Preview

Security Monitoring Activities

Better Essays
Open Document
Open Document
1074 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Monitoring Activities
This paper will describe the security monitoring activities that should be implemented and carried out in an organization on both internal and e-commerce applications. Managing risk is very crucial and plays an integral part in an organization especially to those that considers data as one of their asset. In this time and age, good risk management is the basis in achieving good business and attaining the company’s goals high ROI (Return On Investment). Security monitoring is associated and linked to other project management process to make sure that risk are identified, handled and effective patch up strategy is in place and ready to carry out. (Cooper, et.al, 2005) Generally in technology, security monitoring plays an integral part of implementation as outlined through risk management for both internal activities that includes payroll, human resources, accounting and inventory; and external activities that includes sales and marketing.
Monitoring Process Monitoring process should be implemented as part of a routinely tasks. Risk can be prioritized based on the outcome and the effectiveness of action that needs to be carried out. The process of monitoring security plays an important function in any organization’s computer use both internally and externally. Security monitoring is used by companies to set boundaries for usage and screen the contents that is being transmitted both to-and-from the company. The process of continuous security monitoring across the enterprise has grown its efforts based on the security authorization process and include the post-authorization period. The objective of the monitoring process is to determine if security controls in the system stays effective over period f time in the light of uncertainties and events that happens within and as well as the environmental aspects in which the system operates.
Internal IT Security monitoring for internal aspects of the organization like payroll, human resources, accounting and



References: Cooper, D., Grey, S., Raymond, G., and Walker, P. (2005) Monitoring and Review. Project Risk Management Guidelines: Managing Risk in Large Projects and Complex Procurements. Greenstein, M. & Vasarhelyi, M. (2002) Risk of Insecure Systems. Electronic Commerce: Security, Risk Management. 2e. Ch. 7 Harris, S. (2010) Information Security and Risk Management. All-In-One CISSP Exam Guide. 5e. Ch. 3

You May Also Find These Documents Helpful

  • Good Essays

    Global’s risk management approach was a key factor in the success of their efforts to protecting their client’s information assets. By utilizing risk management strategies Global was able to detect vulnerabilities where there were the most likelihood of threat and implement controls to detect and/or prevent breaches of the security controls. The risk management process ensured Global addressed security measures at all levels of the…

    • 515 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    References: 267. Beijtlich, R. (n.d.). The Practice of Network Security Monitoring: understanding incident detection and response. [Books24x7 Version.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    The following outline presents the fundamental solutions for the safety of data and information that belongs to Richman Investments. As part of the general security plan of the organization the IT department puts together a proposal to provide multi-layered security strategies that can be applied at every level of the IT structure. The plan will lay out the importance of improving and safeguarding the levels of each domain and the process of protecting the information of the organization.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Better Essays

    The review results were positive with a suggestion for an improvement. The team found that RedSeal product provides the intelligence necessary to improve defenses, maintain continuous compliance and mitigate real-world risks by identifying the available paths of access and exposed vulnerabilities present across a network (Stephenson, 2012). The RedSeal solution is either a hardware appliance or software product and is architected for a fast and efficient means of implementing the system (Stephenson, 2012). The design will provide the most secure, scalable, and dependable deployment possible (Stephenson, 2012). Continuous monitoring focuses on correlating IT, network, and vulnerability feeds (Stephenson, 2012). The system identifies risk associated with the business’s security effectiveness as opposed to policy and compliance driven tools (Stephenson, 2012). RedSeal provides a large library of supported vendor products, allowing security and vulnerability data to be quickly and easily imported into the system. The system automatically builds network maps and correlates the map data with configuration and vulnerability data, which creates a threat reference library. RedSeal finds and eliminates gaps in businesses security controls and prioritizes the impact of those gaps. RedSeal is not an assessment or audit tool, but it does correlate risk to various controls for compliance regulations, creating reports that show gaps in deployed configurations/controls (Stephenson, 2012). The team would have liked to have seen more integration with governance, risk, and compliance solutions (Stephenson, 2012). The product only provided a piece of the risk picture. The piece is important, and one that a number of assessment and audit driven tools do not deliver and could leverage (Stephenson,…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Testing and monitoring security controls can come in different factors. Monitoring security is by far important because you need to know what’s going on before you can announce it. Networking abuse is by far the biggest baseline anomaly. For employees who have access to the internet, the network can be used to stream media, to access social websites and to download unauthorized software or free software which has vulnerabilities a long with that.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Security is a compelling concern for business and employees. Employers need to establish that they carry out complete risk assessment and address security issues by implementing required security systems. Physical security system is a fundamental component of an establishment, which protects a several aspects such as building security, theft, vandalism and falsification of records. Therefore, organizations and companies need to highly aware of to protect their physical assets. The foundation of a competent security management can prevents such risk like discovering solutions, authorization, and controlling employee’s activities. As a result, organizations can ensure the safety and protection of employees and property.…

    • 1377 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Statistics Lab week 6

    • 3844 Words
    • 14 Pages

    Use of the Internet has resulted in recognition that information technology security is of major importance to our society. This concern seems relatively new in healthcare, but information technology security is a well established domain. A large body of knowledge exists that can be applied to protect healthcare information. A general understanding of security can be obtained by understanding: 1. Security Components 2.…

    • 3844 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Security has become increasingly complex, and is an important consideration when building, upgrading, and maintaining the hardware, software, and infrastructure of an information technology department. Security contains many aspects. Physical security, virtual security, data integrity, accountability, business continuity, and auditing are among topics that address different security aspects and concerns. Security must be addressed not only regarding internal users and issues, but must also be resolved from external threats that are presented when connecting an organization’s network to the Internet and various external customers, vendors, and outside agencies. This paper will distinguish between internal and external threats to the physical locations where resources are located, as well as the virtual resources that are accessible electronically from inside or outside of the organization. Strategies that are used to protect the physical and virtual resources will also be presented, as well as how those threats are defined and distinguished. As the capabilities and complexity of information technology systems have progressed, security has evolved into a specialized information technology field of study. The importance of building and maintaining the proper security controls can have a direct correlation to the success or failure of an organization.…

    • 1833 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    example

    • 257 Words
    • 2 Pages

    The Senior Network Security Engineer is an IT professional with responsibility for designing, implementing and supporting network security solutions for the organization. In collaboration with members of the Architecture and Engineering, Systems Administration, Database Administration, IT Development and Application Support teams, the Senior Network Security Engineer will implement practical solutions to secure the bank's internal and external network infrastructure.…

    • 257 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Risk is a major part of any investment. The major drive behind investment is to gain profit. If there was no risk on a project that had a 20% return on it then everyone would be investing. The amount of risk a project faces comes down to the nature, scope of works, market need, and future predictions. The more investigation of the preliminaries and exploration of all options will generally see more risks becoming assessed and contingency plans in place. A risk analysis can be used across all areas of this development and broken down to smallest of details. We will only be exploring the major aspects relating to the financial returns in this analysis that may have a major impact on LSC Projects return if they were to occur.…

    • 2912 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Monitoring System

    • 1749 Words
    • 7 Pages

    This system is just use when theres a client who wants to purchase an item…

    • 1749 Words
    • 7 Pages
    Satisfactory Essays