Technical Paper
Wayne Thomas
Dr. Glenn Hines
Theories of Security Management
March 14, 2015
Abstract
This paper represents the Information Systems Decision-Making course and will address the following two issues.
We will describe the company network, interconnection, and communication environment.
We assess risk based on the GFI, Inc. network diagram scenario.
We will examine whether your risk assessment methodology is quantitative, qualitative, or a combination.
We will explain the way in which you would present your findings and assessment of the organization’s management and thus facilitate security buy-in and concentration.
We will use Microsoft Visio to depict a secure and risk-mitigating model.
The goals of this Theories of Security Management paper will be to reflect that the writer has developed the skills that will lead to a more productive workplace environment and learning experience.
Company Network, Interconnection, and Communication Environment.
Global Finance Inc. is a company under study, which has experienced several network attacks. These outages resulted in losses of approximately $1,000,000 last year and loss of customer confidence. Organizations employees connect and communicate either within their location or off-site. It therefore depends on their network for storage, transfer of data and information. The company has undergone a remarkable economic growth and network systems have expanded proportionally. Despite the fact
The network diagram of Global Finance, Inc. (GFI) depicts the layout of the company’s mission critical systems. The company has two servers (Email and the Oracle database) which are used more than any of their other systems. GFI heavily depend on their network to be stable because of their financial systems that are running and any outage would negatively affect their operations and financial situation. Like all other business, customer satisfaction and the security of GFI’s network is crucial. In order to ensure their network and data is secure,
The trusted computing base (TCB) internal network in the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems without which the company’s operations and financial situation would suffer. The Oracle database and email systems are among the most intensively used application servers in the company. GFI cannot afford system outages because its cash flow and financial systems heavily depend on the network stability. GFI has experienced DOS network attacks twice this year and its Oracle database and email servers had been down for a week. The recovery process required GFI to use $25,000 to restore its operations back to normal. GFI estimated the loss from these network attacks at more than $100,000 including lost customer confidence.
SABSA model is a method for developing enterprise information security architectures that are risk driven. Security infrastructure solutions are delivered. The primary characteristic of the SABSA model made some analysis of the business requirements for security, especially those in which security has an enabling function through which new business opportunities can be developed and exploited.
In the past few years, Global Finance, Inc has been a victim of numerous cyber-attacks from intruders which have given rise to revenue losses of about $1,700, 000 and client confidence
The Ages and Stages Questionnaire (ASQ) was first developed in the 1980's at the University of Oregon. The tool's purpose is to provide a low-cost strategy to monitor the development of infants and young children whose developmental status is in question or at risk. The ASQ has shown to produce high specificity across questionnaire intervals but with lower and varying levels of sensitivity (McKnight, 2014). One of the key recommendations by the American Academy of Pediatrics is early recognition of neurodevelopmental impairment, so the ASQ is way for providers to screen their patients for possible delays or impairments. The ASQs consist of 19 developmental questionnaires designed to be completed by parents or caregivers at different intervals from 4-60 months of
Critical thinking enable security managers and agents to envision their roles in a logical process with focus being on solving problems and making decisions. In fact, critical thinking ought to a natural or inherent process among security managers and agents. Critical reflection ought to be an integral thinking component among security personnel. They hereby assume the roles or researchers and practitioners in theorizing and determining their actions based on reflection. The security personnel encounter revelation and uncertainty in their course of work and each of these remain unknown or unique.
Identify what you see as the main purpose of security management and discuss what is meant by the statement that ‘security measures must be commensurate with the threat’.
Barry Buzan offers five explanations for what he terms as ‘the persistent underdevelopment of thinking about security’. The first possible explanation is that the idea has proved too complex to attract analysts, and has therefore been neglected in favour of more tractable concepts. The domain and contradictions of security have not been adequately explored. A second explanation lies in the real
IT projects can be many times a daunting task to both the contracted IT Company and the clients. With some short deadlines, there is usually a small window of opportunity to present skills and produce positive results. As a network administrator, the pressure to deliver top notch and a robust system is a priority. U.S. industry Inc is just a young company that has both the quality and skills and knowledge to produce excellent work considering previous contracts that have been undertaken by the company. The US government department aims to expand its network infrastructure to enlarge the capacity and enable it provide quality services.
To need security management we first have to identify a threat because without a threat we can’t fully understand or comprehend the task at hand, Management is how we go about implementing our principals of management that we have learned throughout our careers and personal approaches to the systems that have been proven over the years in successes and
14. How can the practice of information security be described as both an art and a science? How does security
To understand the role(s) of a Security Manager, a person must know what security is and what it means to an organization. According to Ortmeier, “security may be defined as a public or private service-related activity that provides personnel, equipment, and creates policies and procedures designed to prevent or reduce losses. These losses, caused by criminal action as well as by noncriminal events resulting from human error, emergencies, man-made and natural disasters, and business intelligence collection by competitors”. (2009).
Security departments can also add value to an organization by sharing knowledge within the company to better build a place for its customers. With so many aspects of a person’s daily life going digital, understanding how cyber security is vital to every person is important. An example of this would be Apple’s value of personal security through its value of corporate security.
Management is one of the most important human activities and has critical impact on life, growth, development or destruction of an organisation. In an organisation, managers with any rank or status should understand their basic duties i.e. maintaining a sustainable conductive environment where people can fulfil their commitments and objectives through collaborative approach. (Akhtar, 2011) A manager is responsible to achieve the business’s goals, visions and objectives by planning, organising, leading and controlling. Dubrin (1994) stated that in every organisation each member of staff must plan, organise, make decisions, and control the resources they need to accomplish the results expected