentrating primarily on minimizing impact of an actual disaster. This phase addresses measures to reduce the probability of occurrence. Security assessment of the…

    • 1491 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Attacks from the Insiders

    • 1029 Words
    • 5 Pages

    One of the most common concerns in putting together a comprehensive information security plan is to have a watchful eye on your own team members and fellow employees within the company. The people on the inside are the one’s who are granted the most access in the first place, therefore taking the appropriate precautions concerning them is of the utmost importance.…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Better Essays

    hotel security

    • 1281 Words
    • 6 Pages

    While technology will change in the new century, basic physical security services remain the same and therefore require continued attention. Some of these services and areas needing constant attention include…

    • 1281 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    1.5 Some physical security controls are required by laws, e.g. fire exit door, fire alarm, etc.…

    • 4755 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    The first step an organization must take in creating a security policy is to determine which assets to protect from which threats; a company that stores its customers’ credit card numbers might decide that those numbers are an asset that must be protected from eavesdroppers; then the organization must determine who should have access to various parts of the system; next, the organization determines what resources are available to protect the assets identified. Using the information it has acquired, the organization develops a written security policy. Finally, the organization commits to resources to building software, hardware, and physical barriers that implement the security policy.…

    • 312 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    security

    • 39280 Words
    • 338 Pages

    the supply in energy, vital for the well-being of the citizens and the functioning of the economy.…

    • 39280 Words
    • 338 Pages
    Good Essays
  • Powerful Essays

    Understanding the importance of physical security rest in acknowledging the two main elements of security; people, and technology ( Bitzer [Remove the space after the parenthesis] & Hoffman, n.d.). Physical security consists of a series of actions used to protect someone or something against an unwanted or illegal invasion. At its core, physical security consists of three levels; outer perimeter, inner perimeter, and the interior. Essentially, when implementing a system of physical security one needs to implement several forms of security on each of the three aforementioned levels in order to [Writing suggestion--the meaning will be the same (and less wordy) by removing "in order"] obtain effective security (Deutsch, 2011). The following study will assess the various features of physical security and their overall [Wordiness: unless meaning denim work clothes, "overall" is general and vague and contributes little to the sentence] importance in the overall system…

    • 1537 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Unit 2 Assignment 2

    • 1463 Words
    • 6 Pages

    - Security issues for particular types of data, given business needs, anticipated threats and vulnerabilities;…

    • 1463 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Security risk management

    • 45681 Words
    • 183 Pages

    Most organizations recognize the critical role that information technology (IT) plays in supporting their business objectives. But today's highly connected IT infrastructures exist in an environment that is increasingly hostile—attacks are being mounted with increasing frequency and are demanding ever shorter reaction times. Often, organizations are unable to react to new security threats before their business is impacted. Managing the security of their infrastructures—and the business value that those infrastructures deliver—has become a primary concern for IT departments.…

    • 45681 Words
    • 183 Pages
    Good Essays
  • Good Essays

    Data Security

    • 651 Words
    • 3 Pages

    A wide variety of threats face today's computer systems and the information they process. In order to control the risks of operating an information system, managers and users must know the vulnerabilities of the system and the threats which may exploit them. Knowledge of the threat environment allows the system manager to implement the most cost-effective security measures.…

    • 651 Words
    • 3 Pages
    Good Essays