Explore BrainMass
Share

ORGANIZATION SECURITY POLICY SAFEGUARDING TECHNOLOGY

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Other than hardware, what other considerations must an organization look at when setting their security policies?

© BrainMass Inc. brainmass.com October 24, 2018, 10:18 pm ad1c9bdddf
https://brainmass.com/computer-science/computer-system-implementation/organization-security-policy-safeguarding-technology-154768

Solution Preview

AN ORGANIZATION'S SECURITY POLICIES - SAFEGUARDING YOUR TECHNOLOGY: Security Management

There are many considerations an organization must consider when setting their security policies; other than hardware the major consideration is software. "The key to successful security implementation is finding a reasonable balance between system protection and user autonomy and convenience. Security management consists of nurturing a security-conscious organizational culture, strong security policies, developing tangible procedures to support security, and managing the myriad of pieces that make up the system. The security manager ensures that employees are aware of their security roles, support security efforts, and are willing to tolerate the minor inconveniences that are part of system change and improvement. After all, if personnel circumvent security procedures (e.g., write down passwords, share accounts, and disable virus-checking software, etc), they put the entire system at risk. Therefore, security management must:

1. Communicate to employees that protecting the system is not only in the organization's interests, but also in the best interest of users.
2. Increase staff awareness of security issues.
3. Provide for ...

Solution Summary

This solution explores organizational security policies. Other than hardware, there are many considerations an organization may employ when setting security policies, and this text references ways to safeguard technology.

$2.19
See Also This Related BrainMass Solution

Security Analysis

How can I approach and complete this project? It's a Security Analysis Project. In this project I need to write an action plan for a firm's information security system. The plan must identify current strengths and weaknesses in the firm's security system. Each weakness must be addressed in the action plan. I may choose any firm with which I'm associated with (I don't have any), or any other firm that will cooperate in providing necessary information to complete this project.

View Full Posting Details