Preview

Security Plan

Powerful Essays
Open Document
Open Document
3805 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Plan
Introduction

The purpose of this security plan is to elicit the potential threats to an organisation physical and electronic information holdings. Organisations in general are starting to take information security more sincerely due to the proliferation of mobile services, VPN connections, terrorism and natural disasters. We must however acknowledge that this very technology advancement is regarded as efficient but is also leading to a higher level of security risks. These risks must be mitigated to ensure the confidentiality, integrity, and availability of information assets. (The SANS Institute. 2007)

The security team would like to report the following threats to the organisations physical and electronic information holdings discovered during an in-depth analysis of the current security structure within the organisation.
Physical Threats

Physical security is generally overlooked on an information security plan. The presence of a guard at the entrance of a building, magnetic access cards and identity badges provides an illusion that their information assets are physically secure. (The SANS Institute. 2007) A report from Justin Kallhoff explains that the highest priority of physical security is human safety and in the event of an incident, the priority should be to ensure all human beings are safe prior to initiating other incident responses. (Justin Kallhoff.2007)

The below tabular representation briefly describes some of the threats to an organisations information asset.

Security Threat Security Threat Description
Humans Behaviour If someone accidentally unplugs or turns off the wrong device, a hacker/cracker executes an exploit and unexpectedly crashes a server, an employee steals a device. The most common threat is users in an organisation especially contractors including cleaning staff.
Obvious Threats Fires, floods, and natural disasters are obvious threats to physical security; however, every company is vulnerable to these kinds

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Defining policies for every domain of an IT infrastructure breaks down in depth how each entity should be properly used. The policies should also identify the key players that will play a key role in ensuring optimum use of all devices, as well as establishing and maintaining security throughout the process of information traveling through the Infrastructure. Here are some best practices to keep in mind when defining policies for a few of the domains within the infrastructure:…

    • 545 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Disaster Recovery Plan

    • 1491 Words
    • 6 Pages

    Security and control within an organization is a continuing concern. It is preferable, from an economic and business strategy perspective, to concentrate on activities that have the effect of reducing the possibility of disaster occurrence, rather than concentrating primarily on minimizing impact of an actual disaster. This phase addresses measures to reduce the probability of occurrence. Security assessment of the…

    • 1491 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Understanding the importance of physical security rest in acknowledging the two main elements of security; people, and technology ( Bitzer [Remove the space after the parenthesis] & Hoffman, n.d.). Physical security consists of a series of actions used to protect someone or something against an unwanted or illegal invasion. At its core, physical security consists of three levels; outer perimeter, inner perimeter, and the interior. Essentially, when implementing a system of physical security one needs to implement several forms of security on each of the three aforementioned levels in order to [Writing suggestion--the meaning will be the same (and less wordy) by removing "in order"] obtain effective security (Deutsch, 2011). The following study will assess the various features of physical security and their overall [Wordiness: unless meaning denim work clothes, "overall" is general and vague and contributes little to the sentence] importance in the overall system…

    • 1537 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Godrej Full Report

    • 10083 Words
    • 41 Pages

    It is an honor to present this project report titled as "Need Of Security In Government & Industrial Sectors". This partial fulfillment of curriculum has provided me a great opportunity to experience the market practicalities in a hidden sector of security systems.…

    • 10083 Words
    • 41 Pages
    Powerful Essays
  • Good Essays

    We must be secure in your life, to keep your things safe from anyone or any damage. The consequences of losing items vary from item to item according to its value and importance. For us to be able to function in today’s society requires security. And this security is needed in almost every aspect of life; no matter how large or small it may be.…

    • 508 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The diverse associations and understandings of the word security is confusing to the public as well as those who are public safety professionals such as law enforcement officers, firefighters, medics, emergency managers, et al. As an example, when a homeowner states they have “security” at their home, what they likely mean is they have installed a fire and burglary alarm system. However, the term security may just as well mean that the homeowner has installed high security locks on their doors and windows. Still to another homeowner, the installation of motion activated exterior lighting may mean that the homeowner has installed security at their…

    • 3449 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Risk Management Plan

    • 273 Words
    • 2 Pages

    Risk Management Plan brings into perspective the significant role that security play in the live hoods of people across the globe. The market has a unique design that gives prospective investors in the industry the urge and opportunity to learn more about risk. It also is enhancing investor into the rapidly growing industry. Brett Flayton, CEO of Flayton Electronics, is facing the most critical time of his career when it is discovered that 1,500 of 10,000 transaction has been compromised through an unprotected wireless link in the real-time inventory management system. Brett has to evaluate his obligation to let customers know of the massive leak of private data.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Attacks from the Insiders

    • 1029 Words
    • 5 Pages

    One of the most common concerns in putting together a comprehensive information security plan is to have a watchful eye on your own team members and fellow employees within the company. The people on the inside are the one’s who are granted the most access in the first place, therefore taking the appropriate precautions concerning them is of the utmost importance.…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Better Essays

    hotel security

    • 1281 Words
    • 6 Pages

    While technology will change in the new century, basic physical security services remain the same and therefore require continued attention. Some of these services and areas needing constant attention include…

    • 1281 Words
    • 6 Pages
    Better Essays
  • Good Essays

    security

    • 39280 Words
    • 338 Pages

    the supply in energy, vital for the well-being of the citizens and the functioning of the economy.…

    • 39280 Words
    • 338 Pages
    Good Essays
  • Good Essays

    The vulnerability of information systems is increasing as we move to a world of networked and especially wireless computing. Theoretically, there are hundreds of points in a corporate information system that can be subject to some threats. These threats can be classified as:…

    • 2074 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Data Security

    • 651 Words
    • 3 Pages

    A wide variety of threats face today's computer systems and the information they process. In order to control the risks of operating an information system, managers and users must know the vulnerabilities of the system and the threats which may exploit them. Knowledge of the threat environment allows the system manager to implement the most cost-effective security measures.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The first step an organization must take in creating a security policy is to determine which assets to protect from which threats; a company that stores its customers’ credit card numbers might decide that those numbers are an asset that must be protected from eavesdroppers; then the organization must determine who should have access to various parts of the system; next, the organization determines what resources are available to protect the assets identified. Using the information it has acquired, the organization develops a written security policy. Finally, the organization commits to resources to building software, hardware, and physical barriers that implement the security policy.…

    • 312 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    1.5 Some physical security controls are required by laws, e.g. fire exit door, fire alarm, etc.…

    • 4755 Words
    • 20 Pages
    Powerful Essays